{"@context":"https://spdx.org/rdf/3.0.1/spdx-context.jsonld","@graph":[{"type":"CreationInfo","@id":"_:CreationInfo0","created":"2025-10-20T18:15:27Z","createdBy":["http://spdx.org/spdxdocs/bitbake-addba517-4804-5ae3-87c2-0c3a1a5812ba/bitbake/agent/OpenEmbedded"],"createdUsing":["http://spdx.org/spdxdocs/bitbake-addba517-4804-5ae3-87c2-0c3a1a5812ba/bitbake/tool/oe-spdx-creator_1_0"],"specVersion":"3.0.1"},{"type":"CreationInfo","@id":"_:CreationInfo1","created":"2011-04-05T23:00:00Z","createdBy":["http://spdx.org/spdxdocs/bitbake-addba517-4804-5ae3-87c2-0c3a1a5812ba/bitbake/agent/OpenEmbedded"],"createdUsing":["http://spdx.org/spdxdocs/bitbake-addba517-4804-5ae3-87c2-0c3a1a5812ba/bitbake/tool/oe-spdx-creator_1_0"],"specVersion":"3.0.1"},{"type":"Organization","spdxId":"http://spdx.org/spdxdocs/bitbake-addba517-4804-5ae3-87c2-0c3a1a5812ba/bitbake/agent/OpenEmbedded","creationInfo":"_:CreationInfo1","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias"}],"name":"OpenEmbedded"},{"type":"Tool","spdxId":"http://spdx.org/spdxdocs/bitbake-addba517-4804-5ae3-87c2-0c3a1a5812ba/bitbake/tool/oe-spdx-creator_1_0","creationInfo":"_:CreationInfo1","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias"}],"name":"oe-spdx-creator 1.0"},{"type":"SpdxDocument","spdxId":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/document/package-nativesdk-qemu-dev","creationInfo":"_:CreationInfo0","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias","https://rdf.openembedded.org/spdx/3.0/alias":"http://spdxdocs.org/openembedded-alias/doc/nativesdk-qemu/package-nativesdk-qemu-dev/nativesdk-qemu/UNIHASH/document/package-nativesdk-qemu-dev","https://rdf.openembedded.org/spdx/3.0/link-name":"b764578eb2b5ec90c38f69485126e6c47def8ffe02e0aefe9acf4d07ace914ad"}],"name":"package-nativesdk-qemu-dev","profileConformance":["build","core","security","simpleLicensing","software"],"rootElement":["http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/package/nativesdk-qemu-dev"]},{"type":"software_Package","spdxId":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/package/nativesdk-qemu-dev","creationInfo":"_:CreationInfo0","description":"QEMU is a hosted virtual machine monitor: it emulates the machine's processor through dynamic binary translation and provides a set of different hardware and device models for the machine, enabling it to run a variety of guest operating systems  This package contains symbolic links, header files, and related items necessary for software development.","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias","https://rdf.openembedded.org/spdx/3.0/alias":"http://spdxdocs.org/openembedded-alias/by-doc-hash/b764578eb2b5ec90c38f69485126e6c47def8ffe02e0aefe9acf4d07ace914ad/nativesdk-qemu/UNIHASH/package/nativesdk-qemu-dev"}],"externalIdentifier":[{"type":"ExternalIdentifier","externalIdentifierType":"cpe23","identifier":"cpe:2.3:*:*:qemu:10.0.6:*:*:*:*:*:*:*"}],"name":"nativesdk-qemu-dev","summary":"Fast open source processor emulator - Development files","software_primaryPurpose":"install","software_homePage":"http://qemu.org","software_packageVersion":"10.0.6"},{"type":"Relationship","spdxId":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/relationship/606495042ccc96675f1b693f79770d50","creationInfo":"_:CreationInfo0","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias","https://rdf.openembedded.org/spdx/3.0/alias":"http://spdxdocs.org/openembedded-alias/by-doc-hash/b764578eb2b5ec90c38f69485126e6c47def8ffe02e0aefe9acf4d07ace914ad/nativesdk-qemu/UNIHASH/relationship/606495042ccc96675f1b693f79770d50"}],"from":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/package/nativesdk-qemu-dev","relationshipType":"hasAssociatedVulnerability","to":["http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/vulnerability/CVE-2007-0998","http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/vulnerability/CVE-2018-18438","http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/vulnerability/CVE-2023-1386","http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/vulnerability/CVE-2023-2680"]},{"type":"Relationship","spdxId":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/relationship/9ec1604a5fc7b43c6a7d67b8dc09f084","creationInfo":"_:CreationInfo0","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias","https://rdf.openembedded.org/spdx/3.0/alias":"http://spdxdocs.org/openembedded-alias/by-doc-hash/b764578eb2b5ec90c38f69485126e6c47def8ffe02e0aefe9acf4d07ace914ad/nativesdk-qemu/UNIHASH/relationship/9ec1604a5fc7b43c6a7d67b8dc09f084"}],"from":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/package/nativesdk-qemu-dev","relationshipType":"hasDeclaredLicense","to":["http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/license/3_27_0/GPL-2_0-only_AND_LGPL-2_1-only"]},{"type":"LifecycleScopedRelationship","spdxId":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/relationship/b87b0cf5e633ebafdb2e630e3bf12e8f","creationInfo":"_:CreationInfo0","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias","https://rdf.openembedded.org/spdx/3.0/alias":"http://spdxdocs.org/openembedded-alias/by-doc-hash/b764578eb2b5ec90c38f69485126e6c47def8ffe02e0aefe9acf4d07ace914ad/nativesdk-qemu/UNIHASH/relationship/b87b0cf5e633ebafdb2e630e3bf12e8f"}],"from":"http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/build/recipe","relationshipType":"hasOutput","to":["http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/package/nativesdk-qemu-dev"],"scope":"build"},{"type":"security_VexNotAffectedVulnAssessmentRelationship","spdxId":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/vex-not-affected/28cb6b9857d90f2dcf836c4f97494dc4","creationInfo":"_:CreationInfo0","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias","https://rdf.openembedded.org/spdx/3.0/alias":"http://spdxdocs.org/openembedded-alias/by-doc-hash/b764578eb2b5ec90c38f69485126e6c47def8ffe02e0aefe9acf4d07ace914ad/nativesdk-qemu/UNIHASH/vex-not-affected/28cb6b9857d90f2dcf836c4f97494dc4"}],"from":"http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/vulnerability/CVE-2023-2680","relationshipType":"doesNotAffect","to":["http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/package/nativesdk-qemu-dev"],"security_vexVersion":"1.0.0","security_impactStatement":"RHEL specific issue.","security_justificationType":"vulnerableCodeNotPresent"},{"type":"security_VexNotAffectedVulnAssessmentRelationship","spdxId":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/vex-not-affected/ae25261201dfe00bc568df90adf27aa8","creationInfo":"_:CreationInfo0","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias","https://rdf.openembedded.org/spdx/3.0/alias":"http://spdxdocs.org/openembedded-alias/by-doc-hash/b764578eb2b5ec90c38f69485126e6c47def8ffe02e0aefe9acf4d07ace914ad/nativesdk-qemu/UNIHASH/vex-not-affected/ae25261201dfe00bc568df90adf27aa8"}],"from":"http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/vulnerability/CVE-2018-18438","relationshipType":"doesNotAffect","to":["http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/package/nativesdk-qemu-dev"],"security_vexVersion":"1.0.0","security_impactStatement":"The issues identified by this CVE were determined to not constitute a vulnerability."},{"type":"security_VexNotAffectedVulnAssessmentRelationship","spdxId":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/vex-not-affected/beac4f052acbc2f18e52e149e443c48c","creationInfo":"_:CreationInfo0","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias","https://rdf.openembedded.org/spdx/3.0/alias":"http://spdxdocs.org/openembedded-alias/by-doc-hash/b764578eb2b5ec90c38f69485126e6c47def8ffe02e0aefe9acf4d07ace914ad/nativesdk-qemu/UNIHASH/vex-not-affected/beac4f052acbc2f18e52e149e443c48c"}],"from":"http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/vulnerability/CVE-2023-1386","relationshipType":"doesNotAffect","to":["http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/package/nativesdk-qemu-dev"],"security_vexVersion":"1.0.0","security_impactStatement":"not an issue as per https://bugzilla.redhat.com/show_bug.cgi?id=2223985"},{"type":"security_VexNotAffectedVulnAssessmentRelationship","spdxId":"http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/vex-not-affected/d8e08f3b5ba52157d900f74c2c597ec1","creationInfo":"_:CreationInfo0","extension":[{"type":"https://rdf.openembedded.org/spdx/3.0/id-alias","https://rdf.openembedded.org/spdx/3.0/alias":"http://spdxdocs.org/openembedded-alias/by-doc-hash/b764578eb2b5ec90c38f69485126e6c47def8ffe02e0aefe9acf4d07ace914ad/nativesdk-qemu/UNIHASH/vex-not-affected/d8e08f3b5ba52157d900f74c2c597ec1"}],"from":"http://spdxdocs.org/openembedded-alias/by-doc-hash/0ebbcb18868e98ac21f4d126ee0c18224a419eb99d3824a83343b00be36689e2/nativesdk-qemu/UNIHASH/vulnerability/CVE-2007-0998","relationshipType":"doesNotAffect","to":["http://spdx.org/spdxdocs/nativesdk-qemu-73b50db1-68d9-511b-b396-0360258e2016/cbbbd362096706b85f042745ab16952d6381004d04e8ab847e7271caf06a0842/package/nativesdk-qemu-dev"],"security_vexVersion":"1.0.0","security_impactStatement":"The VNC server can expose host files uder some circumstances. We don't enable it by default.","security_justificationType":"vulnerableCodeNotPresent"}]}