RLBA-2019:3337
perl:5.24 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl
perl-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
e83074c6d1b50c55bc3c15d5da135053bee0f6f3ff53fa0a2d6f1f8fb787a7eb
perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm
a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93
perl-Archive-Tar-2.30-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
284a79810b19a9cc9c3baf11a16a9d6bcf6c8e4d1f13f9384480488f2f718d37
perl-Attribute-Handlers-0.99-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
0636a55550eddff58de3540236644796ab56a39f5fcf67d4a91cd0dcb394fbae
perl-Archive-Zip-1.59-5.module+el8.6.0+882+2fa1e48f.noarch.rpm
e20635f433b25577eacbeb27f98f0ac28fef90437eebbd960658d4a24088c516
perl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
b5b1b87db685204860ad90cc43b8ee94f9cd71824431bd6a81b8363c5e751e33
perl-B-Debug-1.24-3.module+el8.6.0+882+2fa1e48f.noarch.rpm
bd8f4c31ca0f3cabadc5a2e24587956f1ab00aa76333ea37e66a416a9f6d4166
perl-bignum-0.49-3.module+el8.6.0+882+2fa1e48f.noarch.rpm
9190d287b3e7aaa44eb4e779e2bc19a5ecf96f1864d0c9b279c7d8a7c4812357
perl-Carp-1.40-367.module+el8.6.0+882+2fa1e48f.noarch.rpm
dccd9a98c08525485362d24c2486a8ac01dad4b452b16c3324a0d917e71520e7
perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm
69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6
perl-Compress-Raw-Bzip2-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
285386224d4aa4525a133a6a6c4b479a06db450c6a76e2a8f5ed0009abd37dc6
perl-Compress-Raw-Zlib-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
fed8bc594c15c41171ff9ff943c9dde016664afd8b97b19241cb6ce9665fbde6
perl-Config-Perl-V-0.27-3.module+el8.6.0+882+2fa1e48f.noarch.rpm
41f99ce395d4284c7a06f40922d1de971503c243b2f5d018837d443fcb60e4f5
perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500
perl-core-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
d20f7d7462ee2663c847590332337ce4103f31c021c59e4911fc750389ee62e0
perl-CPAN-2.16-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
a96fde87471eb57269591b9b8fd112e7d9978f96d52713de169b37dfc0c2dc9c
perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm
99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94
perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm
37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215
perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67
perl-Data-Dumper-2.161-5.module+el8.6.0+882+2fa1e48f.x86_64.rpm
ff07ac2ea84d231b230395335bf20e610d754b1a4c0c3dacaedd8bb86d91d36c
perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm
401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b
perl-Data-Section-0.200006-9.module+el8.6.0+882+2fa1e48f.noarch.rpm
1bb421e4908d5f52b6f38dea6809d38f1ac8057128d9fc21fe11188451298ac4
perl-DB_File-1.842-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
8bc4d236b809bc1ef3d87c8219c6bf5fd62320104fa54e0298cfc2af9a8b9e85
perl-devel-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
f0b3d906c537e8ada3ce00380d0db5fd2df04fafa02a969d7659f3196b5df7b2
perl-Devel-Peek-1.23-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
bd584a99e03a5acc7bc60c935bc43a8943d2debdb23c63d1c2058e3cb704fc52
perl-Devel-PPPort-3.36-6.module+el8.6.0+882+2fa1e48f.x86_64.rpm
d7269e7ae9af14bd81f9c6e981dcd4b81a07759111ce4705e62cdddf1f80210a
perl-Devel-SelfStubber-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
ef98672b390a5ed26def8de37e81a543eb214ea09770ae98379db5af70b8bc17
perl-Devel-Size-0.81-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm
7f0c0405c0c9a1a9076ea4cead8daedb86a8b06d940f39f0cb48ee943c2de1b7
perl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm
497e2b909674fed7b47c3dfa281121621efded7d05d019363aff9bfad4c1a527
perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm
457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91
perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm
4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3
perl-Encode-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm
10ff1f22fe59a1c62d0215cebe4436d920b31d0135be7ee841d8b977c607f125
perl-Encode-devel-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm
f61f2d035346d60eb831ea5660545fb9051fb1959b1160602adeab91772510ff
perl-encoding-2.19-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm
229ce0ac9b24ddc49cbdcb788fbc64849c999ed1d744b49a405c76499f5a4acb
perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm
843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297
perl-Errno-1.25-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
da0174efbb99d46acb9cc7ecabe0c10c1a5a875af8040c820755de40eed4dcca
perl-experimental-0.019-3.module+el8.6.0+882+2fa1e48f.noarch.rpm
9057e0261573517c85781348b4d2cb8d3a1522980ef1548506d1259993728a26
perl-Exporter-5.72-1001.module+el8.6.0+882+2fa1e48f.noarch.rpm
640f84061e21c1881be61afc0264b2d9f9681d317f58c8a82d33bb0f26e32e9c
perl-ExtUtils-CBuilder-0.280225-367.module+el8.6.0+882+2fa1e48f.noarch.rpm
df0fddc4918eade6922c99d172232f0a89556eaccfdff8bed0b1247b380861fc
perl-ExtUtils-Command-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm
6bcde0c83687dba9c5731ed9addb899d2b102e20c7a48bc0e74db44255064657
perl-ExtUtils-Embed-1.33-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
8ca65427b1b0ef2e3c4ba78a8c62b5ca0256a5732b681e498fff04313ff4ac5d
perl-ExtUtils-Install-2.04-368.module+el8.6.0+882+2fa1e48f.noarch.rpm
b5be07c68ab2d7222f93cb1b4b153e8735c0c7fab052cc58ef40d9fd5834d30b
perl-ExtUtils-MakeMaker-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm
d1439b57adf1a41553d1c4818116fedd7cdb8026caf683ee03dd1bdea0a05a1e
perl-ExtUtils-Manifest-1.70-396.module+el8.6.0+882+2fa1e48f.noarch.rpm
b3b1da48caf33d90c0c386b8dec4848ef8419ea7b78e30c1a4910f16c2ce24c7
perl-ExtUtils-Miniperl-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
17ad27e28b05f97412df3db417462ad1319ed74cbc0d5b00542e8b35b3a55695
perl-ExtUtils-MM-Utils-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm
4a1b1652fe395144d4a6e8879c1b314d7e82a02dadc76367d09501be5a82c386
perl-ExtUtils-ParseXS-3.31-369.module+el8.6.0+882+2fa1e48f.noarch.rpm
514e9ba445971d6e061774f14c67ffe43e36099ece3c6619277a2322ff61e6db
perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm
13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180
perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpm
fc532cf1d81ed8b642813f397665294f4b8e78cbfa9aaff012563de356187cc4
perl-File-HomeDir-1.00-14.module+el8.6.0+882+2fa1e48f.noarch.rpm
fda4476417d93399ec4af2afeec4e9b1fc145b913a01e63e0f2b350e6050cfbe
perl-File-Path-2.12-368.module+el8.6.0+882+2fa1e48f.noarch.rpm
8dfe4ca93128cc7e0bdee3bb4d617db8be88ad57ec68a8465e8cd952722b4cd0
perl-File-Temp-0.230.600-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
00e4e7af6fa79719621397585031e86ec8b6732b2ee66ef694661dd9fb6617f2
perl-File-Which-1.21-4.module+el8.6.0+882+2fa1e48f.noarch.rpm
359a13c2dd09d047216f4221342f03bc931b794ae10ef9fa2f581cdbec9d78af
perl-Filter-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm
da4649b1e9d6198f6cf271a2a12b413213360f8c23195b56cf04c1c46605b767
perl-Filter-Simple-0.92-367.module+el8.6.0+882+2fa1e48f.noarch.rpm
043d08f0ba63f36d37e824045f8d1527543539afcfdd3e76715d4f8692489afc
perl-generators-1.10-10.module+el8.6.0+882+2fa1e48f.noarch.rpm
53ab16cc2a6044d1b17e0c0ecdf61a32fb5a55ac4e0c8a33999300a9af3a81ee
perl-Getopt-Long-2.49.1-3.module+el8.6.0+882+2fa1e48f.noarch.rpm
9b2d450c22271b97710023e5bd6799362b2071600ae3421139aa954315778900
perl-homedir-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
20c3934967025b7449d03f473c126be299bf344a3cb7a89d13e3bc5ba5807ef9
perl-HTTP-Tiny-0.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
26124777a662b13fb7b1bd2c12a0b47af496171934fa72c4e56ecd0f5418196a
perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm
13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be
perl-interpreter-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
aadf024cd62728f0b5d6cf682f154052bb5061e2104ef310edbfe694fad7b9a0
perl-IO-1.36-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
e50d1ac803c655e12334a2819eb42033fdfb4cee41dc7a59c973347a423f6711
perl-IO-Compress-2.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
553ca203f0ff324bc6e32a382669d210fbe6f05151a6fa40b6b5344196675152
perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm
1a865597d7d0da824043c62c50cdd0d3fa02e1f9e1e3420b743a4cffa03d0b4d
perl-IO-Zlib-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
85bbbcab465bd31e491cd9a0fb205ca696fb58569eb78a5319afd1b4745a6a71
perl-IPC-Cmd-0.98-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
14a99731e6faca7f2a4e3771d7968bf2646b349fc4c45788217610b9e2308683
perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpm
0785aa352684de2b27e973a2414cabfd1f60ff94cb9b1c8f1595b8a773d74ecd
perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm
d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524
perl-JSON-PP-2.94000-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
0ab2463181d845a62f04b6985721910f312723fef221e029224182e0478c19c6
perl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm
b721a1d996c4455e7c4973dbe7740cc31e3f6956124c2b3bd9ad8005c98e5f3e
perl-libnetcfg-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
347323fb832698830bcbf389d3e9cbf86ea251b2430cce64bf418b28a9f45cf4
perl-libs-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
53051c9ca3d71fb202526a756dc8d9f240a0cf5b5477be5e3a8102d1ee19bd03
perl-Locale-Codes-3.42-3.module+el8.6.0+882+2fa1e48f.noarch.rpm
3674177ef43bc31a15199981f415d0a64eba50134b84af2bd7835cae3e662975
perl-Locale-Maketext-1.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpm
0bdd201a2fcb9b4df608cd0e0d02d32868f4b8ed373b306f0fe62031713a0f6a
perl-Locale-Maketext-Simple-0.21-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
464ed59f395cff9befc5bb71a535266942390fab93beea98df2678bc6ae40969
perl-local-lib-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
ee01c2a5964360d8c3efae128ea244e7eebeb8809b7a091608e55f9d001ebbaf
perl-macros-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
22489b71c4137851c982c6f9c1217fda53481c70eb8636a1f9a0f45382140372
perl-Math-BigInt-1.9998.11-6.module+el8.6.0+882+2fa1e48f.noarch.rpm
5928a5b278077fd041d2ee403e2c796d7f0b6c0719d75db15a648bdf76a577ce
perl-Math-BigInt-FastCalc-0.500.600-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm
77bfeccfb00e64cdf5142dd9006801f920e846f3b2e568afac2f3c36712bfbab
perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm
3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14
perl-Math-Complex-1.59-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
e72c5badcef6a51d7769b2cb353ac86496cf77a3a37e30f65c576708a5ef6745
perl-Memoize-1.03-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
8ddaeeb2d7a2aecb961c6eefa7bc45ee75e2c2dcb4f599ee9044b77c4469eb7a
perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm
ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3
perl-Module-Build-0.42.24-6.module+el8.6.0+882+2fa1e48f.noarch.rpm
0fc01d5f4ede438c698eddaac008f01a9983aa39e8eb585511a312e1a9c44d47
perl-Module-CoreList-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
3f2b62b4468b39ef7c1cf12d611d7dca112376fdd6130a5db6ac7d1476f0b73e
perl-Module-CoreList-tools-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
df905b45a1a24edb447c3ff41b22ab73d708ac22128e1629df328ac3e60b4427
perl-Module-Load-0.32-396.module+el8.6.0+882+2fa1e48f.noarch.rpm
eae9feee13e8b09cc4bec0529baeb08651b1c0707d974dd9aa9c3c8f4a119301
perl-Module-Load-Conditional-0.68-396.module+el8.6.0+882+2fa1e48f.noarch.rpm
0bc3a979cc4c3892dbbd4373caeba39b6ea3e12a3734118fb20bc1751a25d89b
perl-Module-Loaded-0.08-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
df6478817929681dcf95beaa9bd2da1d6b35dc9728cb24085a96aa1dba10368d
perl-Module-Metadata-1.000033-396.module+el8.6.0+882+2fa1e48f.noarch.rpm
1d53b887d0f64d9bcf8a541c76876100b0886ced233535ac9aea4664cafeafe5
perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm
3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691
perl-Net-Ping-2.43-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
48c19749f3d1a19180378962e2883b4e40f0baf2d2e1ce3ae19c682d0e461952
perl-open-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
7e66f3227759c812a979237952494ca14ff148b8afc2e64a86f6ae404849c6b7
perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm
4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737
perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm
04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf
perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm
658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f
perl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpm
030735bc0b0a45c4329c3cff957df2bc31efcaf85e8a83ac14caaf7590278bbe
perl-PathTools-3.63-368.module+el8.6.0+882+2fa1e48f.x86_64.rpm
2693dc95ae0325e1a3d4a3060f240cd5c33d5b034375fbb20fdd8e5e96e9bfba
perl-perlfaq-5.20180605-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
e8764f56dcd784fca14835ab33e6056f2b4a4c92ef4d7ad9f6e2b7c25c39bd5d
perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpm
9233f630e519b178b9d2554a6567fa54427edb910b2305affe3fd505c3eebdaf
perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm
608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437
perl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpm
e9edbfc3c8c01620a652dd1dabfdaf9aaa6f8b245ffdc98aaa49d59185f5016a
perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm
e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8
perl-Pod-Html-1.22.01-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
e4050c1f33ea491db07baf1974013c96be37dc5efaa9a6be23340da0a51cf5e2
perl-podlators-4.09-4.module+el8.6.0+882+2fa1e48f.noarch.rpm
29b22dc38352b948d730769d4bc38c15d4d1a8d4d969c3c2c4e0c6209399c440
perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5
perl-Pod-Perldoc-3.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpm
bdac88f236f4f4db3eb4c8e71ebdd29d572378b20cbfd077802e86630b657516
perl-Pod-Simple-3.35-396.module+el8.6.0+882+2fa1e48f.noarch.rpm
2488759ef34438ee82b327f160c9539f94aa10cdc19ed411622d4fa9f72beaf2
perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpm
8e0adc72bb11846ec003cf0b3d8a7fda73b819b12cb4cd1f83cb74372e7e1917
perl-Scalar-List-Utils-1.48-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
fc1755cf3306991660dc714ed4428f42d5055e65ff409ebdb9ed01e0451f83c7
perl-SelfLoader-1.23-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
263e65e005eff2a90f456fbe0989a44f48b7cfb8c27fcad1f38a18f3f9b9a825
perl-Socket-2.027-4.module+el8.6.0+882+2fa1e48f.x86_64.rpm
4957d55fb4afbc9b8bfd53e52932fcbc61472182ba93e76e000be9141cdf261d
perl-Software-License-0.103012-5.module+el8.6.0+882+2fa1e48f.noarch.rpm
a4de15d34e598d0d3f877c4396134528358d8d044d1786d5ef9cd5997f45478b
perl-Storable-2.56-369.module+el8.6.0+882+2fa1e48f.x86_64.rpm
b40848f3bfc8f7f78cc797f0d2b9387f6686e1e4bdd543774bc1039d32221718
perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpm
75489ca0ff106abbfe0c4bcae3fed2348adfeba22114e664f4d4f000f43d3f08
perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm
e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7
perl-Sys-Syslog-0.35-398.module+el8.6.0+882+2fa1e48f.x86_64.rpm
aeb828691fd72e80c959c29712d6989e47e7a4ee532113ef5d8af2a4d668493e
perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpm
94c51f36928bb91516b6f64205a2589ac0da63b50f1b2fe2b39b8dd3e89cdb57
perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm
245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253
perl-Test-1.28-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
053d533f0d4a2dcc82a0675168afcdef3de0c819236c0127015c185bc2945da6
perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm
3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc
perl-tests-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
f728f0cd0b1d5e021a6e8d7e6a27c49f2d8a2c900ed7ef44e4afa1537dd4bafd
perl-Test-Simple-1.302086-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
a5b3a0a2ec4099e806960de4795d19e6a75f7323ba8ca18dfc7e90738c7c2fc4
perl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpm
a66f0ac7400eb036108d48bac612d9b6e2f35cb1c252f7f0cb16e7a5f1e062ce
perl-Text-Diff-1.44-4.module+el8.6.0+882+2fa1e48f.noarch.rpm
ca1bf7d5197ada4c75b68880287b665215f1f02b28bbed2dc6b56096abd5e131
perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm
21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d
perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm
bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5
perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm
f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8
perl-Text-Template-1.47-2.module+el8.6.0+882+2fa1e48f.noarch.rpm
33c43f91218da0bab13f9d42ac8d4b047a9a37e430c0060ad40e798a23e1a0de
perl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm
e3e8703e0c6628e7814fe4c7533d995643a929b4fbb931708d6e22729b694f6e
perl-threads-2.21-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm
1e401a335988d10338dd37fc210ca1d6f9b38bca6aa896eafb69c2f8603ae9b1
perl-threads-shared-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm
a3c6831646ca262f9aedaa0ef74d51f7f4ade5e3d62e235582b1cddda68f75bb
perl-Time-HiRes-1.9753-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
d24075c8ff8a0eaf7d28f5a430bfc91d96b7f1875d7ff046bf93a3d263ef775e
perl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm
d7d4e67d3dad8f5cf8721b9842d490a23b2d2db38e107fdb785b5b84045aa8a4
perl-Time-Piece-1.31-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
587332904508887dd5a957a4e1fca0c7b4e52dc8b2218c0a9dc393932442eaf7
perl-Unicode-Collate-1.20-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
6bb30ea26f566eba828e5f687184ce837c8022ed48283249cb18f0ca335c981c
perl-Unicode-Normalize-1.25-1001.module+el8.6.0+882+2fa1e48f.x86_64.rpm
1de5e218c8b65c6fc046e64f0d8bb05a338d949f95ac08a80b186db0e8dd98ad
perl-URI-1.71-7.module+el8.6.0+882+2fa1e48f.noarch.rpm
1929e6de9956a54147a75c3101490f580e7b998c2bb12e15338346aa8d64af12
perl-utils-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpm
8971fb7943ab5fde05ecd601620877b37be8fdd306fed43ca1957206564845c0
perl-version-0.99.24-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
0c78542fc30ceb5037a15225340896dfd25299c82a912dcfc025d9fa1638202b
rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus
perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm
66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4
perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c
perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703
perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm
eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873
perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm
7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a
perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm
e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-YAML
perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm
bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523
RLBA-2019:3522
perl-DBD-SQLite bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-SQLite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
RLSA-2019:3553
Low: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gdk-pixbuf2-devel-2.36.12-5.el8.x86_64.rpm
b8c8dddf847d45a247134741a359ee1bacb5f9ba572049535b170e93aaa535f0
gdk-pixbuf2-modules-2.36.12-5.el8.x86_64.rpm
4214f8cd9b483725dc3fe2413aa4b3d09eb9af33258c25da75aa099c7f2d2b90
gnome-desktop3-3.32.2-1.el8.x86_64.rpm
ff7c272d2f8933f9583907ae692b65a3913d5beca8984b42c653d0b4b7200dcb
gnome-desktop3-devel-3.32.2-1.el8.x86_64.rpm
aedc70d3417a92959036b96aa11ef6789b39e7fd39254469cce07643fb66fcb5
libpurple-2.13.0-5.el8.x86_64.rpm
adf778e01f5416a5dd127aca8da244dde19f30bca81ab690f5e0d4b6e6bbb558
pidgin-2.13.0-5.el8.x86_64.rpm
3884e426334ed867c8a62430e84cb727129b779cac36a5a160cef24189c0d7d9
RLBA-2019:3621
libidn2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libidn2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
idn2-2.2.0-1.el8.x86_64.rpm
1033e6e8663d25b8a67fe1bc623022b9dbe46c3677bdd57ff7479dcb702a478f
libidn2-devel-2.2.0-1.el8.x86_64.rpm
ea3c362189034cf785e27fe49c99adfad0d9ab6ce3b64cca0d1f83ecdf4182a1
RLBA-2019:3634
blktrace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for blktrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
iowatcher-1.2.0-10.el8.x86_64.rpm
0e31b9e5b1600fe8941c67d4afda394165313bf883ee0768e631d4b6bce031d1
RLBA-2019:3667
mtr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mtr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mtr-gtk-0.92-3.el8.x86_64.rpm
faca355f3c563059601dd8095f35d64f15265083e44d83f1fd6422a5113e5f52
RLBA-2020:1759
newt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for newt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
newt-devel-0.52.20-11.el8.x86_64.rpm
d5f84c2c76587117c782bcc6b998816c981f9d7102facebab9febcea01982c89
python3-newt-0.52.20-11.el8.x86_64.rpm
ae6af49eb197e57b1fef79a1ebf0057691e4c62c80abd173dc4392ce787b23ae
RLSA-2020:1766
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
baobab-3.28.0-4.el8.x86_64.rpm
56f8a2293c11e3f19dc2cb0d4ca2dec49a6ef365db7e2962024faedbb6bc3a59
clutter-1.26.2-8.el8.x86_64.rpm
0a20b879448dc466b4b6969e4ea17f96e4260f34f75586dfb3bb4ef311f1eb04
gnome-menus-3.13.3-11.el8.x86_64.rpm
06cbc8d95bf63fee450c6c8368cb9fd644756a71a24abfadeedc40a59a32da94
gnome-tweaks-3.28.1-7.el8.noarch.rpm
71a35489c56519f5a85f06df899d7690c42006e1d2263ae5f7d07cff106600e7
RLSA-2020:4436
Low: gnome-software and fwupd security, bug fix, and enhancement update
The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop.
The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers.
The fwupd packages provide a service that allows session software to update device firmware.
The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2).
Security Fix(es):
* fwupd: Possible bypass in signature verification (CVE-2020-10759)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for appstream-data, libxmlb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop.
The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers.
The fwupd packages provide a service that allows session software to update device firmware.
The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2).
Security Fix(es):
* fwupd: Possible bypass in signature verification (CVE-2020-10759)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
appstream-data-8-20200724.el8.noarch.rpm
2c9a720f54ff898448f86098e789fbb45759d5eef43a9f5550e27ce194baeca0
RLSA-2020:4451
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dleyna-renderer-0.6.0-3.el8.x86_64.rpm
2f9749efc99a8d58051088a6503a0cc20f300275bfd73733af25a7108587b0a8
frei0r-plugins-1.6.1-7.el8.x86_64.rpm
ecd0c1309283d96d8cbfd04092ae07b3fc18f873e531deabad44ecc116dbe33d
frei0r-plugins-opencv-1.6.1-7.el8.x86_64.rpm
4af320468f53f2f48fd47dfb7759901d8bcd03d00c3c231cdb7e7f11f0e082a4
gnome-remote-desktop-0.1.8-3.el8.x86_64.rpm
6895a3d7cc1c05ec83c19af4e9de9542861f0aabf4c81e5c4bb4943c57ea89a7
libsoup-devel-2.62.3-2.el8.x86_64.rpm
be82aed5a0a8ab97cca222b4749954ac549602e571e98fbb2615e98ce6aae810
pipewire0.2-devel-0.2.7-6.el8.x86_64.rpm
c78cbf37db63fc70418f2625e614ed86a97722d745f773fc359538437039e65b
pipewire0.2-libs-0.2.7-6.el8.x86_64.rpm
a4e2934410c2f4b95acbd95e11e13b62886604d616a4df3b7f394ed3105fdffa
pipewire-0.3.6-1.el8.x86_64.rpm
693e54ebbca5683ff27b042d8c41a428e0d7b33fa0790ab1b0a574cb58bf4cc0
pipewire-devel-0.3.6-1.el8.x86_64.rpm
419cd82f2ec598818f9d4671fed3aaae7c7d70c77fa732cb07532f94309f328a
pipewire-doc-0.3.6-1.el8.x86_64.rpm
5fdf2f45560524bf4131d5e97307ae3dc3a57aeed287d9de4789d21e1d6958cb
pipewire-libs-0.3.6-1.el8.x86_64.rpm
f528472a4a2050271a728b61135788b4aa9abe64bf36fbe4eabbb6e40ce1e687
pipewire-utils-0.3.6-1.el8.x86_64.rpm
3fa26eff88f75628c7a3418e414bc1d6a17a268a07087b1f3a0569a8fe1d4583
potrace-1.15-3.el8.x86_64.rpm
4d635d9ca868a260a7ca30e12118d032ae73ea7cf08876d96119fd7731d2be33
python3-gobject-3.28.3-2.el8.x86_64.rpm
dadec73f4be5ca582edcf9d723fd75b27e725b5602f764879a675dbf675716dd
tracker-2.1.5-2.el8.x86_64.rpm
6b3aee540738b212cb7f1b9f4115a3a387d3f79626c6b3b2698d20d13bc83d9a
vte291-0.52.4-2.el8.x86_64.rpm
a25068629ad725d7630d121f24036dc4804b215ae3014e4f224b81e5efd8d2ee
vte-profile-0.52.4-2.el8.x86_64.rpm
b2c7f7eb37729c285c8c7c5902b408241b8cf8b25799e28f2849bb9797234cb5
PackageKit-1.1.12-6.el8.0.2.x86_64.rpm
443bb3ffdb7c33e79a5b8e187cb8a84e60bbac288ac1e01fcaca47fc80096c09
PackageKit-command-not-found-1.1.12-6.el8.0.2.x86_64.rpm
198e466a067517d90a9c2cb6aaeaa448879c7188287b015b2942639872238a21
PackageKit-cron-1.1.12-6.el8.0.2.x86_64.rpm
3068fc76ed2e84514a2a0cf4e3b46d4cec51982130b86620574bdceac6bc08e7
PackageKit-glib-1.1.12-6.el8.0.2.x86_64.rpm
802c4bc3ac43e64a4169ba2208ef40301af21de468efd95c01362c82e768f23f
PackageKit-gstreamer-plugin-1.1.12-6.el8.0.2.x86_64.rpm
3625ed7fbde9cb61d319a0eb8fd18761084fcf4e552d2e8deed1ac387146a410
PackageKit-gtk3-module-1.1.12-6.el8.0.2.x86_64.rpm
165aaa0afa3c75cb66d40c66c9eed8dd7a34744eb1908775aaa5a3e96e56f89b
RLBA-2020:4557
zstd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zstd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
zstd-1.4.4-1.el8.x86_64.rpm
3a5bea3f29f92bd1b4865f129ac8807a20201ccfb7d807b8e6e5a7a77174a2ac
RLEA-2020:4727
new module: perl:5.30
This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl
perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm
a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93
perl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm
4ae5d31a58e084256d22b67d1c4a35c947fb7829b40bea49b2ca54e21bda4908
perl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpm
3b4eaea2d1eaf8d161f48a771f08fac793d30846ad09b36883cce5952ff3ad2a
perl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
b5b1b87db685204860ad90cc43b8ee94f9cd71824431bd6a81b8363c5e751e33
perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm
ba92a2cb502c3000180f08e99fd70b5fe1d867c629fe7f88ae62e884a805992d
perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpm
9f0471053a901dc7d005594d190e10e8c8b2fab6e1e43e8d7962c9abb86b1890
perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm
69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6
perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
ed229dccbc0b92ac2a641e672a1b62281cb7887ad180cf0eb7bf70a72d8190e8
perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
70b3d3861ab9c1695c9bd398d4bd822fed4f52f843ccb34d987b1c72fb6f6190
perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpm
8dac2514b5b2da9f4b0cb4d6e0e5a381eb88a40c888f56643175a0d4e68074d0
perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500
perl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm
a3447e3b3260b007272f8c84ef84acb17cb71d37b7880d1ef6357951ac562315
perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm
22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05
perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm
99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94
perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm
37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215
perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67
perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16
perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm
401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b
perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpm
73ba6e41ae0df4855079b75bbf5b2131a5b0fb3f99f0ea9b91ad8812b5df0b02
perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm
847b4fb0ddf80554f9db4f306d9b404f77ff15198af23e1afe2abf866e91117f
perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
1da6e17c67943d6d69e57ebd15f72bfa43b6015870fdd338c76b117b2be9f67f
perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm
11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f
perl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm
497e2b909674fed7b47c3dfa281121621efded7d05d019363aff9bfad4c1a527
perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm
457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91
perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm
4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3
perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
7acf6021827fa52dc9a1fcebcb239d23d9096de93e0a6132f0fe4fd541f3f1f2
perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
4189d9a4acaa4add86f0991f50f74e444b59afb872b205e444480c428e247eaf
perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
5e8ac50accc1d9281fedfb67c5f38066ac8d9e1237e1d7cc7fbef1e973fb89fb
perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm
843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297
perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm
4e8daf0287ea71e64fdb9e6391f257d9ea6c23547d5894df74a595b3ff610199
perl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm
65b9ba1b7e84507cc648a422475283e27ed53de4097f1ff2121b9f9ff3d97c7e
perl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm
043ff366aad10957c32292d322c3458202d739c703261b8cbfd14f58bb5da151
perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm
f636b21815be2e444fa5b42e99e4328c024327af776bffaebd9d33825d346be7
perl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm
857b4014bddf434d5e21745f92b52a4f046f666cbbdeade6c4043a1b8796e40c
perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm
398bd10b093a537a73d3d0df58d4581b21c67d612279a37b22fd614d23adea17
perl-ExtUtils-Manifest-1.72-438.module+el8.6.0+878+f93dfff7.noarch.rpm
4d1776ec7edef8aa7ef06b53a9ccfe28eb78d28dbac1fcdc0f9826591cff9ba6
perl-ExtUtils-MM-Utils-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm
cca7d27dbc8d3bb0f080aecd8c1f15e5164a9d9087bac91fffb21753ea601f17
perl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm
d8b1feea37aabbfefe537f9b4b886a095d450334b9fb457ceb469a75d53dcd6c
perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm
13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180
perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpm
fc532cf1d81ed8b642813f397665294f4b8e78cbfa9aaff012563de356187cc4
perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpm
995e08ed28513f82e5821425a4d4fc6edc45ee0a783a1f26eacb6359b3f42e11
perl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm
f404d9e30a5f8768ff3926e32b45b0b8334f72e3e92b0e4b25c64e05f727708c
perl-File-Temp-0.230.900-439.module+el8.6.0+878+f93dfff7.noarch.rpm
67bff95e50d168699ea7a9ea2ec030daabd312f2aaa5d945ac34f92266216242
perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpm
5094b53d07808bfd255aa5b9a1315ad01f5d1892624a3381074d552d82ed562d
perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
c8ba40590e844230d1f154071d9e092cb479fa4993a8352a0d9c7b3ed9764e01
perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm
1ff0c6c297133b9629712d61b0751dab739548a09a9ed1a014f89b19e210942c
perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm
37fcc7a1a0384d0d2fed35aa935e2249dc65641c6ed36cfbaffb844dce6ea14a
perl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpm
78bd8b6bb85141daa4c8a4ed9f292276d00dc3d79511de14a028deda013b6f89
perl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm
22f6dae1203f60f7112d8a3bf69f730cca7e92ff26307fa0479297b263a5a853
perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpm
0ee7a2f08d700939b9878147d4a711c27fff146c037bdddd7f4375dfbe632c5d
perl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpm
46aa912995002371271894c952f50b8f1fb45fd4afe94a1a0a12708173c5d73d
perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm
13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be
perl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpm
e1b32c483db01fa644aa11da6316c65ae15c52cdc683702f2724e1bd74c36fc6
perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm
1a865597d7d0da824043c62c50cdd0d3fa02e1f9e1e3420b743a4cffa03d0b4d
perl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm
24140d4b859d7da7b5422b39bb33058cb4ed037ec81a33cb29331d61b8391d36
perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpm
0785aa352684de2b27e973a2414cabfd1f60ff94cb9b1c8f1595b8a773d74ecd
perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm
d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524
perl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm
fcf81923aca881d995501ac6adb0b600d85acbe1e146c92024e96bd92c8adfa1
perl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm
b721a1d996c4455e7c4973dbe7740cc31e3f6956124c2b3bd9ad8005c98e5f3e
perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm
b642ac31df8f05336d101b3607d855839335742ba4b80652bcd4d19fa8c71b2e
perl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm
1bc02c4b987dcdcba510201debe3955a9fb8212874e3d7ee8342cc5b248dceb8
perl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm
d12bc389fea342859c1ce3fa9a6116e31ae66d6225797ed145796ee1d73325d8
perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217
perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm
3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14
perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm
ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3
perl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpm
df5dd4eb3e9897dba7b9d45123b567b21f33f83fe70141c3ed2fa6132d619c82
perl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm
20d8397c0ab7ad88baf463277dd8fc673e094ea05a4adda02fa0f692ff6374c1
perl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm
cc8295684213d6c1f1b9bd7f25a88b9621fce85560e9a719a32121cb3b762361
perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpm
35d8c093f5f2aacfab1e753a4c0c2bcf2736885654ccd881b194eccb8a3490d9
perl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpm
ad836cedbb118144fbb29c1adacf8745b0be196bed0e7c20a7918df0c7632327
perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpm
1d281d8bb79c2f3a7f8e8245faeac9d5381e450515d7e510b4bbf8f9313205e0
perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm
23471694783ed058ce2795ffffb3754ac5f991a18d78b9e6760850e3faef4b79
perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm
3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691
perl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm
2107d6fe2bd4c30f879d05e9e91f3a67b669e9311a7d821bc1eaedc69362ac0e
perl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm
4e7d56c452587e7eda8a6d95f035df77838d724beb89d8300f489bf05c4119c6
perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm
4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737
perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm
04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf
perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm
658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f
perl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpm
030735bc0b0a45c4329c3cff957df2bc31efcaf85e8a83ac14caaf7590278bbe
perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf
perl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpm
68d69421e6ecdd0c17b838ce5cd87e6178e480b859e741d75790a38e001a0e3a
perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpm
9233f630e519b178b9d2554a6567fa54427edb910b2305affe3fd505c3eebdaf
perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm
608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437
perl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpm
e9edbfc3c8c01620a652dd1dabfdaf9aaa6f8b245ffdc98aaa49d59185f5016a
perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm
e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8
perl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpm
f97ad11912e5d33ff4ecd9080ca24d427fbf5d44165f53d663e0affa77f2b01c
perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5
perl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpm
684f8c4f2fad53955dc42f7e46620c817d77f6ada02b3585ed01890bc86ac7e0
perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpm
8e0adc72bb11846ec003cf0b3d8a7fda73b819b12cb4cd1f83cb74372e7e1917
perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
19c9476b75c247420525ff36ad321453c46d0262305cad01bfd0eea652a70093
perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpm
b60d7dc5e566fbe0b9282e1f90b628d86d87f6e7c091290737cddea24d9bdc1b
perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm
f303faa506dc1d7735a1fba64383acc4c4075c37a502e5f3a6793849dd3f50c4
perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpm
b7f894a292d6278b60fb5754d1ed5ad9d199c8f84d140f47dbeb260d6a3eaa35
perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpm
75489ca0ff106abbfe0c4bcae3fed2348adfeba22114e664f4d4f000f43d3f08
perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm
e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7
perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359
perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpm
94c51f36928bb91516b6f64205a2589ac0da63b50f1b2fe2b39b8dd3e89cdb57
perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm
245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253
perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm
77b7f51b21e2373d909905b0d45191814fbb1c8dd9c855a250048f9437944533
perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm
3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc
perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpm
fa90202ab3e84856ac931df1ec5dfe31e4854dae428d3dc1a888e17baeccb30b
perl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpm
a66f0ac7400eb036108d48bac612d9b6e2f35cb1c252f7f0cb16e7a5f1e062ce
perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpm
a6145f9481f9059c301eb1355d0cdd688feebab8d19fc2b2ebcd591737903628
perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm
21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d
perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm
bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5
perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm
f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8
perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm
0ad56d5e6405906910a2efe8448960cdb0b14fe3557e69cf8b59651e75a6abca
perl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm
e3e8703e0c6628e7814fe4c7533d995643a929b4fbb931708d6e22729b694f6e
perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
2e5b2999050f52a5be6078a7024fa2d8696471958b37582c6ae57f869b22b247
perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
e95a1149d05da0bdfc99db4a561b0ffee93dd2d670951b8bf9e9f0bcd867473c
perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
c32bff30e752a3efa107b8a0d0a6758e720770d895c642fbd8434f86f54ef46e
perl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm
d7d4e67d3dad8f5cf8721b9842d490a23b2d2db38e107fdb785b5b84045aa8a4
perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
329b8a55fd6c40d52610e15f55037edc8395d682ed5ceca6611930c6ec0c80fb
perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
641de0fcef19c0f7ab506f797d92584ac6c17d3f1335d5fa6fb0d515c8220612
perl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm
6852a1483a15b008cb44a2881bae6beec4dd4e1e00d6743caf3d1e822e38bfa0
perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm
96805b92a1012403138db9d46d761fcafc05517684b5ff73a5ccfbf75edb0d59
rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus
perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm
66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4
perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c
perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703
perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm
eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873
perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm
7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a
perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm
e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-YAML
perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm
bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523
RLEA-2020:4767
perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus
perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm
e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c
rocky-linux-8-x86-64-appstream-rpms__perl-YAML
perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm
bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523
RLEA-2020:4802
perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus
perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm
e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c
rocky-linux-8-x86-64-appstream-rpms__perl-YAML
perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm
bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523
RLSA-2021:1586
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
atkmm-2.24.2-7.el8.x86_64.rpm
b04306a0fbc6f392a135fa1923e314ee71148dd95394002cb9278d2cf35040be
cairomm-1.12.0-8.el8.x86_64.rpm
f87200fc6c9098a97e7000b991c9d9b55665c936adf071461e857da01b6b74c3
chrome-gnome-shell-10.1-7.el8.x86_64.rpm
d0c4998aaddb8c3b81afc3826beb1b1e046a0767269163fecbe4bb7e209ef64d
dleyna-core-0.6.0-3.el8.x86_64.rpm
8061d05aa41fc9d4379e9882c88fe0d7081d8a18b3bcc3c928614261aa3b3cf7
dleyna-server-0.6.0-3.el8.x86_64.rpm
da0bab305997b9906a2357a21e93c7f5bb7cd0334a55b0a537d60491a150113a
enchant2-2.2.3-3.el8.x86_64.rpm
85cd0e04908d96550e8e132a527695d74d85113baa3ebb07847801a06a646554
geoclue2-2.5.5-2.el8.x86_64.rpm
74c8c4eee50054f5f23588b01d6486d847555ffade12edee2422223b9543b101
geoclue2-demos-2.5.5-2.el8.x86_64.rpm
9ccc5a181d474a2681fc432a1b8dffcf57a3f03485f9f702337da7ad5135e089
geoclue2-libs-2.5.5-2.el8.x86_64.rpm
8e9470a09160870f9d81a3f3a63f4ac445970737779a3c05f08af39fab2f89dc
geocode-glib-3.26.0-3.el8.x86_64.rpm
a2e669a2b25bfed174353e7921009a37f044f5d4db70248414a05d728205f242
geocode-glib-devel-3.26.0-3.el8.x86_64.rpm
1f0f79da8cd8327846386294463ce07a7fecd6fb4aa0b17bf8cb2585d7399dd4
gjs-1.56.2-5.el8.x86_64.rpm
f2a3b03056695cd41cae4b0d078ad602c7b0478af1df7dcfce54b99b01517480
glibmm24-2.56.0-2.el8.x86_64.rpm
75d1f9cc2d4c44096a680f2f2922177cde0cbb3124b337ab13ec48a73aa859f1
gnome-photos-3.28.1-4.el8.x86_64.rpm
7c19b9128c3f6031cc1c96e50aa0f16ebd9e0108f52342e2259c56496875db0f
gnome-photos-tests-3.28.1-4.el8.x86_64.rpm
ca37177d2e0689a5d6652ae7a39f4baba08c61e8f7d77b45cf2f8fedb5581055
gnome-terminal-3.28.3-3.el8.x86_64.rpm
dd27a423551804084221da7392ac0128cfd64447b1147140a83bbe5d8780d2f9
gnome-terminal-nautilus-3.28.3-3.el8.x86_64.rpm
285192366764466557fc62eab78f3de9a4462c2b166572ada7060510de416cf2
gtk2-2.24.32-5.el8.x86_64.rpm
babbb096fbe18354be01a584983de5d2c26d69f318ee964c48850b9dbbb1b1ff
gtk2-devel-2.24.32-5.el8.x86_64.rpm
33f6d0a0e7a5edf62e556cc364580a4e3e01d970f8e9d5f7cc4f3cb02bc8497c
gtk2-devel-docs-2.24.32-5.el8.x86_64.rpm
68284375144a790dad399ac3abd677d59349c854fa20760690e5618807376293
gtk2-immodules-2.24.32-5.el8.x86_64.rpm
df0d38789261a7af178f3b8914ec84cb0abc2c393372d4674320dd7d86431ac6
gtk2-immodule-xim-2.24.32-5.el8.x86_64.rpm
3c5dc65defe122704e59969bc2fbb7b17202f6e637c349669d367ff117b86fe6
gtkmm24-2.24.5-6.el8.x86_64.rpm
362aa1bf60d328749b4765fadd1febf5e43e36edf21e8ea03d90a0b6a38b1182
gtkmm30-3.22.2-3.el8.x86_64.rpm
871356ba2f4cc9a426dd1429a748237a8ab4c0b32ce61d0f1b22fb39500e0e24
libdazzle-3.28.5-2.el8.x86_64.rpm
6da46d51e00482965cf6bba9ac1f4cc1aa89a61ba645d343d273dcdece579971
libepubgen-0.1.0-3.el8.x86_64.rpm
4955abb3033684450018aac873107bb4e9e62a8e2835ce4e5b6cafa75f59dcbd
libsigc++20-2.10.0-6.el8.x86_64.rpm
8f1c1f4b47c7fac19f15cc3815077b0677a1fb2c2cd1e7d5631370cf28ab07bd
libvisual-0.4.0-25.el8.x86_64.rpm
770b1865cb2580cdf75ee48ba979fb912bc4a48fb2fd8af2d69f554d923a2c85
OpenEXR-libs-2.2.0-12.el8.x86_64.rpm
35f0d3fb2d52c671f9a86824a4d524d53a29d16e5437852eb12cfc10bc69f47a
pangomm-2.40.1-6.el8.x86_64.rpm
0fb7b384cfe916c06b91f28b6abe87e16822b150af8a8bd096007a104d698b5c
soundtouch-2.0.0-3.el8.x86_64.rpm
8f2d071970bdb85bcf2fc23f0d9fb7c327ab2f3aca90ea16159ad3a405fe8b8c
woff2-1.0.2-5.el8.x86_64.rpm
c4a5f23fe56dbbd6b222b45b19fa6b1e0728a4d5d2e7c9af366cdd609481be2e
gnome-boxes-3.36.5-8.el8.rocky.0.1.x86_64.rpm
c9b9679109843e21773525b39e990d4d6cee077d89c79cc31d8bb53a10b14af4
RLBA-2021:1591
libxslt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libxslt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxslt-devel-1.1.32-6.el8.x86_64.rpm
b370f997b6f3aad5205c0a37e646e8a5356adaea60e125bc1af7a4a73347e6fc
RLBA-2021:1612
avahi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
avahi-ui-gtk3-0.7-20.el8.x86_64.rpm
ccf168c311e9d313b7b68399b583f1f4ae322744ab63e76c923e6b846d8e19d6
RLBA-2021:1619
efi-rpm-macros bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for efi-rpm-macros.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
efi-srpm-macros-3-3.el8.noarch.rpm
be93fbe5d15a6af78df7e5441fa6c0a13ef4d4ca73431cd7a8e49c691aa3442a
RLBA-2021:1681
vhostmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for vhostmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
vhostmd-1.1-5.el8.x86_64.rpm
003e5c788d60a86ba8f5a61d9f8baeda9f80c03ce584c50c316e7322e2bdd333
RLBA-2021:1687
dejavu-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dejavu-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dejavu-lgc-sans-fonts-2.35-7.el8.noarch.rpm
fb84cf5353f07a8ab165754d6c92b019a12bc879457165766e30dc960b338c83
RLSA-2021:1702
Moderate: brotli security update
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for brotli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
brotli-devel-1.0.6-3.el8.x86_64.rpm
d512ea0ff25f717bb9e8c779990e2ed42751637be036c574cc56c324b62b8dd2
python3-brotli-1.0.6-3.el8.x86_64.rpm
4ea1dcb3f2f40a6dab1c067a811163f1a07143e54a8e473c40c213c1cb8cf19e
RLBA-2021:3594
libdb bug fix and enhancement update
The libdb packages provide the Berkeley Database, an embedded database
supporting both traditional and client/server applications.
Bug Fix(es) and Enhancement(s):
* [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100%
(BZ#2001972)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libdb packages provide the Berkeley Database, an embedded database
supporting both traditional and client/server applications.
Bug Fix(es) and Enhancement(s):
* [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100%
(BZ#2001972)
rocky-linux-8-x86-64-appstream-rpms
libdb-devel-5.3.28-42.el8_4.x86_64.rpm
4038cac5a947df780f43ad543f735f1c0307a106ae02b1ac518fba0349d5bdc9
RLBA-2021:4353
lm_sensors bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lm_sensors.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lm_sensors-sensord-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
6fe3b62dd82076b44d2d79404bf82e491136151bd16c837331b3eb0df01fa795
RLSA-2021:4381
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-autoar-0.2.3-2.el8.x86_64.rpm
ec104b742f1ee24ed3b790f8bcf2e9c3624d835c37d4f046226737569af9c0b5
gnome-calculator-3.28.2-2.el8.x86_64.rpm
bfc480d1f9e922cdeebbd6056672a2a349776204c6be7a6240a5eea1a623de39
gnome-online-accounts-3.28.2-3.el8.x86_64.rpm
128fe18ab8bfd55fcf3d048764c08baa784e475c43e05bee007663ed65266f64
gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpm
2424a681b21ec3cc257eb8117d833e143b766ced3bb3f0d80fc6580ebe78b52d
gnome-software-3.36.1-10.el8.x86_64.rpm
2a9f077aa8113e2a4c4c3788d5258918fd7aaa4a97a3b5696d604e849fd23c5d
gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm
440c33ca267b2f26215df09174ce6574a2bb5113fe6d7c740eba3f1133c93af8
LibRaw-0.19.5-3.el8.x86_64.rpm
df151c39f20ea9815d46aff810e74f2c837a34fb755909c23d2e159714999d90
vino-3.22.0-11.el8.x86_64.rpm
3ba0c279a775b11f29b6dbeb5daa462d4bbe721a3bc0f541dcaa8b0c25555ec1
gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm
12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94
RLEA-2021:4405
libmodulemd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmodulemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-libmodulemd-2.13.0-1.el8.x86_64.rpm
261911bd0c62a94982ee44638a391b2a47f18434e2b5371ea8c76a5b0ed4bdb2
RLBA-2021:4412
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mvapich2-2.3.6-1.el8.x86_64.rpm
dd351b8868ff7bc80fae9dae488eaa189dc9c7f6eb396d4e79d210376ff9bf6b
mvapich2-devel-2.3.6-1.el8.x86_64.rpm
0c0305bbe23485eb35b434972dac29fbf0eee28f6cf4b726fd6bb9c34c46612e
mvapich2-doc-2.3.6-1.el8.noarch.rpm
9aaca96ccd26080a515d39ee7b7dd5ed0bbd699c05ebdd970ab8a94e4008c188
mvapich2-psm2-2.3.6-1.el8.x86_64.rpm
825a16773f805807387cf6b32d8cac59df358d8d44fd6f312a9c78aae72eb3a7
mvapich2-psm2-devel-2.3.6-1.el8.x86_64.rpm
3526d362751e05cfb2f706200a3b03012ac93d07562a638d34f87fb6468ef04d
qperf-0.4.11-2.el8.x86_64.rpm
8e2a2d8a488101682d7495de161c2083b8fb3f12ef9828c7fb4c12324df5c7cc
rpm-mpi-hooks-8-2.el8.noarch.rpm
4a022972f93d34ec9ce71ae06cd75a345fc2cfd6cd6c145eb39b7e39e8b05e85
RLBA-2021:4442
lshw bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lshw.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lshw-gui-B.02.19.2-6.el8.x86_64.rpm
e8bad6055146ad48980556830eaceb61a86e42c3b36955ccac1f2e4fbd8a287c
RLSA-2021:4451
Moderate: gnutls and nettle security, bug fix, and enhancement update
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)
Security Fix(es):
* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)
* gnutls: Use after free in client key_share extension (CVE-2021-20231)
* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nettle, gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)
Security Fix(es):
* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)
* gnutls: Use after free in client key_share extension (CVE-2021-20231)
* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nettle-devel-3.4.1-7.el8.x86_64.rpm
e139494f5eaa94ff5410adc22013d4c5b3888d875e78089bb1c3a35be09c2933
RLEA-2021:4488
hwloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
hwloc-gui-2.2.0-3.el8.x86_64.rpm
27e4f5230cad7b62e5ce72e640fbae7afd9c48d35b72bc3e0e94084ceca508b0
hwloc-plugins-2.2.0-3.el8.x86_64.rpm
18903b95ff7ea05265d1fcf969c3dfde7a1191f277bdce76ad93925c6ffb9ce1
RLBA-2021:4501
emacs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for emacs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
emacs-26.1-7.el8.x86_64.rpm
78f6e6a1910c95a773be74c70dce446bf600cd63cf289b56547447085b7eaa53
emacs-common-26.1-7.el8.x86_64.rpm
9c89bc8eb9a0cfe9f514a9100c41cd602d12f928497ad6e810b29a84587d7d7a
emacs-lucid-26.1-7.el8.x86_64.rpm
f689279f4d76738af86a78b6e546214a695034ea695edabba93c53d4f9b24592
emacs-nox-26.1-7.el8.x86_64.rpm
a30a83b2f2aea300c30dc0cd3d5fbed857699495fca57cdb57209e84cb8886b7
emacs-terminal-26.1-7.el8.noarch.rpm
e2e3fd63ab15f4edf00ab4a77ee73deb0fe6888c2defe538678ed766729d2c42
RLSA-2021:4510
Low: lua security update
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for lua.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lua-5.3.4-12.el8.x86_64.rpm
49a648c94ed0da6494fd0e3b518c5c2e7d08f0f888b7de85f22f6577e4bccecb
RLBA-2021:4516
usermode bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for usermode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
usermode-gtk-1.113-2.el8.x86_64.rpm
050b67bd0709281a9191f8e9be7b6849456c6d0bdcd06951ce44090e2aa686cb
RLSA-2022:0658
Important: cyrus-sasl security update
The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols.
Security Fix(es):
* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for cyrus-sasl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols.
Security Fix(es):
* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
cyrus-sasl-sql-2.1.27-6.el8_5.x86_64.rpm
66fcc6223022b9410b104521f3eddc569f87487b818bd807a28a0feff071b741
RLEA-2022:1954
perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus
perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm
66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4
perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c
perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703
perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm
eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873
perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm
7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a
perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm
e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c
rocky-linux-8-x86-64-appstream-rpms__perl
perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm
22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-DBI
perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm
e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-YAML
perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm
bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523
RLEA-2022:1956
perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus
perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm
66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4
perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c
perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703
perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm
eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873
perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm
7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a
perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm
e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c
rocky-linux-8-x86-64-appstream-rpms__perl
perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm
22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-DBI
perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm
e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-YAML
perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm
bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523
RLEA-2022:2014
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mpich-3.4.2-1.el8.x86_64.rpm
74148fa6cc16f87b94559df63f245c2a028481b343e0ff625cb7065bc1dc2b80
mpich-devel-3.4.2-1.el8.x86_64.rpm
4bc763f8f86364ff81a5973199876e168cc9dbe0d36cfcc53c68baccd623c492
mpich-doc-3.4.2-1.el8.noarch.rpm
785f500c25e4018f095172a3c27bebc89dc8e5d0289b3e77f82f69412dbed17d
mpitests-mpich-5.8-1.el8.x86_64.rpm
d0714e70449d9184851da372b81afb64dd1d73b5fd01fc558eb260f3df0ba756
mpitests-mvapich2-5.8-1.el8.x86_64.rpm
bb8e7188cd01962e4e666416accabb8cc8cfde090ade2e3ffbfa4f9c9f885988
mpitests-mvapich2-psm2-5.8-1.el8.x86_64.rpm
7530a1544a8c5c220c7d4241216eed9507f270f46d4b5d5e5f09ce4fb5af6541
mpitests-openmpi-5.8-1.el8.x86_64.rpm
93e0650f54ef76aeb8fd9d533661c9ff699f6ad106c176fe56ff0e4e6d01d043
openmpi-4.1.1-3.el8.x86_64.rpm
e7af704f8d835ca6f51c90949305ecb44501c84337b1370a7829eaf1920e4f0a
openmpi-devel-4.1.1-3.el8.x86_64.rpm
22c66b5c2b99405d401d82a2d9f4bef3510964a36f5db51af4e10bcf3d107a64
pmix-2.2.5-1.el8.x86_64.rpm
52a6205c21965646bed592eb3d3bd2a87e15d3ce4891f4802ded71cb14a277cc
RLBA-2022:2023
net-snmp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
net-snmp-5.8-25.el8.x86_64.rpm
ad38b78a6c4715dab4f8426336d833075bf2ab0bd0ba552047020432da88ac74
net-snmp-agent-libs-5.8-25.el8.x86_64.rpm
bdc3346d124753f657fcbd61969966bc3062a70bb05071378bd56bd30ec6a84f
net-snmp-devel-5.8-25.el8.x86_64.rpm
8913a90a7e732bf28f2abcaf3861708bd4191691278b13e1388b469ffce39b42
net-snmp-perl-5.8-25.el8.x86_64.rpm
91b0132109c0ff1363158041fba5d5f248c91b99b0fe497940bdca04a48be150
net-snmp-utils-5.8-25.el8.x86_64.rpm
371193495c7e5caf863d812317dad5a133f49a919c2a09df9d13a8e963011ce6
RLBA-2022:2027
json-c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for json-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
json-c-devel-0.13.1-3.el8.x86_64.rpm
4486495d3b2d376b0571c35f1830566455e0678698c6dd475e449b99d38f53c8
RLEA-2022:2029
libseccomp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libseccomp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libseccomp-devel-2.5.2-1.el8.x86_64.rpm
6bea64b05e30226d2db6ed7221e8c7c0cef4165cd07a72c0435a00c0e9b8b81d
RLEA-2022:1869
new module: perl:5.32
This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl
perl-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
7cbe324defaaf158029c8bb85417396a131c0562ba68f15912cf6caba39ee383
perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm
a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93
perl-Archive-Tar-2.38-3.module+el8.6.0+879+823e3012.noarch.rpm
896f84217933fb9a1911087752ad7ce902692834a7f81ecd56a4398c257d8568
perl-Archive-Zip-1.68-3.module+el8.6.0+879+823e3012.noarch.rpm
0f0f6f60858417d44fcad3e03f74afd274ff40a01e8c09a22bb60e7c7b23528f
perl-Attribute-Handlers-1.01-471.module+el8.6.0+879+823e3012.noarch.rpm
cc69147359fd01e984e9f0b7f1fd57b6c3af33351c1f0e76c70e51e558742784
perl-autodie-2.34-1.module+el8.6.0+879+823e3012.noarch.rpm
91a1b226f91006b0ebc5918e12786feb3c381e1950372d21cc6883b6b6806d0f
perl-AutoLoader-5.74-471.module+el8.6.0+879+823e3012.noarch.rpm
84a78350d8c8da6478e9e0094084a2e034ac6cc0bff0596162d97b4576f54d3b
perl-AutoSplit-5.74-471.module+el8.6.0+879+823e3012.noarch.rpm
b508bb6e554d8d9ff38a882a93e738ae308aed39dbda2ac9d5d841a423e1bfb4
perl-autouse-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm
6f75d27406d5b3a1b63d39f0e5e2418292b507d737a52abf0b89afd33b24c135
perl-B-1.80-471.module+el8.6.0+879+823e3012.x86_64.rpm
3fca367721228806c0535072913fc5da50b6146cf6c3fdf23488abf7f48afd23
perl-base-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm
c6a793847ad5c6fe6d21886cb9904514ee014e30ca492d8ed15c18598d2bd473
perl-Benchmark-1.23-471.module+el8.6.0+879+823e3012.noarch.rpm
a6c81a824472718a9198558a0687ab69db6862c738c927e118c6e45f1f4f8e36
perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm
ba92a2cb502c3000180f08e99fd70b5fe1d867c629fe7f88ae62e884a805992d
perl-blib-1.07-471.module+el8.6.0+879+823e3012.noarch.rpm
a716d8647407047b09d14beee6f214e4ee69b74d9116a0098b529ea931413321
perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpm
9f0471053a901dc7d005594d190e10e8c8b2fab6e1e43e8d7962c9abb86b1890
perl-Class-Struct-0.66-471.module+el8.6.0+879+823e3012.noarch.rpm
4eafc5acc7cb511c424861388d5f194496055cdf049e93972994560a7336da20
perl-Compress-Bzip2-2.28-2.module+el8.6.0+879+823e3012.x86_64.rpm
45cb6b8ae71c45500be114d6512fab9cefe7922454e574573c69a6d6df255285
perl-Compress-Raw-Bzip2-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm
26b44886c1ecc20b683eaa0d86e61c0e21007111a78fcadb8e8fa1c0dad9866b
perl-Compress-Raw-Lzma-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm
87107b833c9c8adeceddd6218a9af0cf5da0c4e3ce4b8ae46252548a5fd12aa2
perl-Compress-Raw-Zlib-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm
0a950bf8d5334642a3b3aca7ec0e8068af88efa404c283e6814cf645f06b7011
perl-Config-Extensions-0.03-471.module+el8.6.0+879+823e3012.noarch.rpm
10a6e54bd41bec4d64444794368e65fcae0a815e1c46ac16df2d429605a4398a
perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpm
8dac2514b5b2da9f4b0cb4d6e0e5a381eb88a40c888f56643175a0d4e68074d0
perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500
perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm
11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f
perl-CPAN-2.28-5.module+el8.6.0+879+823e3012.noarch.rpm
76808568b4b4172edfd6333435186bf4c13a99d791df3c203b08838d263b9363
perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm
22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05
perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm
99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94
perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm
37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215
perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67
perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16
perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm
401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b
perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpm
73ba6e41ae0df4855079b75bbf5b2131a5b0fb3f99f0ea9b91ad8812b5df0b02
perl-DB_File-1.855-1.module+el8.6.0+879+823e3012.x86_64.rpm
294048e1443911d2c7fcbbe3957f8a40c992ba094174731a0af80b6fea60067c
perl-DBM_Filter-0.06-471.module+el8.6.0+879+823e3012.noarch.rpm
348f6ebd9008c5c43add4cf5414a5507b2b8fccc52b223a8a63f172171f06379
perl-debugger-1.56-471.module+el8.6.0+879+823e3012.noarch.rpm
418c8ef9746af37f5efd28733d8170cf0149145101f129af40d69d3b41aa00c0
perl-deprecate-0.04-471.module+el8.6.0+879+823e3012.noarch.rpm
f51735ec38fd9bf505928fc67e352a0f953d0ab07a3c2e3e17b070c07599e9d7
perl-devel-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
a0a14581d495ad3aa604f136657b00b5e07e01f9a31430180ae996750851129a
perl-Devel-Peek-1.28-471.module+el8.6.0+879+823e3012.x86_64.rpm
76702e124b8837aedb53a200606bd97531fddd70a479d523652f4b5c4eeca3df
perl-Devel-PPPort-3.62-1.module+el8.6.0+879+823e3012.x86_64.rpm
eed2c853112750b1147a0318e8021dac109449701971f8a2fb0fdfb59a7bbe27
perl-Devel-SelfStubber-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm
e22f51e48176a831edd9a927e323164bc8618a5dd95bd9ff16284eaafeeff7e8
perl-diagnostics-1.37-471.module+el8.6.0+879+823e3012.noarch.rpm
f1e7e8876bf518814158e6226ca5689d62aaa70d5ea2bf7480fde79e1a812573
perl-Digest-1.20-1.module+el8.6.0+879+823e3012.noarch.rpm
054f0b929f4291d597147ae000c3849fe5609243f724a30ca4ae58ece1936c7a
perl-Digest-MD5-2.58-1.module+el8.6.0+879+823e3012.x86_64.rpm
8b3bea86b235d1cdcb0d28912e7201458f04994558c6516adb8b52d141e5bbca
perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm
4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3
perl-DirHandle-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm
c6ee20a81e7bfc9ec89a2aefab9f8b74ae9d339ce1e2802d7f9584ff8b926af8
perl-doc-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm
49178342c4ec2682002c7312f5b95cc9d1190dccd40132ea4d45ae0f97ddcc98
perl-Dumpvalue-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm
5d76a0f039c461e9d72ce162188488f43829dda3fc4ffad9e7b3066f70bff5c0
perl-DynaLoader-1.47-471.module+el8.6.0+879+823e3012.x86_64.rpm
cffb954b308ff49275e64194b68e33cbb3da9deb92bd27b40a803d63b90d45e8
perl-Encode-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm
77253b724ff748e21fa428d8f4bb5c67bdf52705f7c53b07ce812513e55f91ee
perl-Encode-devel-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm
8a265047be5f34848b19cb882a8fd3ad39c11ee8cd53bca3632633c9b8b5392e
perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm
85d5b8dca8c11735fe4bb387756c332e49af51227cf76cce4ae44bae6a8641e0
perl-encoding-3.00-461.module+el8.6.0+879+823e3012.x86_64.rpm
f03d602b657d6686a6e5e9881babc4686eb5f902b469c44d86c8583c4371209a
perl-encoding-warnings-0.13-471.module+el8.6.0+879+823e3012.noarch.rpm
64c4fc68f3055231b42198628030f3eb35bce6925937afec70cb8ef742b059cd
perl-English-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm
0bf7dbe90229ba650801a73951c9f7dabb1f93f745c69c10d244617b24ec596f
perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm
843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297
perl-Errno-1.30-471.module+el8.6.0+879+823e3012.x86_64.rpm
76658c7a3779fd65500ab4f9c6f6b203481d8bad79e2f5a10fd288046a53e22b
perl-experimental-0.025-1.module+el8.6.0+879+823e3012.noarch.rpm
1555a407b267cc6961b4a836488b8857e96faf10570d36d00efeee1b9d1bf0fd
perl-Exporter-5.74-458.module+el8.6.0+879+823e3012.noarch.rpm
e42ec395bd22562922325052ceaccf8aba76cab83bf75efa674282ec0be84312
perl-ExtUtils-CBuilder-0.280236-1.module+el8.6.0+879+823e3012.noarch.rpm
1bb0da4c8be0ca3f8a39f80f00b6e481a4a04350be1fff0c93cbd9e80f184ee9
perl-ExtUtils-Command-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm
cfbdcdf18c92f3191c5e755c36991b89d7bbaa9406c03b32162e3ab6d3993f43
perl-ExtUtils-Constant-0.25-471.module+el8.6.0+879+823e3012.noarch.rpm
cdfe69802b3790de366257454e341b8aff534bb220f46077917f8846269f62d1
perl-ExtUtils-Embed-1.35-471.module+el8.6.0+879+823e3012.noarch.rpm
d8c27fda2d5764245ebd0484d5c3b3872f0c757d632841d401ffbc02e2ab4f8d
perl-ExtUtils-Install-2.20-1.module+el8.6.0+879+823e3012.noarch.rpm
fc5be11468e3fccc2a11d2de9121a6cdd6df69205ca5494391da4385ec119563
perl-ExtUtils-MakeMaker-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm
3c150eda89de5b4eb449318b79c0943e143c1b6e0332a8d05eac98afa6052314
perl-ExtUtils-Manifest-1.73-1.module+el8.6.0+879+823e3012.noarch.rpm
cbc7809caf4d53a1596e607b072e1280b86f8f8c61674bef764916490dc6906c
perl-ExtUtils-Miniperl-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm
81e895a84c42621ec5223c35358f73ad023af2536932076b0f9e551442f5e14e
perl-ExtUtils-MM-Utils-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm
cefed0569fcb3467aa060fe8ed4afd30715c0ae724ce44a4e60ba939f72354f7
perl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm
d8b1feea37aabbfefe537f9b4b886a095d450334b9fb457ceb469a75d53dcd6c
perl-Fcntl-1.13-471.module+el8.6.0+879+823e3012.x86_64.rpm
b13ed0199de86c0afa7cb56b07fe89968febe4bd713514dcd8f0d1926a0d9b61
perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm
13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180
perl-fields-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm
b3bcc175fa8264d466885d81e1719ed5507b3ebf7110d50ead611ff6f1fb7bfc
perl-File-Basename-2.85-471.module+el8.6.0+879+823e3012.noarch.rpm
a797d34356e7273efedb3109544f0ec6372498e0faee26f269196de0da6f2b3e
perl-FileCache-1.10-471.module+el8.6.0+879+823e3012.noarch.rpm
05d65b299e9b9e5f3cc3121c33c102ccb988512d183799f9d8443e30157520fc
perl-File-Compare-1.100.600-471.module+el8.6.0+879+823e3012.noarch.rpm
261019cdcc5442317525d4485702f38c6970a23fb5eb91e21a00b9aef1b51971
perl-File-Copy-2.34-471.module+el8.6.0+879+823e3012.noarch.rpm
ae39110ad6194729ae242bcd0ee73f40540a5a7dd419addd6c71c1cf662a4407
perl-File-DosGlob-1.12-471.module+el8.6.0+879+823e3012.x86_64.rpm
e1ff76d84cbc0debbbb36d08abe8ba711e2e162bb46abd049e2768aa08f4905c
perl-File-Fetch-1.00-1.module+el8.6.0+879+823e3012.noarch.rpm
a19b297b723dae8f070e6747f43243135103f21e8b7d8d7553310e1ac1f96d8e
perl-File-Find-1.37-471.module+el8.6.0+879+823e3012.noarch.rpm
511e8ccb46054fa69d53e80bd671c65284526b9f4eafcd322ec38e976b16698a
perl-FileHandle-2.03-471.module+el8.6.0+879+823e3012.noarch.rpm
371527cfd57f724e8f7d976b02243c713ddcb7998fd1591031195b84ace3c526
perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpm
995e08ed28513f82e5821425a4d4fc6edc45ee0a783a1f26eacb6359b3f42e11
perl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm
f404d9e30a5f8768ff3926e32b45b0b8334f72e3e92b0e4b25c64e05f727708c
perl-File-stat-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm
ceb6a060ae984f2efece2712dc9d1cb1fc14a2aacaefef858c780ce234e969c1
perl-File-Temp-0.231.100-1.module+el8.6.0+879+823e3012.noarch.rpm
fca98aeecb539f5f2553808ce3bc203a8740a01ef0663149256d024bc13823cc
perl-filetest-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm
8564ef1f84399cfbc09d27d6567a5dd5996f47cfdf2384a58a1c5191a8eae071
perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpm
5094b53d07808bfd255aa5b9a1315ad01f5d1892624a3381074d552d82ed562d
perl-Filter-1.60-1.module+el8.6.0+879+823e3012.x86_64.rpm
26ad0484430812ddabc5f1998e2c262481b7116b396d68669c2b8465d11d6c54
perl-Filter-Simple-0.96-457.module+el8.6.0+879+823e3012.noarch.rpm
6d8cb469ec7e7529d67609f167434c267aefb6d153c98733d6a446086d68bb0f
perl-FindBin-1.51-471.module+el8.6.0+879+823e3012.noarch.rpm
56d14f944a7fcf10ea8ed5579038d32088058e32ab5182135afacdd246685634
perl-GDBM_File-1.18-471.module+el8.6.0+879+823e3012.x86_64.rpm
256a011b9c3d1714752273382e297e474e8b39caf3e9de390f1612eb0006762e
perl-generators-1.13-1.module+el8.6.0+879+823e3012.noarch.rpm
d29e5ee3480ccf6127f8e2334cc6492d37fd979a629a314c83387753d227be09
perl-Getopt-Long-2.52-1.module+el8.6.0+879+823e3012.noarch.rpm
5090d47b718450f95444543eaca7222ba73e43d2837b592c56f5c983355e2fcf
perl-Getopt-Std-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm
c385e938af9008822ea9e471a00a055cd2a6208b4855c2b7647fe234c04f55d9
perl-Hash-Util-0.23-471.module+el8.6.0+879+823e3012.x86_64.rpm
7a82010f9481e8348bc8f4d3420a4b36b6603388325bb039ba977724ad5cf627
perl-Hash-Util-FieldHash-1.20-471.module+el8.6.0+879+823e3012.x86_64.rpm
b61d92583075cb764edcd00571874a66ad6b8604b34c062acac7f18e0ec459b4
perl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm
22f6dae1203f60f7112d8a3bf69f730cca7e92ff26307fa0479297b263a5a853
perl-HTTP-Tiny-0.078-1.module+el8.6.0+879+823e3012.noarch.rpm
5f65138b4d1d4d31ec4ef9d4ea3ef8a59eef998f0480ea0dec2dbf644b63ae57
perl-I18N-Collate-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm
ddb8549326f4c53d3e63ebadb3bd15006b623554ee919c3aefe61bd9d69dc9b2
perl-I18N-Langinfo-0.19-471.module+el8.6.0+879+823e3012.x86_64.rpm
2623e457fc54df6cdf59e7cb367600debfb9e9dd4ed80c9c1168afca8907e3ab
perl-I18N-LangTags-0.44-471.module+el8.6.0+879+823e3012.noarch.rpm
39548593db24c273c66016fb982e7982326f3494a17553d011567f4db7b188fd
perl-if-0.60.800-471.module+el8.6.0+879+823e3012.noarch.rpm
b5af25267734d759f7bfe75dd79437be719dbbf828dd356ab2f13648fc0f046a
perl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpm
46aa912995002371271894c952f50b8f1fb45fd4afe94a1a0a12708173c5d73d
perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm
13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be
perl-interpreter-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
4624784fafbb106fa3c2ede801be0a3ab3287d8dd65e8b86e5322b9956a953ee
perl-IO-1.43-471.module+el8.6.0+879+823e3012.x86_64.rpm
d88ffbb0fb6a54b382944fd9b4f64cec99cfa3dcb25bffd44d8c53e9c9938085
perl-IO-Compress-2.096-1.module+el8.6.0+879+823e3012.noarch.rpm
05418030256a705280d58c0e7a44134e578593acc935342159ee8b4339a8bb57
perl-IO-Compress-Lzma-2.096-1.module+el8.6.0+879+823e3012.noarch.rpm
343d36d9129f80e8a302644b6eb13ef5b97f2066b5ab06e268ca6553100d97c2
perl-IO-Socket-IP-0.41-2.module+el8.6.0+879+823e3012.noarch.rpm
82c29b5fbc0a72d196b990b51c051b0fd4c733d024f1b8cd646dfb9ea98f0e5e
perl-IO-Zlib-1.10-471.module+el8.6.0+879+823e3012.noarch.rpm
023590025fb11cc0eb9d6205e5ff24b371ff751c8e1e8b39ef4049d1807692c0
perl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm
24140d4b859d7da7b5422b39bb33058cb4ed037ec81a33cb29331d61b8391d36
perl-IPC-Open3-1.21-471.module+el8.6.0+879+823e3012.noarch.rpm
a0f7e9bccac2bfd7f926690a876853388c61c46f9bee71ee77dd63dc04ab4610
perl-IPC-System-Simple-1.30-3.module+el8.6.0+879+823e3012.noarch.rpm
351f74beab3545664c924ad1c77b4640a278dd7e4e7429def448839b66a3880e
perl-IPC-SysV-2.09-1.module+el8.6.0+879+823e3012.x86_64.rpm
b50105e5a0de165d0d60f55df6a89a56adde83f940977893ee6d2d4fd3b19b41
perl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm
fcf81923aca881d995501ac6adb0b600d85acbe1e146c92024e96bd92c8adfa1
perl-less-0.03-471.module+el8.6.0+879+823e3012.noarch.rpm
e1557f0a82c4bd76df1a36ea09c4b2208264606b14ebe7fb490b68f6f6e47dac
perl-lib-0.65-471.module+el8.6.0+879+823e3012.x86_64.rpm
4bc4e1fc0465b77d6f1458a5bf2929b3af9d7b6ee094966a08f60501c873c801
perl-libnet-3.13-1.module+el8.6.0+879+823e3012.noarch.rpm
d06402fd430d3442bfba5a8d8c5a82038d3db5ac31ac5b0e464eb8ad78d756c6
perl-libnetcfg-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm
d97bca5e252435f16cb6fde3433756b503a5e1f4b64cb2882b4eb802aba6e29e
perl-libs-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
2c72efd56a0c43f88b948f2baa76d8967cdd727e28eea76520e748bb889fa448
perl-locale-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm
34eebbec86c2085e4659691f3138bbac03e164da2fa0178610cc19d48464dc10
perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm
b642ac31df8f05336d101b3607d855839335742ba4b80652bcd4d19fa8c71b2e
perl-Locale-Maketext-Simple-0.21-471.module+el8.6.0+879+823e3012.noarch.rpm
b80618e4f4845f86e83404fc38505cd233f225df9adf7b123747f19f67b08203
perl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm
1bc02c4b987dcdcba510201debe3955a9fb8212874e3d7ee8342cc5b248dceb8
perl-macros-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm
b9b653274abf61f37d7e7e71ddec801dd21eb8720899da487981c39b1df181dc
perl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm
d12bc389fea342859c1ce3fa9a6116e31ae66d6225797ed145796ee1d73325d8
perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217
perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm
3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14
perl-Math-Complex-1.59-471.module+el8.6.0+879+823e3012.noarch.rpm
6afdeae53c444f636af1d353715b9e87d143502cf01f6fe4ebf21d55964efa5a
perl-Memoize-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm
e640b0075b3b18645576b21b2b94122eb6356596edec3d9735883df6e0d6b036
perl-meta-notation-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm
f8d9fcba8446cfe4269dde3e5aa29c1346db382ba89414c193f9c1c1639d14e0
perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm
ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3
perl-Module-Build-0.42.31-5.module+el8.6.0+879+823e3012.noarch.rpm
f8d22bd91df7e742342d514b89fd5bbf1210bda859a600e23267b5087a361696
perl-Module-CoreList-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpm
7d6c1bdb41c206e5b62df1652fd1627fced6df877244ad48ada69faa84ca496c
perl-Module-CoreList-tools-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpm
f16595a91826bc713cf1b3699a9f76b4cbec2c994f0214a07c4824db64170d77
perl-Module-Load-0.36-1.module+el8.6.0+879+823e3012.noarch.rpm
15c2aa6d684ac14cb382c3969cfb118abfc38744bb8543d35ad9017e759adbf1
perl-Module-Load-Conditional-0.74-1.module+el8.6.0+879+823e3012.noarch.rpm
2227be4711dc435a31aaed4b5f1cfc3a646025912e8c74aafa1f7d971134f6c8
perl-Module-Loaded-0.08-471.module+el8.6.0+879+823e3012.noarch.rpm
234b1102675736344a4e0bd6cfad9f73f37771a3b9e73c48c6ee7f0c36aef802
perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm
23471694783ed058ce2795ffffb3754ac5f991a18d78b9e6760850e3faef4b79
perl-mro-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm
866fc141c8bcc8aab318c0c4455b6615b17b0ea8a09d68dc8f1aa5fea05fa79d
perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm
3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691
perl-NDBM_File-1.15-471.module+el8.6.0+879+823e3012.x86_64.rpm
0f3c32d42439f2aa209820ddd83fbb58fc8f69ddc1547c211dd10fdef981d7e9
perl-Net-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm
cd5856fd6f47a143c5c60916504482e3798b06c54421870119f441a5fd0f2a4d
perl-Net-Ping-2.72-471.module+el8.6.0+879+823e3012.noarch.rpm
d738802084565dab57fab502d0975c5d483fbaf7a348d64075c11c6622a971a1
perl-NEXT-0.67-471.module+el8.6.0+879+823e3012.noarch.rpm
a44972702c8e4ddf7f4a18cfc7ff52385f1dee67e3df11f9d16e0e449353954d
perl-Object-HashBase-0.009-4.module+el8.6.0+879+823e3012.noarch.rpm
5bf571fb3b59b5580204b90a299cd8b647215bae2bf17cff6332289ca31c00db
perl-Object-HashBase-tools-0.009-4.module+el8.6.0+879+823e3012.noarch.rpm
c35b94f76b882d2b5a55ad03d3726a9726ddc541eecf8b2eda38ac4bf7cf7d6c
perl-ODBM_File-1.16-471.module+el8.6.0+879+823e3012.x86_64.rpm
a5dc7f814ed12d914d2fdf89cf69337225d723522c430e58964541d63907e076
perl-Opcode-1.48-471.module+el8.6.0+879+823e3012.x86_64.rpm
68fb12de43afe023752218b8f161dd9d1cea74734108b1c50358f6528cfbe999
perl-open-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm
8fd5bb3e31b79691129dbbbdca582e3090393d4ea59874610b6319b2a20b6d0c
perl-overload-1.31-471.module+el8.6.0+879+823e3012.noarch.rpm
56a29401904d3c7c9948d7f020b81beec209dbb1007daf4b7d0efeca028549a9
perl-overloading-0.02-471.module+el8.6.0+879+823e3012.noarch.rpm
6a85f75028ac3bcd321e3a362f16a5aa6f9707ac0531e4b9d7879c4497347c8f
perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm
4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737
perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf
perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm
04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf
perl-Params-Util-1.102-2.module+el8.6.0+879+823e3012.x86_64.rpm
1619c60e20f21d259c619d3e4140efe4ab69e095a33ea26e5a6114fa2efa5bb8
perl-parent-0.238-457.module+el8.6.0+879+823e3012.noarch.rpm
246f2b9cf71c9ab37e60447253c7bc23bb90e394a09471c13ad513863cb4b1d2
perl-perlfaq-5.20210520-1.module+el8.6.0+879+823e3012.noarch.rpm
628f7642581468e6dcdadf1f23fd561deb8472e2962a5bf8451236e21f1762a4
perl-PerlIO-via-QuotedPrint-0.09-1.module+el8.6.0+879+823e3012.noarch.rpm
1f151cd4482a00b5c96dfffcb6bc340ef12218d63db6347c426feb154585cc60
perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm
608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437
perl-ph-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
071c53fc3b1508ea0794c71615a8a105b02d194653b3f4fabdd3c45871a7807c
perl-Pod-Checker-1.74-1.module+el8.6.0+879+823e3012.noarch.rpm
978c1a649e6dab3bbac23f87c6dbd967f157ca43b9eab4a2f943480f506414bb
perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm
e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8
perl-Pod-Functions-1.13-471.module+el8.6.0+879+823e3012.noarch.rpm
13006d948d6a40dc78e9042d186528286fbb2b06e01239b8a140494291f30175
perl-Pod-Html-1.25-471.module+el8.6.0+879+823e3012.noarch.rpm
727afd865cc869ac175501107278a34bb09dc06f334f8c6981c226dd43878c3f
perl-podlators-4.14-457.module+el8.6.0+879+823e3012.noarch.rpm
801c287bd1847de60e53e057f36994f48477983773c1f5559faa303651acd9fa
perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5
perl-Pod-Perldoc-3.28.01-443.module+el8.6.0+879+823e3012.noarch.rpm
a0f8f74314bf2558c2294c10bbae789bcca2477c8f06fdd9fd3dfd6b89519a8f
perl-Pod-Simple-3.42-1.module+el8.6.0+879+823e3012.noarch.rpm
e146ad799d75b5bc4ef12223d1dbb0c1ab3571ba6dd8b6a35425ed064a679b96
perl-Pod-Usage-2.01-1.module+el8.6.0+879+823e3012.noarch.rpm
f6fe843a228687f99d59ac574fa274c4c69c97e3e3a359c9113e94a3b18ddd54
perl-POSIX-1.94-471.module+el8.6.0+879+823e3012.x86_64.rpm
ad0bfffeb0f0371d2449ef8b63e0e96481b4d14217ed73fbb6f2f7ba8bbe3b7f
perl-Safe-2.41-471.module+el8.6.0+879+823e3012.noarch.rpm
6b1e3f5e918c5d0403947dd664f95c805de54dcb9549c864ba3a3a54aea10f92
perl-Scalar-List-Utils-1.55-457.module+el8.6.0+879+823e3012.x86_64.rpm
834d2180a77a193a02d3eb6ea02c76e87b89cbbeae8d246fcb8e1eae50891f3c
perl-Search-Dict-1.07-471.module+el8.6.0+879+823e3012.noarch.rpm
d64ba76cb75f264755f708d56d6f9221718a0b26a33601e5bd2e1e76c8db57e1
perl-SelectSaver-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm
6c0d785dab43b86be4465e8c1cf2218565fde7338b479e9e1df8e61728006970
perl-SelfLoader-1.26-471.module+el8.6.0+879+823e3012.noarch.rpm
d9b165a64386b8743a80285fecf71fbfc182f4e264a60fd93d07618725b6472c
perl-sigtrap-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm
3ea359b960bb85b474ee7d87a1d9e381f14e15bb4f01a101a1984f25f31de13f
perl-Socket-2.031-1.module+el8.6.0+879+823e3012.x86_64.rpm
b784bd497c1513d31623f76cfcdbcf7190d2501f1929d2dff53ada8a2bfd60c7
perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm
f303faa506dc1d7735a1fba64383acc4c4075c37a502e5f3a6793849dd3f50c4
perl-sort-2.04-471.module+el8.6.0+879+823e3012.noarch.rpm
b8c97d9ce8146ffff05a7e6de6e37cf4bcc3874663addeebc3e84c66521053af
perl-Storable-3.21-457.module+el8.6.0+879+823e3012.x86_64.rpm
e66945a1abd7ed97d71e9f176facb28f76f70e85cb7586af58414ecb080fb0a5
perl-Sub-Exporter-0.987-17.module+el8.6.0+879+823e3012.noarch.rpm
87013bce0917524587738fe6db264ebe2fca53bb042673d9d2865a267046c3f1
perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm
e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7
perl-subs-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm
c154fc9f9df0ecd16a600eba0a3a720543878c26f7be70fc4805362bed3142df
perl-Symbol-1.08-471.module+el8.6.0+879+823e3012.noarch.rpm
d6d8b699f51f9de47e5410330493ee4aafee37f894f4e9ca6d8df35bdd6585c9
perl-Sys-Hostname-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm
b3aebb55c9c25f8ab97d6957108e80ad2c2998ce1dc69dc5cdebf3e6eabb71b5
perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359
perl-Term-ANSIColor-5.01-458.module+el8.6.0+879+823e3012.noarch.rpm
567fd6cc0d686ea74e81200b960c825839cbdaf834cf2e40e2eea5d011eb9054
perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm
245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253
perl-Term-Complete-1.403-471.module+el8.6.0+879+823e3012.noarch.rpm
12cccb3cdcf19038d5dbfbf0f0d09ca461341842696b4daa9bec331a466fc041
perl-Term-ReadLine-1.17-471.module+el8.6.0+879+823e3012.noarch.rpm
373cac615872c1af5f6ca02a882bb150b5ad5c680257b86076443157463b0ce6
perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm
77b7f51b21e2373d909905b0d45191814fbb1c8dd9c855a250048f9437944533
perl-Test-1.31-471.module+el8.6.0+879+823e3012.noarch.rpm
491106e63923a68bc208d8ac4281ababe8d801c869a7590061ccdcb1efe9d93c
perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm
3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc
perl-Test-Simple-1.302181-2.module+el8.6.0+879+823e3012.noarch.rpm
dbb742a892e6dc1dcc16ee5b91c459c331ee720aa5ad1a0c6a5d3d682037122d
perl-Text-Abbrev-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm
c205e14663d76b9d00c6209c660a64a5ee997cc600cfd7693841b32dcb0ef38e
perl-Text-Balanced-2.04-1.module+el8.6.0+879+823e3012.noarch.rpm
74e1307d9f4ac5e6855a7b9cfc7be52c146bf2460fe3f0286ed4a0e83bac4cec
perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpm
a6145f9481f9059c301eb1355d0cdd688feebab8d19fc2b2ebcd591737903628
perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm
21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d
perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm
bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5
perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm
f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8
perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm
0ad56d5e6405906910a2efe8448960cdb0b14fe3557e69cf8b59651e75a6abca
perl-Thread-3.05-471.module+el8.6.0+879+823e3012.noarch.rpm
3dc885f24e1cfc994e854b3bff76c5eea91f4ece1502c945cb9da005d4bb4db4
perl-Thread-Queue-3.14-457.module+el8.6.0+879+823e3012.noarch.rpm
74c32c60d87d1fd0746e3607df03ff1a8f2a7e93b2510375fa2e64c483aebd28
perl-threads-2.25-457.module+el8.6.0+879+823e3012.x86_64.rpm
f0478b6cb7f9e5493a8c7d233a817484589962f6164334f6813a306d2e52a9a7
perl-Thread-Semaphore-2.13-471.module+el8.6.0+879+823e3012.noarch.rpm
1564920e001ac5edeb382e7195849fedd8981ea011aa4c17d842c1ee140681f8
perl-threads-shared-1.61-457.module+el8.6.0+879+823e3012.x86_64.rpm
a3c7d91fb51aa3a9ec804723d69b05cb86288e78ced03ac361521aa3f76624a7
perl-Tie-4.6-471.module+el8.6.0+879+823e3012.noarch.rpm
6c25d1a7dd605049d5fe4f1504b4539cd57d976716bfe0f61e7ee3226f475f9e
perl-Tie-File-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm
3942379ac44b5238773a2f01ff12230b5883d41147efcf0e67ec8d40848539af
perl-Tie-Memoize-1.1-471.module+el8.6.0+879+823e3012.noarch.rpm
bcb5ed9b4a09202bb78f4e6cf9b2101d6e1221e63fff35eb9ac6f634a9d8d840
perl-Tie-RefHash-1.39-471.module+el8.6.0+879+823e3012.noarch.rpm
a2d31cf0bc263635ac976f8c69e3012de4770e2b35d2b1407153f9edf046ee2e
perl-Time-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm
e8e3ee9f23ae9a591471ad8da34d1625093cafecc5319ab419b30d936d3d19dc
perl-Time-HiRes-1.9764-459.module+el8.6.0+879+823e3012.x86_64.rpm
2a2d4011516f4a020d24de2d2706513be6f04b8608954a84d2a2f71d7b8a59d7
perl-Time-Local-1.300-4.module+el8.6.0+879+823e3012.noarch.rpm
48049d3cd87b9332801907c518df9bb4ee8e9f0cb20c2f18cf9cfe1ac794adac
perl-Time-Piece-1.3401-471.module+el8.6.0+879+823e3012.x86_64.rpm
fc5ea636309c25ade4a9ce4be19732b102da1ce61a4e4b910a9192f35b79b867
perl-Unicode-Collate-1.29-1.module+el8.6.0+879+823e3012.x86_64.rpm
819e4e179ecf1b3b45beb9755217e03e5219f1c0e4aa808a7bd27d0495070697
perl-Unicode-Normalize-1.27-458.module+el8.6.0+879+823e3012.x86_64.rpm
5696de7c803145cae3ecd568451295cda3c8b9d4949f9991702f8e1aed5fff18
perl-Unicode-UCD-0.75-471.module+el8.6.0+879+823e3012.noarch.rpm
2cd8f639f68d91b50850daa0e008220bfb0e5e626df322be161c425a1df794ce
perl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm
6852a1483a15b008cb44a2881bae6beec4dd4e1e00d6743caf3d1e822e38bfa0
perl-User-pwent-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm
a295ea0d908e6fc919a33297756dba92bce9530192fb5da087ec5ff707744dfe
perl-utils-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm
ccbd6a719d269e2ebed04ff4b72d49e6ebdc0b36cc25a821803a91147362e8fc
perl-vars-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm
7b47dd1b248f8c7c77211a907fb8cc4786d227de025d43ff933faafeb78c348c
perl-version-0.99.29-1.module+el8.6.0+879+823e3012.x86_64.rpm
22908f36f713a9de7e1bad7bc3233b722dff2557f49d067ad93bb5d66b43a02f
perl-vmsish-1.04-471.module+el8.6.0+879+823e3012.noarch.rpm
7d33e6dd54f850575efe826fe6779d7fe9108f2e28d5e1d5def2640fcc83a814
rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus
perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm
66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4
perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c
perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703
perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm
eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873
perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm
7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a
perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm
e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c
rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl
perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm
4f838ceea3cf5dfefffdebe0181ef879213ea9c143a6d77859b8f97d37d7f2a2
perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpm
6f8ac7791b06c47866c5e688dacaef16d8bbc56e760e71ace7610b12fa6b1da1
perl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpm
3aaec32b508f40a97b7274018a707339b6a5877493b84f55769a47d84fbb7a5f
perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm
b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b
perl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpm
6f41b83ba68e184bda30ef525a7600673733aa444c2713bffb572eb691818b2d
perl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpm
39a934c51411a833c333671b2a7df180f1c9d0ef251889a8c1e9d48701cee459
perl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpm
9862723272cc2aba25739dc251961e0cbd90be7e3b3eb9a0eaf79c1b8504f080
perl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpm
0d9b36f3c0e80cadb8b5282c1b3be01f6501e2b1d95e80e84d9fb3b24a6f7e52
perl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm
9a1c248fb9f94b77b6b5afa60bef8e145057c8d1031957e09bfd42e188e17309
perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm
321334e0883dd66f5c7b6aa86ea601e5a1a831dd0950032128ac3909032bc343
perl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpm
7f33a736a361b53262ce8cbd273f26b8debe23f4f3fb0a1817d4c519ca2471c6
perl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm
3416b0bcbd18b2b38276c15376eb1560dace73dc40c613e5434a4b956ddf52bf
perl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm
e6121208c088b4a8c6d95d89aeee50c265ca21c7cd35ec9fde3ffc087fecdf49
perl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm
c350bea5407e56eb42eda4cbc77895da0ad65ae5ce23e08543fc3cfe56939793
perl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm
bf26ed1f8417e1a76d8bc96d609e74c2c8af22c5e3194b1c7d5dbb1fa7bdd911
perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpm
c0a260b0aaddebf1df80c0b98ea0f24abc32b2f7711f67c4982559dd19b98d7a
perl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm
47f5249f76519dc5d16c9dd6d74d51ba1c62ca0937e544395f9e67b10cf2f3cd
perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpm
1d87ab90226348884ea3741f614e33782a9176a71227f7d14c6fbc2aa69c35b9
perl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpm
4cb2c5f159200cb752acaca0293501f413bae3e4fc0a2263b633f847b5ab3d7d
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-DBI
perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm
e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL
perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm
66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd
perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpm
e5aef8c6bbdd4a6de57484cce458f522a95163174acbbc8eda2dfa4f705aabf4
rocky-linux-8-x86-64-appstream-rpms__perl-YAML
perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm
bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523
RLEA-2022:1955
perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus
perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm
66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4
perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c
perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm
43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703
perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm
eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873
perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm
7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a
perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm
e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c
rocky-linux-8-x86-64-appstream-rpms__perl
perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm
22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05
perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm
85d5b8dca8c11735fe4bb387756c332e49af51227cf76cce4ae44bae6a8641e0
rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl
perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm
4f838ceea3cf5dfefffdebe0181ef879213ea9c143a6d77859b8f97d37d7f2a2
perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpm
6f8ac7791b06c47866c5e688dacaef16d8bbc56e760e71ace7610b12fa6b1da1
perl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpm
3aaec32b508f40a97b7274018a707339b6a5877493b84f55769a47d84fbb7a5f
perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm
b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b
perl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpm
6f41b83ba68e184bda30ef525a7600673733aa444c2713bffb572eb691818b2d
perl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpm
39a934c51411a833c333671b2a7df180f1c9d0ef251889a8c1e9d48701cee459
perl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpm
9862723272cc2aba25739dc251961e0cbd90be7e3b3eb9a0eaf79c1b8504f080
perl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpm
0d9b36f3c0e80cadb8b5282c1b3be01f6501e2b1d95e80e84d9fb3b24a6f7e52
perl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm
9a1c248fb9f94b77b6b5afa60bef8e145057c8d1031957e09bfd42e188e17309
perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm
321334e0883dd66f5c7b6aa86ea601e5a1a831dd0950032128ac3909032bc343
perl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpm
7f33a736a361b53262ce8cbd273f26b8debe23f4f3fb0a1817d4c519ca2471c6
perl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm
3416b0bcbd18b2b38276c15376eb1560dace73dc40c613e5434a4b956ddf52bf
perl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm
e6121208c088b4a8c6d95d89aeee50c265ca21c7cd35ec9fde3ffc087fecdf49
perl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm
c350bea5407e56eb42eda4cbc77895da0ad65ae5ce23e08543fc3cfe56939793
perl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm
bf26ed1f8417e1a76d8bc96d609e74c2c8af22c5e3194b1c7d5dbb1fa7bdd911
perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpm
c0a260b0aaddebf1df80c0b98ea0f24abc32b2f7711f67c4982559dd19b98d7a
perl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm
47f5249f76519dc5d16c9dd6d74d51ba1c62ca0937e544395f9e67b10cf2f3cd
perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpm
1d87ab90226348884ea3741f614e33782a9176a71227f7d14c6fbc2aa69c35b9
perl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpm
4cb2c5f159200cb752acaca0293501f413bae3e4fc0a2263b633f847b5ab3d7d
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-DBI
perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm
e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL
perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm
66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd
perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpm
e5aef8c6bbdd4a6de57484cce458f522a95163174acbbc8eda2dfa4f705aabf4
rocky-linux-8-x86-64-appstream-rpms__perl-YAML
perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm
bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523
RLBA-2022:1999
trace-cmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for trace-cmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
kernelshark-2.7-10.el8.x86_64.rpm
e28b68cf43f4d1c02ab2a79c4323b7cd47289064f3e0036785f08d09925bec02
RLBA-2022:2018
perl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
perl-5.26.3-421.el8.x86_64.rpm
de27f706ec48d1157ea764e5e00b210769f25773b79ada5edc315add5a410cc2
perl-Attribute-Handlers-0.99-421.el8.noarch.rpm
c67e0e8f12e7b46b4d8a3705f0c3ce7b4b01307508b747a3d2ca514f697e9398
perl-devel-5.26.3-421.el8.x86_64.rpm
7e84a978e37a73520535dce1fd70aa2db75274b0339e6e0e13383a4814660292
perl-Devel-Peek-1.26-421.el8.x86_64.rpm
5f8937a9d898a252a7ac81d9c52cef2840e4c63dd6452c1f52002b84a1d0a764
perl-Devel-SelfStubber-1.06-421.el8.noarch.rpm
986d78a6c8d9b4ce0698c4d6ea5d66531eacededb54a97f8a8141bc8230fcc89
perl-ExtUtils-Embed-1.34-421.el8.noarch.rpm
677553fb9495d08b815a7044a6347440e7b632b8e9bc38a0b748c8638e9fd0c5
perl-ExtUtils-Miniperl-1.06-421.el8.noarch.rpm
f8a43f89f59de3ad61ac2edc52e907b0ac94646c4b49856b89ae5a53ff73507f
perl-libnetcfg-5.26.3-421.el8.noarch.rpm
84dc8411cf86bbc8c6afc4ad5059a399b59bffc3d6dc674c8cb5964ba94669f2
perl-Locale-Maketext-Simple-0.21-421.el8.noarch.rpm
fd32ddc20e534ba3efddfe29e742948a8c50fea177ad1d017a13d18f9c812a4d
perl-Memoize-1.03-421.el8.noarch.rpm
c4aecb1934ca89c82001a151bbfeff4a02fadf1c2283e782db864da4fb170e81
perl-Module-Loaded-0.08-421.el8.noarch.rpm
b467bb47db2fa4d717ed1f989f7a7d7bccdf8d9ddb52143f310c2483e1a7326e
perl-Net-Ping-2.55-421.el8.noarch.rpm
2306c5ea5766ff7683707bae5690371c8f522f84f52e0b17e133632cfd0b2017
perl-open-1.11-421.el8.noarch.rpm
82ed6426b0d0907e3a969c6587ee354731a04f9fd82493b8b51265700f949e60
perl-Pod-Html-1.22.02-421.el8.noarch.rpm
b6a508328e8fe486c3863ea2b2e623034b454998e3bea8d038b9f0daaee4e933
perl-SelfLoader-1.23-421.el8.noarch.rpm
04b2901653f194db99e55d4a50a4faca5d925638809eca595fb321155f9d0f1c
perl-Test-1.30-421.el8.noarch.rpm
2983dfb3fc40d8d795174749ac3d0d7039e2e5ac9f4213ce041b235f8b7de4c6
perl-tests-5.26.3-421.el8.x86_64.rpm
07f7486385c9e9cfb78b7ccc40cd13bfc78054671398a882d19236eec1e9bee4
perl-Time-Piece-1.31-421.el8.x86_64.rpm
18005c88512126fa7401c38a030b01a053ef2c7bda411aaafcc4d4ef2e66a99c
perl-utils-5.26.3-421.el8.noarch.rpm
7768fb10a59c0e2a7be504351e22ea85fbec0d6ce9e748ab5aa572165643b0fd
RLSA-2022:2031
Low: libssh security, bug fix, and enhancement update
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651)
Security Fix(es):
* libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651)
Security Fix(es):
* libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libssh-devel-0.9.6-3.el8.x86_64.rpm
7cb2b675798815b1a1bf842d17c69edf8dfc941ece898b2d471e235161e0cccc
RLBA-2022:2061
jansson bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jansson.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jansson-devel-2.14-1.el8.x86_64.rpm
35b0b0591cbe5cddaf91736f2d564e332cdf3332321e88c020eebb9ac5d20053
RLBA-2022:2063
firewalld bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
firewall-applet-0.9.3-13.el8.noarch.rpm
9b5d2c6936e1205d6c1451ce75981469aa8c442fc9c1a3e3a21da3099cb737eb
firewall-config-0.9.3-13.el8.noarch.rpm
b34f79b0b9751e662540afee7e53397f7a2b4c3f7be89befbb7580b497fb3472
RLBA-2022:2079
setools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
setools-4.3.0-3.el8.x86_64.rpm
92e03aafb9f6d19f1725d8ee7cc9f0f61be095ef701a093ce0dad91809314afc
setools-console-analyses-4.3.0-3.el8.x86_64.rpm
21696c7309cba8e7e944a8cc8c7d73ec33dd729f1b00467eba2c754176eb6132
setools-gui-4.3.0-3.el8.x86_64.rpm
12f3002986a110dd30f171b09700f9ab4427dda79355903c09d830fc3b0d6446
RLBA-2022:2091
postfix bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for postfix.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
postfix-cdb-3.5.8-4.el8.x86_64.rpm
63e360386cb151bf0a338d57a3e52cf4bc3eed8372013fb802e70a9b0c7504f5
postfix-ldap-3.5.8-4.el8.x86_64.rpm
10b1d1dba27b6cb581629867dee9bbaec38b6e795d071165898782f6cae741da
postfix-mysql-3.5.8-4.el8.x86_64.rpm
5486249aaeb70a5d9aa2f11e6b10fdc8a6cf31e5a208baa06d1beda213601306
postfix-pcre-3.5.8-4.el8.x86_64.rpm
6a00c9e929bf2c21d174ebd36d666db74a4625c0398817a107b712f7b76d19e2
postfix-perl-scripts-3.5.8-4.el8.x86_64.rpm
977cba0e36d8bcef037636fe5fd9302f7396f029efe3dd501551695e3d5d5863
postfix-pgsql-3.5.8-4.el8.x86_64.rpm
ac275db2c2062f885ce5ce04d6f80171e41a654b8f51bb8970d21c7a87a369d0
postfix-sqlite-3.5.8-4.el8.x86_64.rpm
11433addb8f58c2f4c0169e995941ae25e7a02406013239b5deee3abbe2b1bf5
RLBA-2022:2097
cryptsetup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cryptsetup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cryptsetup-devel-2.3.7-2.el8.x86_64.rpm
b5e72ac21ea1b38f767fa1ebb0598d0d69418f86eb274f8ab0b47d28808cbb0c
RLBA-2022:2099
sysfsutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sysfsutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sysfsutils-2.1.0-25.el8.x86_64.rpm
d6e32caf879b2d8d4f33f1257ab6a2d391d5d1d9db2e29329471eda80d0adf9d
RLBA-2022:2117
gpgme bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpgme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qgpgme-1.13.1-11.el8.x86_64.rpm
25d6f8ccd77cf48a02d86239ef91981a7f93a3395adea817cdee2d296996d9a3
RLSA-2022:5813
Moderate: vim security update
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
vim-common-8.0.1763-19.el8_6.4.x86_64.rpm
58fb2fd64740f3dddd0465d725779b9a92382096a451b38a3d13e598fb537a65
vim-enhanced-8.0.1763-19.el8_6.4.x86_64.rpm
555bf2c9cb7a631f91195a2c477713668210b2dfcb82c5dc5258fe411bfb7e4c
vim-filesystem-8.0.1763-19.el8_6.4.noarch.rpm
37b57ef90a9d794c1f1ef30ca31a1a26a8651d05b752f582dc91f3112a8fb124
vim-X11-8.0.1763-19.el8_6.4.x86_64.rpm
138b57307d0b6d219d4739841ec0d118256c885f6357c4052400276513f5dc63
RLSA-2022:7105
Moderate: gnutls security update
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
gnutls-c++-3.6.16-5.el8_6.x86_64.rpm
57818cdd7188acbf57263517b2a9e81d7d283bb0e0e87c280c58d831933c9ad4
gnutls-dane-3.6.16-5.el8_6.x86_64.rpm
1738781e0a92c8c890bf53efc9ee95b8055d9ad51ea408e5f0e4d22d6dce3643
gnutls-devel-3.6.16-5.el8_6.x86_64.rpm
ee433690b3583469d732499e6419ae573fe88152d0417def1fc4814ce35dcc54
gnutls-utils-3.6.16-5.el8_6.x86_64.rpm
6a0485d3cc9fa5cb3c26e88cd5a1affb2b377a1c599ad886be3aa58fe9fe957d
RLSA-2022:7108
Moderate: sqlite security update
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Out of bounds access during table rename (CVE-2020-35527)
* sqlite: Null pointer derreference in src/select.c (CVE-2020-35525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Out of bounds access during table rename (CVE-2020-35527)
* sqlite: Null pointer derreference in src/select.c (CVE-2020-35525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
lemon-3.26.0-16.el8_6.x86_64.rpm
7378a4f1edf1a34321ee4e735db4302fdc3c780cc7df9fe235f263ee50817ca6
RLBA-2022:7115
rpm bug fix and enhancement update
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523)
rocky-linux-8-x86-64-appstream-rpms
rpm-build-4.14.3-24.el8_7.x86_64.rpm
677b722768bb6fbb4b9479ffad9cb7f69aaaa06718686d75d66dd87a8081f0f5
rpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpm
321b320ea3f4f0e28d68daf77bd6f004329e48700273b0f6138519ccd7474e6e
RLBA-2022:7404
tzdata bug fix and enhancement update
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
rocky-linux-8-x86-64-appstream-rpms
tzdata-java-2022f-1.el8.noarch.rpm
0a7ca48030df3fda59da01d6e365550ff67b508a4583d00d2f348b9a50550984
RLBA-2022:7684
glibc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
compat-libpthread-nonshared-2.28-211.el8.x86_64.rpm
0d987ddaee5aa093feb72296aa630e0cab8c6b86dda5e560652ae561cc06b113
glibc-utils-2.28-211.el8.x86_64.rpm
8decd744120cef26bc1ee1253cd7d56326391b14fbf896c9249a3330b4b5f015
RLBA-2022:7688
gcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cpp-8.5.0-15.el8.x86_64.rpm
28cf4357b326dc03b53023b4a3368c4dac6ac058c850d3e787302436f3e90b84
gcc-8.5.0-15.el8.x86_64.rpm
a775ba87b97355a442098c6ff1381f92521a2ba8201e9af62c1fe1167490a78d
gcc-c++-8.5.0-15.el8.x86_64.rpm
d9ce7589fafa13e929ad62b8db7507844a842e23bdf006915ddd19e4b9f2740b
gcc-gdb-plugin-8.5.0-15.el8.x86_64.rpm
164d664e573149c79415039b67dfe110bf69fef0030f857136f1d46d1dbd8580
gcc-gfortran-8.5.0-15.el8.x86_64.rpm
c65a3cbe3a87e0d181ccfd4305331422e6427090d59b25daa4621e8b483e05d9
gcc-offload-nvptx-8.5.0-15.el8.x86_64.rpm
6b134ae3ff20d035c857122d2dcbf3cb0ccf85813cf896eda6dc13f4e1fa605e
gcc-plugin-annobin-8.5.0-15.el8.x86_64.rpm
789b09dfb84ce5000de464228a4f376343415861749430f694002a3c364bcc60
libitm-devel-8.5.0-15.el8.x86_64.rpm
a4cf4b140dd638ab5bfdf21c2608b7231cfd72dce246016dc2624224b4fca265
libquadmath-devel-8.5.0-15.el8.x86_64.rpm
5402ec862817511fe5b2a6cfefcdd46404f0220cc3405028288e1b9026c0c48b
libstdc++-devel-8.5.0-15.el8.x86_64.rpm
5fc96d87ea16dc1a72c61f7e81a4c7b4cfa9ffebe0eff215639c442e1cd945f0
libstdc++-docs-8.5.0-15.el8.x86_64.rpm
3358d2c9007ea4e04e326a1c43841dca505bb2e566a72224ec1944194e231b84
RLBA-2022:7693
binutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
binutils-devel-2.30-117.el8.x86_64.rpm
b756947caed110dbd7309c580685a01e1b32c56ea253ce72dd8f0b8665096be2
RLBA-2022:7698
samba bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
samba-vfs-iouring-4.16.4-2.el8.x86_64.rpm
293bfdcd38d29e1c5d2d0b3bae70d030335b5930798fd40776a937e377d0d278
RLSA-2022:7715
Moderate: libxml2 security update
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxml2-devel-2.9.7-15.el8.x86_64.rpm
4b107cd7b8a27df7a1c9af249ff0a61e749290c282fca5c1230b4f274d9e9b73
RLBA-2022:7716
cups bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cups-2.2.6-50.el8.x86_64.rpm
1517378cb5ed82be222d6499d7a4ee724e680a9ce66821a62ea7822e84ea6993
cups-client-2.2.6-50.el8.x86_64.rpm
1e739decd05133d57837a8eb165a9cfc3f2d6c816b175d28e5c23d22b9e96d78
cups-devel-2.2.6-50.el8.x86_64.rpm
702da979d61c4ed0202ee91e3c3a9a431641fae9eb13cf0f535ef6eee757fa57
cups-filesystem-2.2.6-50.el8.noarch.rpm
340365e14e5c67134cd42391206678c6578cb011ab2cd816777e07e178b1649f
cups-ipptool-2.2.6-50.el8.x86_64.rpm
7f2b504aa5392955ce26dbc5ef7da19d7f23803476ccaecc6cc189898e44f674
cups-lpd-2.2.6-50.el8.x86_64.rpm
ac704b6073e258756580693de27b42288f30b9ab2cff142d04e6fc33c2416f50
RLEA-2022:7719
subscription-manager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
subscription-manager-migration-1.28.32-1.el8.x86_64.rpm
ab1ac527e986bf52f691534aabef8e7f8b830e3837f84e44bd82417439a31f2f
RLBA-2022:7735
bluez bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bluez-cups-5.63-1.el8.x86_64.rpm
7f4571280a8f4a40728e6956e10da82c26377c28e1c620d69a17cbb83667dfaf
RLBA-2022:7738
authselect bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
authselect-compat-1.2.5-1.el8.x86_64.rpm
b0e97bad8179ed01ff00f73175d7a65a51ceb824d4d546ced7d0068260f4cff7
RLBA-2022:7746
zsh bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zsh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
zsh-html-5.5.1-10.el8.noarch.rpm
1a856e07e467122c9383f89a0c778a983d8b82bc138e522bc5b266ff76ec019c
RLBA-2022:7747
tuned bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tuned-gtk-2.19.0-1.el8.noarch.rpm
47f13bd39952a7079fa357c764f075d8dc0635b4e5314859b6fbcc030468b260
tuned-profiles-postgresql-2.19.0-1.el8.noarch.rpm
47bdfe6837d32422eb6071db284c1427dbd9d24572f5e010b4e16f91c1677479
tuned-utils-2.19.0-1.el8.noarch.rpm
0bde2847749a3bcaabec1e04b32b81ef170d9e02238bb8c65032d365be8fa8b0
tuned-utils-systemtap-2.19.0-1.el8.noarch.rpm
b2ab705b2debee9ea11b6dd6a7a1e1096c5b251007dbd48f0e7eb2b415ebcbe2
RLBA-2022:7759
dnf-plugins-core bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-dnf-plugin-modulesync-4.0.21-14.1.el8.noarch.rpm
7068f370d1b9133196d186276c7ca4139bc68f2235287a12df8215f48018e72c
RLBA-2022:7760
ndctl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ndctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
daxctl-devel-71.1-4.el8.x86_64.rpm
157d2afbb8abdd8d1fe02d06a46606c5a4548ebaa4b21d49702ac2baa6d54181
ndctl-devel-71.1-4.el8.x86_64.rpm
4b2034b6068692d1caaf0c99575a263c397a0edc309bf1ddd3dd8859c6ca4a32
RLBA-2022:7763
openssh bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openssh-askpass-8.0p1-16.el8.x86_64.rpm
46b9b55d7c2a500abe0b2012b4844cd340f9994350d092c7b837c44f8516239d
RLBA-2022:7769
dbus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dbus-devel-1.12.8-23.el8.x86_64.rpm
95cd8f0b705189258d6c9be2b274457fb77617a3b94d2ce50df2dadb4b4d6d8b
dbus-x11-1.12.8-23.el8.x86_64.rpm
63a0db5acdf451a16ddcb6158cd211af4b0d57064d8353f6c617efea50aba460
RLBA-2022:7774
sanlock bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-sanlock-3.8.4-4.el8.x86_64.rpm
e5ec992a8929df979daba0e9cf56ace4d4e7bbf916dc1fe4dcae37fb1603eea7
sanlk-reset-3.8.4-4.el8.x86_64.rpm
5d99904b88d20974973b30e16d118ed1f4fba2b9138897bdf392eb00fe62c107
sanlock-3.8.4-4.el8.x86_64.rpm
654cebaf1bf1b42cb78225bc15ce12bb9282ff53e06627ec0b7f9ed469e03a00
RLBA-2022:7776
libverto bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libverto.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libverto-libev-0.3.2-2.el8.x86_64.rpm
c0f58652b59ca82763860f53f288449c6707c61e769ada7010454abd0603865a
RLBA-2022:7783
util-linux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-libmount-2.32.1-38.el8.x86_64.rpm
ea9c81249ea546c2a79b65edb54694a9a0e1bab7d51cb9432d6ef8089dfe6439
RLBA-2022:7786
libselinux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libselinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libselinux-ruby-2.9-6.el8.x86_64.rpm
2a5b7dbd02c5776cd8ec453af6971a94c486325d05f86cb877979095a9c7daf6
RLEA-2022:7797
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
eth-tools-basic-11.3.0.0-1.el8.x86_64.rpm
b737a706ddd7eb66e5ec36939762facfca9ef1024c5f54e0861dda61bf1e6cf0
eth-tools-fastfabric-11.3.0.0-1.el8.x86_64.rpm
ba86e4ca08507ace4effef1704dd98444dd4643b1b92b29f28379a6fae833e22
fabtests-1.15.1-1.el8.x86_64.rpm
c7ca517e48ea1f77adc9bc0ee2f7176adf2c331b90d7ccf92f850022f31a1a7e
libvma-9.6.4-1.el8.x86_64.rpm
2b31ad656b5a84b2568145bcc11ce61a4ff6d2c555caf0ff5f2d2a0b954e061e
mstflint-4.21.0-1.el8.x86_64.rpm
fdcb52a33b993aa19181e3d0665a467ea8405cb7ff88078fa8b169511dcac099
ucx-1.13.0-1.el8.x86_64.rpm
1d7ec0c05bb2563c4c5fbc6f4d38778b1bfc2667387ec7c0cd88a81df070bf58
ucx-cma-1.13.0-1.el8.x86_64.rpm
272cd740693dbf9243e665dc84f3fa92a5dc2a2a974ccb283a311f58466d569e
ucx-devel-1.13.0-1.el8.x86_64.rpm
31c1637913be8ef679e273b472264cfd6741e6ce50e6835c744b10a78d846471
ucx-ib-1.13.0-1.el8.x86_64.rpm
dce07ebbd90ca1f8d20853a2fb42c0f8fbf512bc633c68e309fc985c11e4a1c0
ucx-rdmacm-1.13.0-1.el8.x86_64.rpm
4a10f4601d8e5fe574fbc8fb996f06985521aa807c39a58c30465e57489e8d14
RLBA-2022:7805
policycoreutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
policycoreutils-gui-2.9-20.el8.noarch.rpm
1d99560135850829f9dc0fb2b77885c934580993648eb3a8b42ab244522d4c70
policycoreutils-sandbox-2.9-20.el8.x86_64.rpm
b6dcb5c056adf4f355f2fb41e46feb691faf5c3bd2ba26e5afef9538c6ef1871
RLBA-2022:7819
rpm bug fix and enhancement update
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522)
rocky-linux-8-x86-64-appstream-rpms
rpm-build-4.14.3-24.el8_7.x86_64.rpm
677b722768bb6fbb4b9479ffad9cb7f69aaaa06718686d75d66dd87a8081f0f5
rpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpm
321b320ea3f4f0e28d68daf77bd6f004329e48700273b0f6138519ccd7474e6e
RLBA-2022:7825
bind bug fix and enhancement update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272)
rocky-linux-8-x86-64-appstream-rpms
bind-9.11.36-5.el8_7.2.x86_64.rpm
21abee84a89028d14ce98980aa383f28918bde55413fbd9e0cac50b19fb800df
bind-chroot-9.11.36-5.el8_7.2.x86_64.rpm
c0145d2d72c77b41ddd899f6cfbe5f616b0b9dff9c142767a31144375e78e082
bind-devel-9.11.36-5.el8_7.2.x86_64.rpm
09a84b9fa5fad18116b216c46c47aed57687a4836220f1efe46ccfab229322be
bind-libs-9.11.36-5.el8_7.2.x86_64.rpm
91e2c3e97c80d3bf7889b9a54a56b5023f0f836b5ff90fa0d9d89c57daaa7dc0
bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm
1076cfd8cf8a54db16a2bd8ad4afac3af11af0c7b64efca9f099001be25abac7
bind-license-9.11.36-5.el8_7.2.noarch.rpm
6962b9370b7289b60f13dd744a4686cc326e572e0d78146d05bb2d185cc25609
bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpm
e92594606ed4e209aeee470bdbbb0f914407eaacbaaf51287dd0b87d2c11f9e2
bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpm
ff6eeac2c720aa70d0833d6f67674797320f7a604bd0e89d7e3b104dc218a09d
bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpm
ac101cab9169d403cb52c7102ccd5464f7bd937c8433402506275a1888b2f367
bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpm
f4b183526a9aa05136adbb5e85f751d999d7890304108ba2398bf1d7c6c15684
bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpm
dbe7c50b37b95e2cd134a1985e23e9c31573b20a06870e7e81280c52f78a7cf8
bind-sdb-9.11.36-5.el8_7.2.x86_64.rpm
0c54ec1aa90b2dbd9db277762b9c87e5c203662c7e9fb4e4f339fd5d0e508127
bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpm
4b1f0cbc1fb7fb538f4dfaffd41e20b56067054ab12452ead829aaeadfeba5f1
bind-utils-9.11.36-5.el8_7.2.x86_64.rpm
32150af88921ca072ecb2c37e21606693effcba9264fbe9b9acf52fe11a5df5c
python3-bind-9.11.36-5.el8_7.2.noarch.rpm
b218709131629d02a30d045c0bcf541ee2262bbd083d07b35e263675fce0703e
RLBA-2022:7828
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Host ip changed when start vm (BZ#2132285)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Host ip changed when start vm (BZ#2132285)
rocky-linux-8-x86-64-appstream-rpms
NetworkManager-cloud-setup-1.40.0-2.el8_7.x86_64.rpm
1759b995a9e30a6e3237ce2e58473e1a0bdcf88663abb49967dad49a8f94ae5c
RLBA-2022:7829
sssd bug fix and enhancement update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544)
rocky-linux-8-x86-64-appstream-rpms
sssd-idp-2.7.3-4.el8_7.1.x86_64.rpm
3c6c95405c3b4e996b6bf4f2cc6485b989ea323907be522fad24fe0c3956679c
RLBA-2022:7884
tzdata bug fix and enhancement update
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border
with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal
time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border
with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal
time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
rocky-linux-8-x86-64-appstream-rpms
tzdata-java-2022f-1.el8.noarch.rpm
0a7ca48030df3fda59da01d6e365550ff67b508a4583d00d2f348b9a50550984
RLBA-2022:8785
tzdata bug fix and enhancement update
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022g, which addresses recent
time zone changes. Notably:
* On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations.
* A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022g, which addresses recent
time zone changes. Notably:
* On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations.
* A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added.
rocky-linux-8-x86-64-appstream-rpms
tzdata-java-2022g-1.el8.noarch.rpm
d5799859d5ae6af11f34b5c55e385e2f26daa17a9b635a9a9446f134e31d707d
RLBA-2023:0085
net-snmp bug fix and enhancement update
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es) and Enhancement(s):
* backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es) and Enhancement(s):
* backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764)
rocky-linux-8-x86-64-appstream-rpms
net-snmp-5.8-25.el8_7.1.x86_64.rpm
8e7570faa67317a9a726d1323277d9efd27a9b291c3dc345c18f7e741cd39ce5
net-snmp-agent-libs-5.8-25.el8_7.1.x86_64.rpm
739c2a903c800b8afd884b0b67a5aa02683a5f6cb145b1b5aeaecc5f8ec5ea2c
net-snmp-devel-5.8-25.el8_7.1.x86_64.rpm
6d6a6b021a77c170e8ef0b1df2c46d6c59e77305469232d38f5068d443116691
net-snmp-perl-5.8-25.el8_7.1.x86_64.rpm
cfec9b175bfa5cb9978309ef54574d767d0fff689899780ac3cea2f171a332de
net-snmp-utils-5.8-25.el8_7.1.x86_64.rpm
0b85a6937805187a8507ac0e374a11d2414b5008fcc92e2d94fc27bd23ff541e
RLSA-2023:0096
Moderate: dbus security update
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
dbus-devel-1.12.8-23.el8_7.1.x86_64.rpm
f3459cfbe2e627daed858265868a5c0c4d657e939594cc0e0269423090018cd8
dbus-x11-1.12.8-23.el8_7.1.x86_64.rpm
a998c811a937fd7398a0f7821ff5272a8da1b1cb4be7e2733caa1c68055cdef5
RLBA-2023:0098
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* crio occasionally fails to start during deployment (BZ#2132281)
* DNS servers are not sorted according to priority in resolv.conf (BZ#2135733)
* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891)
* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* crio occasionally fails to start during deployment (BZ#2132281)
* DNS servers are not sorted according to priority in resolv.conf (BZ#2135733)
* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891)
* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429)
rocky-linux-8-x86-64-appstream-rpms
NetworkManager-cloud-setup-1.40.0-5.el8_7.x86_64.rpm
02a5132a0d3b86743d4f6f24d1f74aacfcdf566b45967ef872f4e09c8d01b466
RLBA-2023:0105
util-linux bug fix and enhancement update
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252)
rocky-linux-8-x86-64-appstream-rpms
python3-libmount-2.32.1-39.el8_7.x86_64.rpm
f614fd2c1fc6b957438d93fada12ea568af9ca25305eb3b3025579c4b897e852
RLBA-2023:0106
gcc bug fix and enhancement update
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075)
rocky-linux-8-x86-64-appstream-rpms
cpp-8.5.0-16.el8_7.x86_64.rpm
023d14d82ff5f25ecc443509a50d3ea5ef0f42fee1805ef8c3d4bec535324e20
gcc-8.5.0-16.el8_7.x86_64.rpm
5b8aace21801f6e6702d6c33e3279dfd9fe894f28d3450236090d075f4509aa2
gcc-c++-8.5.0-16.el8_7.x86_64.rpm
57eb119d1affce29d7c09427b3d2427ef18ed75513c2e9e178f2833b3f6bbdf1
gcc-gdb-plugin-8.5.0-16.el8_7.x86_64.rpm
d3b4ec734d470f1c9d7465a9319b2b2d2eac0002a8d8fadd8e578f63c60e77d7
gcc-gfortran-8.5.0-16.el8_7.x86_64.rpm
e67137a484d7cca1e388ff92031924bf979e485c85c75ab4887ab93f91cecfa9
gcc-offload-nvptx-8.5.0-16.el8_7.x86_64.rpm
9c79ffc7831ffcac7bb2fa8dab7b9a47e1cc4c8f75bd62f174b68cf0baccfef3
gcc-plugin-annobin-8.5.0-16.el8_7.x86_64.rpm
4c251a06c8b5032d7bb6b3bd3cb637cce6e8f6698e6c76460d436498c2c1b8f7
libitm-devel-8.5.0-16.el8_7.x86_64.rpm
b786e7d6210051d4d18a5208fb0ee426ffd6287b49252f502c69c4137320234c
libquadmath-devel-8.5.0-16.el8_7.x86_64.rpm
47a32750c89cf5e9cdf6a43a4c93556542997c14c8cf9cd83c2f2f97131b93cf
libstdc++-devel-8.5.0-16.el8_7.x86_64.rpm
4967a6b2121388225a306e92f6de0f0208a07f614cf7fa5083c87ed433170fed
libstdc++-docs-8.5.0-16.el8_7.x86_64.rpm
a7ef4e076abca80ffad691972f006805d09d37c90bfb3d3c661ff096344f2a3c
RLSA-2023:0110
Moderate: sqlite security update
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
lemon-3.26.0-17.el8_7.x86_64.rpm
47817f17935b6af44be335b39a44b5a6d0772b6ea2d78d245d549a8e56c01d41
RLSA-2023:0116
Moderate: libtasn1 security update
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtasn1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libtasn1-devel-4.13-4.el8_7.x86_64.rpm
0d55122e296074efde594a2ff30970b1cfe31086b7273908aa34d2b1059ae1a2
libtasn1-tools-4.13-4.el8_7.x86_64.rpm
46d0db87e2f9d5aa78b591286d07345cb18efaefc4c93756852468c7801fe040
RLBA-2023:0120
authselect bug fix and enhancement update
The authselect package configures authentication and identity sources from supported profiles.
Bug Fix(es) and Enhancements:
* Change the default password encryption algorithm back to sha512. (BZ#2151229)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The authselect package configures authentication and identity sources from supported profiles.
Bug Fix(es) and Enhancements:
* Change the default password encryption algorithm back to sha512. (BZ#2151229)
rocky-linux-8-x86-64-appstream-rpms
authselect-compat-1.2.5-2.el8_7.x86_64.rpm
0dcb5ee8ac4d74314203eda35bca1ed32982ff799e837977f92a580e6892c52b
RLBA-2023:0124
sssd bug fix and enhancement update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883)
rocky-linux-8-x86-64-appstream-rpms
sssd-idp-2.7.3-4.el8_7.3.x86_64.rpm
e3a0ab19cdf0ff2dec20c7e33f97069bae225df8c11a5b01a4d193b524c15bab
RLSA-2023:0173
Moderate: libxml2 security update
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libxml2-devel-2.9.7-15.el8_7.1.x86_64.rpm
f779a0f9675a3365dffafa0e432c44e9166dec2ce6164f1d3baf17bde23f2bfd
RLBA-2019:0973
container-tools bug fix update
The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Users of container-tools are advised to upgrade to this updated package, which fixes several bugs.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Users of container-tools are advised to upgrade to this updated package, which fixes several bugs.
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:0975
Important: container-tools:rhel8 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675)
* [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669)
* [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675)
* [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669)
* [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689)
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:0981
Important: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases.
Security Fix(es):
* python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)
* python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164)
* python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases.
Security Fix(es):
* python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)
* python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164)
* python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
RLSA-2019:0984
Moderate: python36:3.6 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases.
Security Fix(es):
* python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164)
* python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-nose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases.
Security Fix(es):
* python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164)
* python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__python36
python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm
08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc
python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm
dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740
RLBA-2019:0986
rhn-tools:1.0 bug fix update
Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release.
Bug Fix(es):
* Cannot provision PPC64LE Rocky Linux8 host: grubby-bls: the option "--yaboot" was deprecated (BZ#1702181)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for osad, spacewalk-abrt, rhn-custom-info, rhncfg, spacewalk-koan, spacewalk-oscap, spacewalk-backend, rhn-virtualization, spacewalk-usix, rhnpush, spacewalk-client-cert, cobbler, spacewalk-remote-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release.
Bug Fix(es):
* Cannot provision PPC64LE Rocky Linux8 host: grubby-bls: the option "--yaboot" was deprecated (BZ#1702181)
rocky-linux-8-x86-64-appstream-rpms__rhn-tools
koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm
ef6a6abd5a24a20830e6a532506c6325391ef0cba9d5921b87ea468215214fe5
osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm
2133db14f204ca048a15cfcb20b148b8d5f73c6275072c959545195e63ec0105
python3-koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm
a0ce2d95b51241c2167ddbee03fca8b5d3ce76deb8c45482aa970a49305e1ebe
python3-osa-common-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm
cd02043d059cb29919b7fb2f2464d388bff93d93adcf7ddf24e24453a4e8e40f
python3-osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm
6a9074192b7c122b476fa15d474961604260fdec74cca10502cc41321384d8a7
python3-rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
993f6be05e14a31109e8dda51488579cff948a3675e7456266c016e43560f4b6
python3-rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
72850cebd3ee25af5b34c3c7b16e9560d178ce1352d28c73519303434ae76b66
python3-rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
1e1f7c96bc40a2e005d06247d6417ffe44563f06859f59a48cae629ca4893544
python3-rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
9e19116ea8766b48317a9c8d20058530345b3d814ed222c81f0da6de1cf50554
python3-rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm
104a20afd1759671beb597de2dca516301151e57ee15053f7aa9e9d631b3eccc
python3-rhn-virtualization-common-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm
59e9f5e5a42a345e883e1f24d44ba4374d4318f88cdd52ccf41d628311c1fe47
python3-rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm
9d4d2782acf243b6f5dec466200f12797c0ea21854a89ee4cee3f8dbb205a266
python3-spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm
13f25bdb91b8e5f474c8a85d4799cf02048d64f74c7af73ec099f30d82b064b0
python3-spacewalk-backend-libs-2.8.48-4.module+el8.3.0+252+a4420673.noarch.rpm
81fa5ec16047238ca83e846515d64888a26aeca598f3c7ffea7e538f882b8c4b
python3-spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm
f17dbf0ff52ef317f7d9b48d61fd61d97afce69cab09fa39e3bf71042cb791ba
python3-spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm
87030b53537711a41fdc570ff7fce2f67027417f043d616652ccbba6258cd858
python3-spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm
7de8880e395f8bc88ae6b250654293fdbb43ba5ccd5276d4f3477ae47c70e13a
rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
3502c4651d93969e0d98a563e60277e1ac9accb3ea506f8368a87c9320e8596b
rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
6a761d9a856fba39dd1eb646c1ad24d9b5da6c093d42ed03c45e73a00f66035e
rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
f170cbf71b957bb4f71168849ce869c0a570c18c8ad487196c50b80fe07e9e55
rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
00e597136de3c22b598803c6a00901193c6590c261ecf7b57d8c4953353315d9
rhn-custom-info-5.4.42-4.module+el8.3.0+252+a4420673.noarch.rpm
1e2c7e789b48516f62d6a8b98b7316a655f35207cc6e792bf28cd23fcc8c52a3
rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm
6f3e46bb12ae2aa9fc3b5083e8d4706510effb90e07dfa87c852b0086d06a6cf
rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm
e72d2685a7f8a7b786918b618d98ff743332a07137d079e0d2d12ecf86431444
spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm
39b418c006dd634bc6433e787323bbc39099af1aa152447952e96000be3e3226
spacewalk-client-cert-2.8.2-3.module+el8.3.0+252+a4420673.noarch.rpm
b8628a7c0b5a8ff78e442b97ef471d3ff75868232aaa1d8e11b04f80d4706a4d
spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm
dbfd4518fff5db07595559409fffb9d203a4dcc50aaddf0a9e1c5e15ede11720
spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm
dbe62414978cb5a33feaf68b24d3f90a8378b7eb6c8d4438ee8119d702e58354
spacewalk-remote-utils-2.8.4-5.module+el8.3.0+252+a4420673.noarch.rpm
2fead60abcda5cce898895895cc0105fe97c7e0496cd6ae63be8e03a48852dd1
spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm
f254208706acce7b4bc22289c9c5adc4cda822dbb62e7e1f1260be6848c1c959
RLBA-2019:0987
mariadb:10.3 bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
Bug Fix(es):
* Altering table's column used in primary key causes data corruption (BZ#1702602)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for Judy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
Bug Fix(es):
* Altering table's column used in primary key causes data corruption (BZ#1702602)
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLBA-2019:1524
rhn-tools:1.0 bug fix update
Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release.
This update fixes the following bug:
There was a problem that was caused by a missing tar command for the system provisioning script (BZ#1703706).
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for osad, spacewalk-abrt, rhn-custom-info, rhncfg, spacewalk-oscap, spacewalk-backend, rhn-virtualization, spacewalk-usix, rhnpush, spacewalk-client-cert, cobbler.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release.
This update fixes the following bug:
There was a problem that was caused by a missing tar command for the system provisioning script (BZ#1703706).
rocky-linux-8-x86-64-appstream-rpms__rhn-tools
koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm
ef6a6abd5a24a20830e6a532506c6325391ef0cba9d5921b87ea468215214fe5
osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm
2133db14f204ca048a15cfcb20b148b8d5f73c6275072c959545195e63ec0105
python3-koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm
a0ce2d95b51241c2167ddbee03fca8b5d3ce76deb8c45482aa970a49305e1ebe
python3-osa-common-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm
cd02043d059cb29919b7fb2f2464d388bff93d93adcf7ddf24e24453a4e8e40f
python3-osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm
6a9074192b7c122b476fa15d474961604260fdec74cca10502cc41321384d8a7
python3-rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
993f6be05e14a31109e8dda51488579cff948a3675e7456266c016e43560f4b6
python3-rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
72850cebd3ee25af5b34c3c7b16e9560d178ce1352d28c73519303434ae76b66
python3-rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
1e1f7c96bc40a2e005d06247d6417ffe44563f06859f59a48cae629ca4893544
python3-rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
9e19116ea8766b48317a9c8d20058530345b3d814ed222c81f0da6de1cf50554
python3-rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm
104a20afd1759671beb597de2dca516301151e57ee15053f7aa9e9d631b3eccc
python3-rhn-virtualization-common-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm
59e9f5e5a42a345e883e1f24d44ba4374d4318f88cdd52ccf41d628311c1fe47
python3-rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm
9d4d2782acf243b6f5dec466200f12797c0ea21854a89ee4cee3f8dbb205a266
python3-spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm
13f25bdb91b8e5f474c8a85d4799cf02048d64f74c7af73ec099f30d82b064b0
python3-spacewalk-backend-libs-2.8.48-4.module+el8.3.0+252+a4420673.noarch.rpm
81fa5ec16047238ca83e846515d64888a26aeca598f3c7ffea7e538f882b8c4b
python3-spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm
87030b53537711a41fdc570ff7fce2f67027417f043d616652ccbba6258cd858
python3-spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm
7de8880e395f8bc88ae6b250654293fdbb43ba5ccd5276d4f3477ae47c70e13a
rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
3502c4651d93969e0d98a563e60277e1ac9accb3ea506f8368a87c9320e8596b
rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
6a761d9a856fba39dd1eb646c1ad24d9b5da6c093d42ed03c45e73a00f66035e
rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
f170cbf71b957bb4f71168849ce869c0a570c18c8ad487196c50b80fe07e9e55
rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
00e597136de3c22b598803c6a00901193c6590c261ecf7b57d8c4953353315d9
rhn-custom-info-5.4.42-4.module+el8.3.0+252+a4420673.noarch.rpm
1e2c7e789b48516f62d6a8b98b7316a655f35207cc6e792bf28cd23fcc8c52a3
rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm
6f3e46bb12ae2aa9fc3b5083e8d4706510effb90e07dfa87c852b0086d06a6cf
rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm
e72d2685a7f8a7b786918b618d98ff743332a07137d079e0d2d12ecf86431444
spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm
39b418c006dd634bc6433e787323bbc39099af1aa152447952e96000be3e3226
spacewalk-client-cert-2.8.2-3.module+el8.3.0+252+a4420673.noarch.rpm
b8628a7c0b5a8ff78e442b97ef471d3ff75868232aaa1d8e11b04f80d4706a4d
spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm
dbe62414978cb5a33feaf68b24d3f90a8378b7eb6c8d4438ee8119d702e58354
spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm
f254208706acce7b4bc22289c9c5adc4cda822dbb62e7e1f1260be6848c1c959
RLSA-2019:1529
Important: pki-deps:10.6 security update
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037)
* tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014)
* tomcat: Open redirect in default servlet (CVE-2018-11784)
* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037)
* tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014)
* tomcat: Open redirect in default servlet (CVE-2018-11784)
* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm
479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85
apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm
3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722
bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm
7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1
glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm
07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524
glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm
3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7
glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e
glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698
glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be
jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm
064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706
jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm
f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9
javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60
javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm
ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba
stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm
972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18
velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm
568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882
xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm
8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26
xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm
f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8
xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm
d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783
xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm
143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26
xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm
31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e
xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm
6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9
RLBA-2019:1970
authd bug fix update
The authd packages contain authd, a small and fast RFC 1413 ident protocol
daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd.
Bug Fix(es):
* authd authentication fails with ERROR:NO-USER (BZ#1730802)
Users of authd are advised to upgrade to this updated package, which fixes this bug.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The authd packages contain authd, a small and fast RFC 1413 ident protocol
daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd.
Bug Fix(es):
* authd authentication fails with ERROR:NO-USER (BZ#1730802)
Users of authd are advised to upgrade to this updated package, which fixes this bug.
rocky-linux-8-x86-64-appstream-rpms
authd-1.4.4-5.el8_0.1.x86_64.rpm
2cd8989ff633196026606258fc42d248b1ff003662ee845a9e9f197af077da1b
RLSA-2019:1972
Important: ruby:2.5 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm
43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
RLBA-2019:1954
python27:2.7 bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757)
rocky-linux-8-x86-64-appstream-rpms__python27
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
RLBA-2019:1955
satellite-5-client module update
Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5.
This update fixes the following bugs:
* A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450)
* Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5.
This update fixes the following bugs:
* A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450)
* Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445)
rocky-linux-8-x86-64-appstream-rpms__satellite-5-client
dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm
c738f38ce26ddcc540a4b59a1d0c2c133be8f2391b0526185a64142906a30a82
python3-dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm
65996b41301af857a541928e6ab60fe6ab556f582566dc8cdec0d42284ec7cc4
python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
571a4ec8b5b17116dc1105367bf344d2d5e99d7f64cdd139abed68156604ec5f
python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
711ac546b34b0800ad9a428df43abb16d49657037165d9346094b2ef7b1d4838
python3-rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm
4ea6368bf1b879bdeb7927df0cc66a74c94e25f918ff7eb7bcac25a8413543e2
python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
12bed1b1726516134b87a833019a03971acdd2647ee20d835a508123e93e6e28
python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
eaa1b2f91389b2137df2afee36b21556592e777c9c5fea50173ae7d325c4c803
rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
c6ebd58dbc04bc16d86ad30394c59c6252992b6a9b7c05322b1245927b6a78d3
rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
32e4a7d4235da0cca307470b72205611adf539711e176d057fb8deb1e08a5641
rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm
b71d82c660d0b4b0da5eb8e25137387c4a9376ff7d17f53ab57c7b87b6679eb8
rhnsd-5.0.35-3.module+el8.3.0+178+27415451.x86_64.rpm
7f2a23b3dd1997439a3c6e06b639d153a960ce6f0224be8bba18423a69050124
rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
9e363cfb7f6d2dc976c53838116bfafcb58be49f3f261af1ab1f64df89111d9b
rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
bd1750ce82956377455e3b6de5ac8700eb1a34405d6d6568794da3e97330abe5
RLBA-2019:1956
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470)
* Performance Problems with Podman on systems with IO load (BZ#1724522)
* podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470)
* Performance Problems with Podman on systems with IO load (BZ#1724522)
* podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270)
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:2511
Important: mysql:8.0 security update
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs.
The following packages have been upgraded to a later upstream version: mysql (8.0.17).
Security Fix(es):
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834)
* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805)
* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592)
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814)
* mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503)
* mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752)
* mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536)
* mysql: Server: Connection unspecified vulnerability (CVE-2019-2539)
* mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636)
* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826)
* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737)
* mysql: Server: XML unspecified vulnerability (CVE-2019-2740)
* mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780)
* mysql: Server: DML unspecified vulnerability (CVE-2019-2784)
* mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795)
* mysql: Client programs unspecified vulnerability (CVE-2019-2797)
* mysql: Server: FTS unspecified vulnerability (CVE-2019-2801)
* mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819)
* mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for mecab-ipadic, mecab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs.
The following packages have been upgraded to a later upstream version: mysql (8.0.17).
Security Fix(es):
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834)
* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805)
* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592)
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814)
* mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503)
* mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752)
* mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536)
* mysql: Server: Connection unspecified vulnerability (CVE-2019-2539)
* mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636)
* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826)
* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737)
* mysql: Server: XML unspecified vulnerability (CVE-2019-2740)
* mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780)
* mysql: Server: DML unspecified vulnerability (CVE-2019-2784)
* mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795)
* mysql: Client programs unspecified vulnerability (CVE-2019-2797)
* mysql: Server: FTS unspecified vulnerability (CVE-2019-2801)
* mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819)
* mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mysql
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
RLSA-2019:2512
Important: subversion:1.10 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
RLSA-2019:2593
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLBA-2019:2716
python36:3.6 bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bux Fix(es):
* python-wheel needs to remove or disable their crypto implementation (BZ#1732325)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-nose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bux Fix(es):
* python-wheel needs to remove or disable their crypto implementation (BZ#1732325)
rocky-linux-8-x86-64-appstream-rpms__python36
python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm
08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc
python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm
dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740
RLBA-2019:2717
python27:2.7 bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bux Fix(es):
* python-wheel needs to remove or disable their crypto implementation (BZ#1732326)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bux Fix(es):
* python-wheel needs to remove or disable their crypto implementation (BZ#1732326)
rocky-linux-8-x86-64-appstream-rpms__python27
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
RLSA-2019:2720
Important: pki-deps:10.6 security update
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm
479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85
apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm
3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722
bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm
7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1
glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm
07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524
glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm
3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7
glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e
glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698
glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be
jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca
jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a
jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm
064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706
jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm
f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9
javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60
javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm
ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba
stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm
972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18
velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm
568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882
xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm
8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26
xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm
f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8
xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm
d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783
xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm
143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26
xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm
31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e
xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm
6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9
RLSA-2019:2722
Low: libwmf security update
The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick.
Security Fix(es):
* gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libwmf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick.
Security Fix(es):
* gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libwmf-0.2.9-8.el8_0.x86_64.rpm
4f37891f78181ba5c63beed49787b5dc6576856fddadac0da20d190f25c58590
libwmf-lite-0.2.9-8.el8_0.x86_64.rpm
af3108a84c555c5b19277f7f16ab43f0f3b406c601be1b7b8c4364e33f17c633
RLBA-2019:2723
container-tools:rhel8 bug fix update
Bug Fix(es):
* race/corruption: podman failed to launch containers (BZ#1741110)
* podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* race/corruption: podman failed to launch containers (BZ#1741110)
* podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163)
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLBA-2019:2724
container-tools:1.0 bug fix update
Bug Fix(es):
* [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707)
rocky-linux-8-x86-64-appstream-rpms__container-tools
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:2799
Important: nginx:1.14 security update
Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage.
Security Fix(es):
* HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)
* HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage.
Security Fix(es):
* HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)
* HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
d77c1f61ff7c954fca0a2fac6b5d215deb913be94829d83e7669a94326341d88
nginx-all-modules-1.14.1-9.module+el8.4.0+542+81547229.noarch.rpm
eb20aa61d586dcb30576b6859546e0b777311d2748379db94f9006592eb2a437
nginx-filesystem-1.14.1-9.module+el8.4.0+542+81547229.noarch.rpm
734955ee4e9cc7dd8e87ae6c6cfb3c5bcc3e437d89b3ee82334127ddf27b1d49
nginx-mod-http-image-filter-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
af1755fac641c16ca7dbfd78ecd5853b85189fe2a9013a80d6cc15c790c20758
nginx-mod-http-perl-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
68ffe1514e55b20afe3fd0d9de5651c799941543bc015e44f9524e30a665639d
nginx-mod-http-xslt-filter-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
337667809e6b461078276949229dbf337915a06945bd083743501c0247d7f9f5
nginx-mod-mail-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
b154bd4e42e272dbb325d06f7eae09abb9feb4038299f6dce1fc95b9c918ffd4
nginx-mod-stream-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
19a19fe758d472c9c8b471a8ae875482372f340f668184510ff7121d0832d5e8
RLSA-2019:2925
Important: nodejs:10 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.16.3).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.16.3).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLBA-2019:3331
perl-generators bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-generators.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
perl-generators-1.10-9.el8.noarch.rpm
fd3bb64efcd24efd5d404cd8ea31bdf335f382cf2a77811750f841b690a48fc4
RLSA-2019:3335
Moderate: python27:2.7 security and bug fix update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
Security Fix(es):
* numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446)
* python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740)
* python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947)
* python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
Security Fix(es):
* numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446)
* python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740)
* python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947)
* python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm
6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc
python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568
python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
RLBA-2019:3336
nss-altfiles bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nss-altfiles.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nss-altfiles-2.18.1-12.el8.x86_64.rpm
9c32bc933f3ad0cc751246893ab76d85f3839afe2d70f6f2d945dcc97019ad85
RLBA-2019:3343
python36:3.6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pymongo, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python36
python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm
434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035
python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm
08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc
python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm
dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740
RLSA-2019:3345
Low: virt:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755)
* QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)
* QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755)
* QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)
* QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2019:3348
idm:DL1 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
RLBA-2019:3355
rhn-tools:1.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for osad, spacewalk-abrt, rhn-custom-info, rhncfg, spacewalk-koan, spacewalk-oscap, spacewalk-backend, rhn-virtualization, spacewalk-usix, rhnpush, spacewalk-client-cert, cobbler, spacewalk-remote-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__rhn-tools
koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm
ef6a6abd5a24a20830e6a532506c6325391ef0cba9d5921b87ea468215214fe5
osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm
2133db14f204ca048a15cfcb20b148b8d5f73c6275072c959545195e63ec0105
python3-koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm
a0ce2d95b51241c2167ddbee03fca8b5d3ce76deb8c45482aa970a49305e1ebe
python3-osa-common-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm
cd02043d059cb29919b7fb2f2464d388bff93d93adcf7ddf24e24453a4e8e40f
python3-osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm
6a9074192b7c122b476fa15d474961604260fdec74cca10502cc41321384d8a7
python3-rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
993f6be05e14a31109e8dda51488579cff948a3675e7456266c016e43560f4b6
python3-rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
72850cebd3ee25af5b34c3c7b16e9560d178ce1352d28c73519303434ae76b66
python3-rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
1e1f7c96bc40a2e005d06247d6417ffe44563f06859f59a48cae629ca4893544
python3-rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
9e19116ea8766b48317a9c8d20058530345b3d814ed222c81f0da6de1cf50554
python3-rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm
104a20afd1759671beb597de2dca516301151e57ee15053f7aa9e9d631b3eccc
python3-rhn-virtualization-common-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm
59e9f5e5a42a345e883e1f24d44ba4374d4318f88cdd52ccf41d628311c1fe47
python3-rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm
9d4d2782acf243b6f5dec466200f12797c0ea21854a89ee4cee3f8dbb205a266
python3-spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm
13f25bdb91b8e5f474c8a85d4799cf02048d64f74c7af73ec099f30d82b064b0
python3-spacewalk-backend-libs-2.8.48-4.module+el8.3.0+252+a4420673.noarch.rpm
81fa5ec16047238ca83e846515d64888a26aeca598f3c7ffea7e538f882b8c4b
python3-spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm
f17dbf0ff52ef317f7d9b48d61fd61d97afce69cab09fa39e3bf71042cb791ba
python3-spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm
87030b53537711a41fdc570ff7fce2f67027417f043d616652ccbba6258cd858
python3-spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm
7de8880e395f8bc88ae6b250654293fdbb43ba5ccd5276d4f3477ae47c70e13a
rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
3502c4651d93969e0d98a563e60277e1ac9accb3ea506f8368a87c9320e8596b
rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
6a761d9a856fba39dd1eb646c1ad24d9b5da6c093d42ed03c45e73a00f66035e
rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
f170cbf71b957bb4f71168849ce869c0a570c18c8ad487196c50b80fe07e9e55
rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm
00e597136de3c22b598803c6a00901193c6590c261ecf7b57d8c4953353315d9
rhn-custom-info-5.4.42-4.module+el8.3.0+252+a4420673.noarch.rpm
1e2c7e789b48516f62d6a8b98b7316a655f35207cc6e792bf28cd23fcc8c52a3
rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm
6f3e46bb12ae2aa9fc3b5083e8d4706510effb90e07dfa87c852b0086d06a6cf
rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm
e72d2685a7f8a7b786918b618d98ff743332a07137d079e0d2d12ecf86431444
spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm
39b418c006dd634bc6433e787323bbc39099af1aa152447952e96000be3e3226
spacewalk-client-cert-2.8.2-3.module+el8.3.0+252+a4420673.noarch.rpm
b8628a7c0b5a8ff78e442b97ef471d3ff75868232aaa1d8e11b04f80d4706a4d
spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm
dbfd4518fff5db07595559409fffb9d203a4dcc50aaddf0a9e1c5e15ede11720
spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm
dbe62414978cb5a33feaf68b24d3f90a8378b7eb6c8d4438ee8119d702e58354
spacewalk-remote-utils-2.8.4-5.module+el8.3.0+252+a4420673.noarch.rpm
2fead60abcda5cce898895895cc0105fe97c7e0496cd6ae63be8e03a48852dd1
spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm
f254208706acce7b4bc22289c9c5adc4cda822dbb62e7e1f1260be6848c1c959
RLEA-2019:3361
gedit-plugins bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gedit-plugins.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gedit-plugin-bookmarks-3.28.1-8.el8.x86_64.rpm
8ee55f18c9ef924892aa658c08c4ee530cb746cc53c55b406995db7d500bb9e9
gedit-plugin-bracketcompletion-3.28.1-8.el8.x86_64.rpm
56c21923ee5a336aee82c875144d0ed34336611e97bd0f14a90debe433afb39b
gedit-plugin-codecomment-3.28.1-8.el8.x86_64.rpm
ab8bb5e0f23e617cbf0492b714c384c8a84f133e2cc91215268d1e3b40e4f485
gedit-plugin-colorpicker-3.28.1-8.el8.x86_64.rpm
6e2a9fd2d5b7c4c15b5f143635c1cccd1ddd3328d7114d91dab524b2183a7ba4
gedit-plugin-colorschemer-3.28.1-8.el8.x86_64.rpm
8c76c2706aadb7d8b94da6c1f6aaadc265bc54af15fdfd111debeba11653a961
gedit-plugin-commander-3.28.1-8.el8.x86_64.rpm
cef1bdf4601e1a18dacd7489b8ae0a6eaba6a88bd6faeb00ff34d33372205869
gedit-plugin-drawspaces-3.28.1-8.el8.x86_64.rpm
32093993ce0f43cbf5808c19504f7f54f6e2dd2e0c3ec55b896b27a83000acc9
gedit-plugin-findinfiles-3.28.1-8.el8.x86_64.rpm
c9e327e321b30c1277553b9fb078f61b0b0faecef864462ace636eae756c0cad
gedit-plugin-joinlines-3.28.1-8.el8.x86_64.rpm
3099b3395a9f8da5b15e20da5eba3fe5a71ba310c7d8a1868d24c932f9d5ce90
gedit-plugin-multiedit-3.28.1-8.el8.x86_64.rpm
444af7dbedaa40019c503f13d0a82f74f7b7d87bf687190a04be717de6fc51cc
gedit-plugins-3.28.1-8.el8.x86_64.rpm
60987cdc33bea0a8464f6f351a7cef7d2dda4b464c7addc316b1cf7128af31ab
gedit-plugins-data-3.28.1-8.el8.x86_64.rpm
d56b807f59f8559097c097eca3cc8124ca9c4dc9c4c4c7051bfa0d92501163a2
gedit-plugin-smartspaces-3.28.1-8.el8.x86_64.rpm
a95cfd63cf7ad33d989da3aff0583f8ba5005be4c34fe4421a82bc9e4d0421d0
gedit-plugin-terminal-3.28.1-8.el8.x86_64.rpm
8e2cbc6e55d8695c8538ab32cb61d05b2c9d9f29c69a1df115f0d2a76559db4f
gedit-plugin-textsize-3.28.1-8.el8.x86_64.rpm
387df64b03c799e437a87611a9740bdb794d4c4ff16e8437ff4d0a82d7eb1247
gedit-plugin-translate-3.28.1-8.el8.x86_64.rpm
1687bf81b496c1c398996db23046a9fb27046ec197dec3f4df82e944ce32af1a
gedit-plugin-wordcompletion-3.28.1-8.el8.x86_64.rpm
0e61a5476f5485156b60fb3d04687f88b52364a34aa52ab9ab09334a54c6729d
RLEA-2019:3367
google-noto-cjk-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for google-noto-cjk-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
google-noto-cjk-fonts-common-20190416-1.el8.noarch.rpm
05c71f569e9d099ae44beb99756dd24bdf1b11477afdd708c0d052724ffba567
google-noto-sans-cjk-ttc-fonts-20190416-1.el8.noarch.rpm
4f0722dcdf2d0d991caff93ec045892068d7425a3c5caca96b202fb5f7671235
google-noto-serif-cjk-ttc-fonts-20190416-1.el8.noarch.rpm
18a6756341c5e3791726593ed822a6f4d034c048d7a3cd9bb4f36bb85fac5ec7
RLBA-2019:3373
criu bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
RLBA-2019:3374
php:7.2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpm
4b8310f3980d49aafc8a9098f45f69cab6c6d24c967f8b357541a22621c47cee
libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475
libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372
libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5
php-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpm
53d93e110ac02f191341248649791187f8474454500c2137eefe0c3fa35a68e9
php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482
php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68
php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm
52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b
RLEA-2019:3375
new module: php:7.3
This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm
c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45
libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729
libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61
libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d
php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm
33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744
php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5
php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc
php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7
RLBA-2019:3376
python-augeas bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-augeas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-augeas-0.5.0-12.el8.noarch.rpm
bf0e98bc5c4aeb4f618e0486831e65376a472041bc0131746af02b56f3048028
RLBA-2019:3382
python-gevent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-gevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d
rocky-linux-8-x86-64-appstream-rpms
python3-gevent-1.2.2-4.el8.x86_64.rpm
97d0e59dbd8e57beffd16895bf906d7cf06d02ee9a310e79860fef6ae78cd9bb
RLBA-2019:3384
ruby:2.5 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm
43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
RLEA-2019:3399
alsa-plugins bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-plugins.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
alsa-plugins-arcamav-1.1.9-1.el8.x86_64.rpm
549d5132d498ac5385320ac8bb8df3e3e618f43e615cf453f7350ef4a304b5d4
alsa-plugins-maemo-1.1.9-1.el8.x86_64.rpm
42044dad79db97f15ca117d0850fc457c00d7728c3129af779d8f7a161fc1caf
alsa-plugins-oss-1.1.9-1.el8.x86_64.rpm
b5d262787692b35ebf7476e839e7977589f580726407602f525a7456cc7dfffd
alsa-plugins-pulseaudio-1.1.9-1.el8.x86_64.rpm
ddbee7fff19b4e1f87929dd688047339a3ad7e3fd2a6e917f417508020a6b8e7
alsa-plugins-samplerate-1.1.9-1.el8.x86_64.rpm
3b3898b0e2e748f3614d076dab4f9bcf392581a8832c8777312edfbea2d3e8ad
alsa-plugins-speex-1.1.9-1.el8.x86_64.rpm
025cce6f35fcd4e0b04e329c51e37d7af2de086e39b30f3d7ae59921b186c683
alsa-plugins-upmix-1.1.9-1.el8.x86_64.rpm
df4a2a71c782fae44e5f349a87ef63190682d47f8499c204e75f1c8d88f3d9de
alsa-plugins-usbstream-1.1.9-1.el8.x86_64.rpm
d47e53bbb122ecc904051a02b5ba3d693b8446573f58660a615f617937d6716a
alsa-plugins-vdownmix-1.1.9-1.el8.x86_64.rpm
37b572f3cfb040633527f9b6ab083de2952e2f7615a6f656dcb43dbf18050ba3
RLSA-2019:3403
Important: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLBA-2019:3406
python-gssapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-gssapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-gssapi-1.5.1-5.el8.x86_64.rpm
8e40257c5b6d46b869e64fc234db0c7d78fd4659ed191df14c0d5ac45d905daa
RLBA-2019:3411
lttng-ust bug fix and enhancement update
This update fixes two issues in lttng-ust and subpackages.
There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed.
lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lttng-ust.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This update fixes two issues in lttng-ust and subpackages.
There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed.
lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux.
rocky-linux-8-x86-64-appstream-rpms
lttng-ust-2.8.1-11.el8.x86_64.rpm
69324bb766990259ee748c0fe4b146ee919478fd8c828cb2c6b48a1126c49a08
RLBA-2019:3412
X libraries bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libICE, libXt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libICE-1.0.9-15.el8.x86_64.rpm
2568b940439e3ab124234560251c5ccf3b82969b9a489a8c944919c1de9893e9
libICE-devel-1.0.9-15.el8.x86_64.rpm
12362899f5263ddce92e808a63b5e86c6f3f3c16e43faa39b71b053f3e8862f0
libXt-1.1.5-12.el8.x86_64.rpm
30df272fc4623a96e973ef361cbc6ea2eff0b5645b34f274c4a58f0ab968d6d0
libXt-devel-1.1.5-12.el8.x86_64.rpm
d41ae80a927a31d8f6111dce855f27ced876a991dcf1bbe1b796d3450ebfca3e
RLBA-2019:3416
pki-core:10.6 and pki-deps:10:6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm
479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85
apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm
3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722
bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm
7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1
glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm
07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524
glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm
3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7
glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e
glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698
glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be
jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca
jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a
jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm
064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706
jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm
f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9
javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60
javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm
ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba
stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm
972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18
velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm
568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882
xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm
8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26
xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm
f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8
xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm
d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783
xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm
143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26
xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm
31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e
xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm
6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9
RLEA-2019:3420
enscript bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for enscript.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
enscript-1.6.6-17.el8.x86_64.rpm
8526cca5224af50c658f7c1e04b192c7722cce4595458a7c2f2c95527cc6b565
RLEA-2019:3425
compat-libtiff3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for compat-libtiff3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
compat-libtiff3-3.9.4-13.el8.x86_64.rpm
1304c7f70782eaa2903ca449db76e1811e0d37c90afd71ee8b511df4d4dcc164
RLEA-2019:3426
libpng15 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpng15.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpng15-1.5.30-7.el8.x86_64.rpm
8ce7dae0d8ef80a5d1feee1ebece3bec3bdef3d185d0a6b64289b01c145b2cd9
RLBA-2019:3439
new packages: gcc-toolset-9-dwz
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-dwz-0.12-1.1.el8.x86_64.rpm
5f8261a71f62b3fb4e1472718b81b1189652e72710d37df6eb38296b5b543f4b
RLEA-2019:3443
new packages: gcc-toolset-9-elfutils
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-elfutils-0.176-5.el8.x86_64.rpm
2eef2ff31d574cea7416d85d9399fd82c8b3e59387c4cc33be87f3912f42bac9
gcc-toolset-9-elfutils-devel-0.176-5.el8.x86_64.rpm
e9e08f5165c99f3c1de380b7918ba1e60a284640d92d0869620aeb062f85394b
gcc-toolset-9-elfutils-libelf-0.176-5.el8.x86_64.rpm
846436e017c2d77367ada9744eff3c9f589343f9e85fc042fc83f498aa0db80a
gcc-toolset-9-elfutils-libelf-devel-0.176-5.el8.x86_64.rpm
be68c4f4732af6e419a828278bdc346e8d00ef69295efe40729edd8bfb19736a
gcc-toolset-9-elfutils-libs-0.176-5.el8.x86_64.rpm
47517201979ac2449b61ab24f82ff5904364fd163721a72aa6350f054350f99e
RLEA-2019:3444
new packages: gcc-toolset-9-valgrind
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-valgrind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-valgrind-3.15.0-9.el8.x86_64.rpm
1eb88892de938b9d4e1bd78a8014cb802c1ef6e412959a38ed7757136db4b731
gcc-toolset-9-valgrind-devel-3.15.0-9.el8.x86_64.rpm
95aa574532e5bcb97b0a73165ef1e2f77270161acba2b4a782ad0429520302fd
RLEA-2019:3447
new module: ruby:2.6
This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm
2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a
rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm
338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197
rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm
b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df
rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm
0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372
RLBA-2019:3449
new packages: gcc-toolset-9-dyninst
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-dyninst-10.1.0-1.el8.x86_64.rpm
6df02dd5b151ecb1e4cdd9025b16fa9e921ef15a6b03533e3b46a215bbea8bb6
RLEA-2019:3454
new packages: gcc-toolset-9-systemtap
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-systemtap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-systemtap-4.1-4.el8.x86_64.rpm
5a6dc6ffb6a37f157aefbfc02164b38c1db6325000e9968867e0a2ebadbbe3af
gcc-toolset-9-systemtap-client-4.1-4.el8.x86_64.rpm
8897e248306da3821d112e1f692c5a635f62ef7983b7330756e3f08191eaae13
gcc-toolset-9-systemtap-devel-4.1-4.el8.x86_64.rpm
0c9dccc40c8aafdffe1122b6060de0f59e5dcaf65027260845dfea524393ccc9
gcc-toolset-9-systemtap-initscript-4.1-4.el8.x86_64.rpm
982d1e1a8db7e14221ed71f6352bc1a52d4c835eb3a84ffb3d7d058b90f3f975
gcc-toolset-9-systemtap-runtime-4.1-4.el8.x86_64.rpm
a48dea3a6f266f31d24387aafb49b337b57c384d96b5348a2d530351f68d3662
gcc-toolset-9-systemtap-sdt-devel-4.1-4.el8.x86_64.rpm
f9953a98d5629774e66ec9c7a23eb9426387406cd2842bfd12664d450c3653f0
gcc-toolset-9-systemtap-server-4.1-4.el8.x86_64.rpm
ec1a0beb49da172370b38ab991bafed35d2e35f057c903ccc37b54fe40d3d2b8
RLBA-2019:3455
new packages: gcc-toolset-9-ltrace
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-ltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-ltrace-0.7.91-1.el8.x86_64.rpm
8417a0a4f057afbee21e8ce44573a85c6059affeeafb4b3fc63436b4051706c8
RLBA-2019:3457
new packages: gcc-toolset-9-gdb
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-gdb-8.3-1.el8.x86_64.rpm
c402ca12acdc3aba7cec6add66be4ac51a0694e46377830c2194f80f85e37cc6
gcc-toolset-9-gdb-doc-8.3-1.el8.noarch.rpm
4aaec69bdf0b16534d6f7a361bd918dc40bf9afa49ad30df39f77d1176b3665b
gcc-toolset-9-gdb-gdbserver-8.3-1.el8.x86_64.rpm
ff3d9a1c2d55a09a49b304e680107d73e0941c45a26d32d0d12c94f8f1e7afb2
RLBA-2019:3460
keycloak-httpd-client-install bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for keycloak-httpd-client-install.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
keycloak-httpd-client-install-1.0-2.el8.noarch.rpm
9881ad6d70f3e5e696adbb2323d52dc3b4749809aa4ae583a5d7b0eb7fa40ac7
python3-keycloak-httpd-client-install-1.0-2.el8.noarch.rpm
dda4420fe5936ec7a993f6417473cd344a1889094be55f8b38a20697fc65a010
RLEA-2019:3461
new module: nodejs:12
This enhancement update adds the nodejs:12 module to Rocky Linux 8. (BZ#1685191)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the nodejs:12 module to Rocky Linux 8. (BZ#1685191)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLBA-2019:3462
libcdio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcdio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libcdio-2.0.0-3.el8.x86_64.rpm
6a060a4f1db6ba186a94e8a733dc16045b90352200136898005ef516101c1c1d
RLBA-2019:3463
idm:client bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-jwcrypto, python-yubico, python-qrcode, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
RLBA-2019:3465
hplip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hplip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
hplip-3.18.4-9.el8.x86_64.rpm
b6ddf49b9620356330be16bd3aadce81e022fd52b3eaeb466332cb0f18bc1dfd
hplip-common-3.18.4-9.el8.x86_64.rpm
b2d6d0450a7b58bf970fc13cb5d3792e37ce0111c9ff99b135d3409471a8fe71
hplip-gui-3.18.4-9.el8.x86_64.rpm
561f58c36b5e5c98848e6b9025edfe5b988590166c776805997f0a549efa4125
hplip-libs-3.18.4-9.el8.x86_64.rpm
fcdeb5dbff590b4c154b56471d0f3592b5998eb20cff0e8c279df0b9134b0d02
libsane-hpaio-3.18.4-9.el8.x86_64.rpm
e59779857cfee8069795c2b567e877cbf81c3cb962bfe9ac98d355381471dd41
RLBA-2019:3466
libkkc-data bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libkkc-data.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libkkc-data-0.2.7-12.el8.x86_64.rpm
8932c5300df500745f4e27cc9210313bfa68501c5b8c98b94f336c32d7358a88
RLBA-2019:3468
sblim-indication_helper bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-indication_helper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-indication_helper-0.5.0-2.el8.x86_64.rpm
9ce614765666f2b1844db8b46414736e62a129fbbaa65a0718ecc8e9946158c3
RLBA-2019:3470
python-rpmfluff bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-rpmfluff.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-rpmfluff-0.5.7.1-2.el8.noarch.rpm
aac41c91e05f36ade4d373f9e316c7f4225253392a845a2876450ef792fc0e2f
RLBA-2019:3471
container-exception-logger bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for container-exception-logger.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
container-exception-logger-1.0.2-3.el8.x86_64.rpm
226566224f9bbee3c0b7ec102ddc1ce3f4e84fdeded9027ae7c41478e23e1063
RLEA-2019:3472
libpmemobj-cpp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpmemobj-cpp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpmemobj++-devel-1.6-2.el8.x86_64.rpm
391cececabace73d050b8bb563f1315638653716f594e042e4e9cb86f61c4b9c
libpmemobj++-doc-1.6-2.el8.x86_64.rpm
9cd1db8bef466f7b30b35dbf9780d661c62b248ae6b8b37264ce18ffe8d8115f
RLBA-2019:3474
satellite-5-client module update
Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5.
This update fixes the following bugs:
* A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450)
* Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5.
This update fixes the following bugs:
* A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450)
* Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445)
rocky-linux-8-x86-64-appstream-rpms__satellite-5-client
dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm
c738f38ce26ddcc540a4b59a1d0c2c133be8f2391b0526185a64142906a30a82
python3-dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm
65996b41301af857a541928e6ab60fe6ab556f582566dc8cdec0d42284ec7cc4
python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
571a4ec8b5b17116dc1105367bf344d2d5e99d7f64cdd139abed68156604ec5f
python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
711ac546b34b0800ad9a428df43abb16d49657037165d9346094b2ef7b1d4838
python3-rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm
4ea6368bf1b879bdeb7927df0cc66a74c94e25f918ff7eb7bcac25a8413543e2
python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
12bed1b1726516134b87a833019a03971acdd2647ee20d835a508123e93e6e28
python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
eaa1b2f91389b2137df2afee36b21556592e777c9c5fea50173ae7d325c4c803
rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
c6ebd58dbc04bc16d86ad30394c59c6252992b6a9b7c05322b1245927b6a78d3
rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
32e4a7d4235da0cca307470b72205611adf539711e176d057fb8deb1e08a5641
rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm
b71d82c660d0b4b0da5eb8e25137387c4a9376ff7d17f53ab57c7b87b6679eb8
rhnsd-5.0.35-3.module+el8.3.0+178+27415451.x86_64.rpm
7f2a23b3dd1997439a3c6e06b639d153a960ce6f0224be8bba18423a69050124
rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
9e363cfb7f6d2dc976c53838116bfafcb58be49f3f261af1ab1f64df89111d9b
rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
bd1750ce82956377455e3b6de5ac8700eb1a34405d6d6568794da3e97330abe5
RLSA-2019:3476
Moderate: squid:4 security and bug fix update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLBA-2019:3480
inkscape:0.92.3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-scour.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__inkscape
python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm
2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1
RLBA-2019:3487
abrt-java-connector bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for abrt-java-connector.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
abrt-java-connector-1.1.0-16.el8.x86_64.rpm
7e6373b1a4d155667f3d37f19a035af395ef37324f31af8968ce3b237fc85fb8
RLBA-2019:3490
ldns bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ldns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ldns-1.7.0-21.el8.x86_64.rpm
579cbe08fbd4d2870363ad94dcaac1517bfefc02621f94d79ddaf783f0ed9338
RLBA-2019:3492
jna bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jna-4.5.1-5.el8.x86_64.rpm
75e7e9bb4c13e26e4665020f7fe0ea4709ba807c6a4221fe1d9d1bedf7492074
RLSA-2019:3494
Important: container-tools:1.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLBA-2019:3500
volume_key bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for volume_key.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
volume_key-0.3.11-5.el8.x86_64.rpm
962a11cdf4fb9ce68fa7fceb99a1f3b34199320dfb11a7e4c0a1bdd7ff805f63
volume_key-devel-0.3.11-5.el8.x86_64.rpm
df504d9ef85876617735bd3316c16cad07524b2622aeb16b7d7078b7af72c657
volume_key-libs-0.3.11-5.el8.x86_64.rpm
f998500b251c3416e796c60f171bced0eb190acd2c4a0a6c0469fdb6072e4eb1
RLBA-2019:3507
qpdf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qpdf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qpdf-7.1.1-10.el8.x86_64.rpm
174b0828f65c2c71d0d4bf8f883e58b0369b16dfed5aec5c917717a4270026ff
qpdf-doc-7.1.1-10.el8.noarch.rpm
5e25af871159ebffd4b486b696c7cc65f5a0ab695f62237e8f46ba5c43fcd696
qpdf-libs-7.1.1-10.el8.x86_64.rpm
e36f1b137bf58ed4b21f333b59fbb93b4855cb9045a2c41322320e9cf58ec2c9
RLEA-2019:3557
libtalloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cmocka, nss_wrapper, uid_wrapper, socket_wrapper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nss_wrapper-1.1.5-3.el8.x86_64.rpm
5ba1254970834a881d6be6a64f03d1a5660602f5cc40f351c4d46cb04b36e5d3
RLBA-2019:3623
NetworkManager bug fix and enhancement update
An update for NetworkManager is now available for Rocky Linux 8.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
An update for NetworkManager is now available for Rocky Linux 8.
rocky-linux-8-x86-64-appstream-rpms
NetworkManager-libreswan-1.2.10-4.el8.x86_64.rpm
60d73cbb869b8753e3627cf96d9fc5f175bc8719e912958ac88274852927ac7b
NetworkManager-libreswan-gnome-1.2.10-4.el8.x86_64.rpm
cab52e3f13b05fa3c1211589d2d6550fecb49d5a5dde5581995693d6c85a8294
RLSA-2019:3703
Low: libvorbis security update
The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates.
Security Fix(es):
* libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392)
* libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libvorbis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates.
Security Fix(es):
* libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392)
* libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvorbis-1.3.6-2.el8.x86_64.rpm
2fc30d8b8e41b392adc0ecd2cd63377cc7bba4c2664d9b0437b2c6bdeed5c620
RLSA-2019:3708
Moderate: mariadb:10.3 security and bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358)
Security Fix(es):
* mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510)
* mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537)
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628)
* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739)
* mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758)
* mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for asio, Judy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358)
Security Fix(es):
* mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510)
* mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537)
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628)
* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739)
* mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758)
* mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLSA-2019:3735
Critical: php:7.2 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Critical
An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpm
4b8310f3980d49aafc8a9098f45f69cab6c6d24c967f8b357541a22621c47cee
libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475
libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372
libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5
php-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpm
53d93e110ac02f191341248649791187f8474454500c2137eefe0c3fa35a68e9
php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482
php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68
php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm
52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b
RLSA-2019:3736
Critical: php:7.3 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Critical
An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm
c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45
libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729
libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61
libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d
php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm
33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744
php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5
php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc
php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7
RLBA-2019:3785
libcacard bug fix and enhancement update
The libcacard packages contain the Common Access Card (CAC) emulation library.
This update fixes the following bug:
* Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477).
Users of libcacard are advised to upgrade to these updated packages, which fix this bug.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcacard.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libcacard packages contain the Common Access Card (CAC) emulation library.
This update fixes the following bug:
* Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477).
Users of libcacard are advised to upgrade to these updated packages, which fix this bug.
rocky-linux-8-x86-64-appstream-rpms
libcacard-2.7.0-2.el8_1.x86_64.rpm
dcc0805bce58d3f08b032fc8dae90ff8a0c35da6754643c25cd4c8f08acb81e1
libcacard-devel-2.7.0-2.el8_1.x86_64.rpm
68396d58b579bd54d1428654d9811ca4089ef7096677e225e6f868d16de147be
RLBA-2019:4266
inkscape:0.92.3 bug fix update
Bug Fix(es):
* New inkscape (rpm) is actually older than current (BZ#1773655)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-scour.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* New inkscape (rpm) is actually older than current (BZ#1773655)
rocky-linux-8-x86-64-appstream-rpms__inkscape
python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm
2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1
RLBA-2019:4268
idm:DL1 bug fix update
Bug Fix(es):
* IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
RLSA-2019:4269
Important: container-tools:rhel8 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)
* backport json-file logging support to 1.4.2 (BZ#1770176)
* Selinux won't allow SCTP inter pod communication (BZ#1774382)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)
* backport json-file logging support to 1.4.2 (BZ#1770176)
* Selinux won't allow SCTP inter pod communication (BZ#1774382)
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:4273
Important: container-tools:1.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
RLBA-2019:4274
virt:rhel bug fix update
Bug Fix(es):
* Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829)
* [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133)
* Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134)
* [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829)
* [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133)
* Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134)
* [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2019:4275
nodejs:12 bug fix update
The following packages have been upgraded to a later upstream version: nodejs (12.13.1). (BZ#1776116)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The following packages have been upgraded to a later upstream version: nodejs (12.13.1). (BZ#1776116)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2020:0279
Moderate: virt:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLEA-2020:0330
nodejs:12 enhancement update
The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLEA-2020:0346
new module: postgresql:12
This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLBA-2020:0347
perl-DBD-Pg:3.7 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
RLSA-2020:0348
Important: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for containernetworking-plugins, python-podman-api, udica, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLSA-2020:0579
Important: nodejs:10 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.19.0).
Security Fix(es):
* nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)
* nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604)
* nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606)
* npm: Symlink reference outside of node_modules folder through the bin field upon installation (CVE-2019-16775)
* npm: Arbitrary file write via constructed entry in the package.json bin field (CVE-2019-16776)
* npm: Global node_modules Binary Overwrite (CVE-2019-16777)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.19.0).
Security Fix(es):
* nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)
* nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604)
* nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606)
* npm: Symlink reference outside of node_modules folder through the bin field upon installation (CVE-2019-16775)
* npm: Arbitrary file write via constructed entry in the package.json bin field (CVE-2019-16776)
* npm: Global node_modules Binary Overwrite (CVE-2019-16777)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2020:0598
Important: nodejs:12 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.16.1).
Security Fix(es):
* nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)
* nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604)
* nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.16.1).
Security Fix(es):
* nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)
* nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604)
* nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2020:1293
Important: nodejs:12 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2020:1317
Important: nodejs:10 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2020:1379
Important: container-tools:rhel8 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495)
* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188)
* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194)
* fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016)
* buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for udica, python-podman-api, slirp4netns, containernetworking-plugins, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495)
* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188)
* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194)
* fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016)
* buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119)
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLBA-2020:1354
gcc-toolset-9-binutils bug fix update
GCC Toolset is a compiler toolset that provides recent versions of development
tools. GCC Toolset is an Application Stream packaged as a Software Collection.
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Bug Fix(es):
* Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default.
To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system.
Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development
tools. GCC Toolset is an Application Stream packaged as a Software Collection.
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Bug Fix(es):
* Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default.
To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system.
Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958)
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpm
c4fd1717fd48949497da91cc88989d24e81fe925bb57e995aac790154d865c41
gcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpm
4664b94c012a43fd9cbb22dbb2b5717b8f1c76453bdd654a0df1ce5c5a1ebe88
RLSA-2020:1358
Important: virt:rhel security and bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711)
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711)
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2020:1360
Important: container-tools:1.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
RLEA-2020:1575
perl-Convert-ASN1 and perl-LDAP bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-LDAP, perl-Convert-ASN1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
perl-Convert-ASN1-0.27-17.el8.noarch.rpm
de1154a5c04f83967e174cbba8f9bd58092b7e14b2b5eca7e54a3773682fa2b7
perl-LDAP-0.66-7.el8.noarch.rpm
5432e985d9d62e78169dd98c5a7d0de76b1a31d59f04fa3909a1ab0613d8ee81
RLSA-2020:1577
Moderate: exiv2 security, bug fix, and enhancement update
The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)
Security Fix(es):
* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)
* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)
* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)
* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)
* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)
* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)
* exiv2: information leak via a crafted file (CVE-2018-11037)
* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)
* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)
* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)
* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)
* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)
* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)
* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)
* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)
* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)
* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)
* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)
* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)
* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)
* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)
* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)
* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)
* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)
* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)
* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)
* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libgexiv2, gnome-color-manager, gegl, exiv2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)
Security Fix(es):
* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)
* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)
* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)
* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)
* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)
* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)
* exiv2: information leak via a crafted file (CVE-2018-11037)
* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)
* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)
* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)
* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)
* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)
* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)
* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)
* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)
* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)
* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)
* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)
* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)
* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)
* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)
* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)
* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)
* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)
* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)
* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)
* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gegl-0.2.0-39.el8.x86_64.rpm
9da238520faee587b7d4c213e996ed1848c00dd0dd80efe1e497f0e91197e443
gnome-color-manager-3.28.0-3.el8.x86_64.rpm
c24a3854ebc59169cedd0d384f7dff9047c81299d5ab7b13c282dbbd20dd55bd
libgexiv2-0.10.8-4.el8.x86_64.rpm
d6e26f8aea4dfd969f068749aeb11b99ea1a19f85b311d4c2414fc3c1332db43
RLEA-2020:1579
whois bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for whois.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
whois-5.5.1-2.el8.x86_64.rpm
2222561be8aa7f17033cf8dcbf8bd823ac3c8ec61e11da943008ecba6726bc37
whois-nls-5.5.1-2.el8.noarch.rpm
379cce764a95fc9cdcb5fdcb29a0ce4e18673fbf5322373cda4b933c826884de
RLEA-2020:1587
virt:rhel bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2020:1599
libselinux-python:2.8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libselinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__libselinux-python
libselinux-python-2.9-2.1.module+el8.4.0+532+c114ce35.x86_64.rpm
ae7f81152647d4c05b01209e235a4844d6f51a82e70168bb11966ca43cc776ff
RLSA-2020:1605
Moderate: python27:2.7 security, bug fix, and enhancement update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944)
Security Fix(es):
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060)
* python: Cookie domain check returns incorrect results (CVE-2018-20852)
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
* python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056)
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944)
Security Fix(es):
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060)
* python: Cookie domain check returns incorrect results (CVE-2018-20852)
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
* python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056)
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm
6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc
python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568
python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm
cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
RLBA-2020:1606
python-dbus-python-client-gen bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-dbus-python-client-gen.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-dbus-python-client-gen-0.7-3.el8.noarch.rpm
7d569bd78a0864038991eb97d5612f8f03c12187d7ab4cd00a3dc8624d681a7e
RLEA-2020:1607
http-parser bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for http-parser.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
http-parser-2.8.0-9.el8.x86_64.rpm
7cc537d8110104b9e9a9d7e1602fea66bf3f3258e0475cc1327f0f228f339e21
RLEA-2020:1611
input stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xkeyboard-config, libevdev, libxkbcommon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxkbcommon-0.9.1-1.el8.x86_64.rpm
51f79ea9268dae9826ece0bc98c135dd5ca62b08581694ae5401971690fd3766
libxkbcommon-devel-0.9.1-1.el8.x86_64.rpm
bc172de2c44bdbf518ba6558aa8ae7db3ee9779f00a456278fa2247369b6c17b
libxkbcommon-x11-0.9.1-1.el8.x86_64.rpm
d8864abf376820a1a7ac8060fa753486b6a189f1ed3f9287080740dcd89d511f
xkeyboard-config-2.28-1.el8.noarch.rpm
66853f37796011f8bd91e5068c80e00d74d7a98d1c468f416116bac1d3d4db6e
xkeyboard-config-devel-2.28-1.el8.noarch.rpm
dc85f4de371ffcf6bff0e96e67fc3af9671509bc37055ff54635e1775ac6497e
RLSA-2020:1616
Low: irssi security update
Irssi is a modular IRC client with Perl scripting.
Security Fix(es):
* irssi: use after free when sending SASL login to server (CVE-2019-13045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for irssi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Irssi is a modular IRC client with Perl scripting.
Security Fix(es):
* irssi: use after free when sending SASL login to server (CVE-2019-13045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
irssi-1.1.1-3.el8.x86_64.rpm
52d26652faf272caa1948ed66b71ee827443f8a8a374e99186a5afda8bab7085
RLBA-2020:1617
pmdk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pmdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
daxio-1.6.1-1.el8.x86_64.rpm
1e9c5f2802c05afb6f6a3245e63f9903da9624c37af3844eb7222ac0b402a3f0
libpmem-1.6.1-1.el8.x86_64.rpm
9390e81eff676f6d996eeee96bd8b357eb3bdbfe33e8f58eb992214d836437ca
libpmemblk-1.6.1-1.el8.x86_64.rpm
3542e03b622e8ccab260c766656e20eda1108986d18a417b5c2bfbe87a4ec0e8
libpmemblk-devel-1.6.1-1.el8.x86_64.rpm
54855006772d493e4b01789c8d61a53cfd4e65e0f4892d921b32ba7c7fdd866a
libpmem-devel-1.6.1-1.el8.x86_64.rpm
db5ffdd71e17560f76194194ab8991f101dfc2ebfcc0d0eabe2b5be29431b392
libpmemlog-1.6.1-1.el8.x86_64.rpm
3f6888905e519eba4431e5131c93f483f5d48ee4343069d27de3148e81ddcdca
libpmemlog-devel-1.6.1-1.el8.x86_64.rpm
ada2820ea6d421c33b3a0ca644bf3bda157467e2ca319d29f68a3567cb20f28b
libpmemobj-1.6.1-1.el8.x86_64.rpm
b416032faf71a26ee22012a6a4af0a6f219139dc35140e88a63c1ed54c90bbf7
libpmemobj-devel-1.6.1-1.el8.x86_64.rpm
45c5c07ab0b19824c36f7add9f3cc256a204184da541a850585a1582254a748d
libpmempool-1.6.1-1.el8.x86_64.rpm
baaddd2fa82996cb11985951f91409c99ca26b7f4a2d634d0be44dafe830a74d
libpmempool-devel-1.6.1-1.el8.x86_64.rpm
5f7cdb35109a3a9f82170633093b9ed47479ac3203740096fc15069f645c646b
librpmem-1.6.1-1.el8.x86_64.rpm
6d86d6901893a4d0a6e890ebfa528a2338bb53f74d5a50201bbb41197d48afc4
librpmem-devel-1.6.1-1.el8.x86_64.rpm
462852e411c339993af8ea83ab6e8c9784c100aa9457054148c9acbd361fad7c
libvmem-1.6.1-1.el8.x86_64.rpm
b2efd8c272562f2f2176edb821d32a9545f2da5e2781147d60cd2f1f42bbba04
libvmem-devel-1.6.1-1.el8.x86_64.rpm
f236be66a4a07483f19f9d5541a9dcfa7e3d21e6767b465856e1d499cb5bc642
libvmmalloc-1.6.1-1.el8.x86_64.rpm
6717873d36ea17ccc0e0dd9d33d53c832813b48d36b8d09ff0126deb79f7b578
libvmmalloc-devel-1.6.1-1.el8.x86_64.rpm
3db9411351c74d3ff72af48de27fc594e26c29b8ebdba3e740ad1b4193d46bfd
pmempool-1.6.1-1.el8.x86_64.rpm
161a8ed305488e6003e0e3d5d0b6f6668fcefebe5cc7113ee340eca83bd4fd96
pmreorder-1.6.1-1.el8.x86_64.rpm
eafef0efebf3a85e93f7adce92f394839ddfd0d9652e534201da7c6a9a046030
rpmemd-1.6.1-1.el8.x86_64.rpm
7b19fda765ef96e67ab9a51598f1f3e5b4fc5737e4d02d44cc2c7327a143abc6
RLEA-2020:1618
pmdk-convert bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pmdk-convert.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pmdk-convert-1.7-1.el8.x86_64.rpm
20230e1a1da258f0ca2610927011ed1503d66c644ef86e537f393275835db261
RLBA-2020:1622
python-greenlet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-greenlet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-greenlet-0.4.13-4.el8.x86_64.rpm
b420503c732ab66fa5273c9958e6fec08c6fc41d9fd8a73df9a944a418a89656
RLBA-2020:1623
python-flask bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-flask.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-flask-0.12.2-4.el8.noarch.rpm
37969a333ba99baa0be2ac55b1d5e624630cd26a45ab29dc8f9b752da1f2ad97
RLSA-2020:1624
Moderate: php:7.2 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981)
Security Fix(es):
* php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020)
* php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637)
* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638)
* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639)
* php: Invalid read in exif_process_SOFn() (CVE-2019-9640)
* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)
* php: Buffer over-read in exif_read_data() (CVE-2019-11040)
* php: Buffer over-read in PHAR reading functions (CVE-2018-20783)
* php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021)
* php: memcpy with negative length via crafted DNS response (CVE-2019-9022)
* php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023)
* php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024)
* php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034)
* php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035)
* php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036)
* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)
* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php, php-pecl-apcu, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981)
Security Fix(es):
* php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020)
* php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637)
* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638)
* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639)
* php: Invalid read in exif_process_SOFn() (CVE-2019-9640)
* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)
* php: Buffer over-read in exif_read_data() (CVE-2019-11040)
* php: Buffer over-read in PHAR reading functions (CVE-2018-20783)
* php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021)
* php: memcpy with negative length via crafted DNS response (CVE-2019-9022)
* php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023)
* php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024)
* php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034)
* php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035)
* php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036)
* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)
* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpm
4b8310f3980d49aafc8a9098f45f69cab6c6d24c967f8b357541a22621c47cee
libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475
libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372
libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5
php-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
e8c89eb016473a87dee62f6608b3f052a01f3fdaac8a3bee8bf1bc3fb14e4a91
php-bcmath-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
68aeede7037745de7d9c4a87f4e95b412ad312eacd815f5135f0af710719fe2a
php-cli-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
6d2cdcd5dfec65e866d823db778aaebe2b7961d70a07431087e870ea48cf7237
php-common-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
ff4d4ae4646cb95eb1504ef261bfc32509af509b4e5feff09e4340b57044452c
php-dba-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
d33a92302c7879f27e807621b72305de719831de2e40ab27fa36e06e8be54440
php-dbg-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
d3e92a616a1626dd40720fadf951f03eeeb7bbd7e90d6027347edd771f8d0445
php-devel-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
366a440d32dc12d9b7ae610b0c0cae66f62f4ed79877112fadeb0197880d54b1
php-embedded-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
b24fe44153454b0a85ebeff5c454810544eaa702090cc5db737ae0de0c1ee852
php-enchant-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
c6d5229c771398c10a5b5f5ec3f92ce45b68f8fafd3d6df231a96a4235c3809a
php-fpm-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
8217ad0c7d917edf411b295716a0cbddb1a20328708db91287d6f632355a2b54
php-gd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
1e689dca2b676adb347c55fddd778acdbca3aac326b16dd8e6c58a6d908bb1e8
php-gmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
be29f61e1366cd19956e8ef1741c74248ff21641df66d58e20a2bbc3328cb0e8
php-intl-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
6a839a9c155e561efc2b3d8e3d72353bc3f9a61d8a3c4a471ff68f12273ef502
php-json-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
5561451a9dfdb99c2af45d2011a208e3b0337c23591e85fafe8e273523554bc3
php-ldap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
0270a8e9b01f280a9fa939c41f0cca4c513bc4d481099d388b28ba0f4722823d
php-mbstring-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
6e361ea39d2a5e9bf2424fbf4dcf105ef08391350932ae6bfab424a50a98d745
php-mysqlnd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
e848cb92481789dd32bd6e4a12b5ca45bd72dd958bb7251e51e75f96947baf4e
php-odbc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
50301245d22ac3c3d1ebfb6f20b3791924dbe50b49c6854948b48b23734f019b
php-opcache-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
e3c38b730366995ecf4164bdbcdd12547a284d65df7dae39652d4a9f33bee8aa
php-pdo-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
28e87c9a557ba73e0cbc0d1fea7c673fbd02239fd94a3c10531a375f25e48ada
php-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpm
53d93e110ac02f191341248649791187f8474454500c2137eefe0c3fa35a68e9
php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482
php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68
php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm
52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b
php-pgsql-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
febe0f6ea94f80ebf7ef18875ee5c60517089945b109b12ab471a228bb3a8b6b
php-process-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
df61d9b4cac0b42f6e804fa37c1bd38b8f5d853561a52b0cd1065215ace16b1b
php-recode-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
893ae8e57613b51870b3c9c72cbf6fd3ff19071a45b755c69b5e3ef460067f62
php-snmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
ce229765886ed0052080a929dab4c81e0d3a309e6bcecf0c21cd4238e93d9214
php-soap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
897a5df0e71a0d773ae24e1223b73b7c79a9387da99749e6c07290268c7f54dc
php-xml-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
aff53a597cfc74f4c819d3106261135fe4300cf5c64e2d6f8f2e3d0a68b1ee1c
php-xmlrpc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
190fa61efe99be2f949fcb25f8d456893bf14d38976dfd7c5883efaa2e8ced48
RLBA-2020:1626
ltrace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ltrace-0.7.91-28.el8.x86_64.rpm
328d16d21ea8d28ea824abf0efd162bc4dfd16dcf3191a989d0749ec22d829ec
RLSA-2020:1631
Low: GStreamer, libmad, and SDL security, bug fix, and enhancement update
The GStreamer library provides a streaming media framework based on graphs of media data filters.
The libmad package is an MPEG audio decoder capable of 24-bit output.
Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.
Security Fix(es):
* libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libmad, gstreamer1-plugins-ugly-free, gstreamer1-plugins-bad-free, SDL2, orc, gstreamer1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GStreamer library provides a streaming media framework based on graphs of media data filters.
The libmad package is an MPEG audio decoder capable of 24-bit output.
Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.
Security Fix(es):
* libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gstreamer1-1.16.1-2.el8.x86_64.rpm
74abf0a1fc61255b2dcd15e305266551beb9b2d111f0a52a5aef27c62c873450
gstreamer1-devel-1.16.1-2.el8.x86_64.rpm
73a77d1ce7274051e7cfb6237cbf4c4e4b6421902799183421370fc8f73f140b
gstreamer1-plugins-bad-free-1.16.1-1.el8.x86_64.rpm
111298c70ce191ced925d6c74da4420df2352e57dad7f199c5df2fd788ab7143
gstreamer1-plugins-ugly-free-1.16.1-1.el8.x86_64.rpm
6844c81cb360ab071008ba774447848cbe2ff75033aedbdbec3a0e13474be7af
libmad-0.15.1b-25.el8.x86_64.rpm
1134b11d9467844dc6cf81ddb59914c5b3c335b0fd9ae5d77e49b885d3bda446
orc-0.4.28-3.el8.x86_64.rpm
38d6384654084c9409e6b6e965278d3c023e7a3c0d4cc032fc1472499e4e4188
orc-compiler-0.4.28-3.el8.x86_64.rpm
5bb52ac79454dc2e2576d0f17d4bbd2d089db071a19c99ce1f3ea23989901dbe
orc-devel-0.4.28-3.el8.x86_64.rpm
b06be7958b80375c3aba49acf148d5ed42ad20ab035a4a9d7635ddd25167f78f
RLBA-2020:1633
xorg X11 server and driver bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libepoxy, wayland, libxcb, mesa-libGLw, wayland-protocols, libXpm, xorg-x11-drv-libinput, pixman, xorg-x11-drv-wacom.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxcb-1.13.1-1.el8.x86_64.rpm
f879eab6ae5acfddf7c6aa6cb7192fec725940babca04b33388fb1f0b5aadb5b
libxcb-devel-1.13.1-1.el8.x86_64.rpm
6228a598daace6500dd10a86572eaca31560c6e1003f87f8d831dc66bb2d5750
libXpm-3.5.12-8.el8.x86_64.rpm
d5594de8b7df3e9c907be53eb619f027d1cc1b74cdc8c3b9215cecfaf96bfefe
libXpm-devel-3.5.12-8.el8.x86_64.rpm
0bd3d99a95fd5b421cb25d618c0a5539e776a14de9bb71ddafb679c6273bff4c
mesa-libGLw-8.0.0-18.el8.x86_64.rpm
4a62430944ac2e54cd3aaf28e1fd6b47341090643330a2794f9b5d1f7309b2a4
mesa-libGLw-devel-8.0.0-18.el8.x86_64.rpm
d7bb96bda34dae57b388c1f479c1073696ef6b2a7577ae947df0829d16a647d4
xorg-x11-drv-libinput-0.29.0-1.el8.x86_64.rpm
5dd25511b396ccfe839c16c47bd213c736c4f1c1d53849a99860ba8a3ee483d0
xorg-x11-drv-wacom-0.38.0-1.el8.x86_64.rpm
05c0a87dcd9689fcb21f11141f298146f8931535095c9d33d8ad4156e82350ea
xorg-x11-drv-wacom-serial-support-0.38.0-1.el8.x86_64.rpm
a35a692b1d7acf6bbdcdde09020c793249d65ad0d5f7e6a6446ad388e4956661
RLEA-2020:1640
idm:DL1 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
RLSA-2020:1644
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540)
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)
* jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942)
* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943)
* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jackson-core, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, jackson-annotations, jackson-databind, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540)
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)
* jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942)
* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943)
* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm
479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85
apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm
3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722
bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm
7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1
glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm
07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524
glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm
3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7
glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e
glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698
glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be
jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9
jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73
jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9
jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca
jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a
jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm
064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706
jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm
f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9
javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60
javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm
ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba
stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm
972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18
velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm
568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882
xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm
8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26
xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm
f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8
xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm
d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783
xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm
143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26
xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm
31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e
xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm
6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9
RLSA-2020:1650
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921)
* containers/image: Container images read entire image manifest into memory (CVE-2020-1702)
* podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921)
* containers/image: Container images read entire image manifest into memory (CVE-2020-1702)
* podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLBA-2020:1661
xorg-x11-drv-qxl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xorg-x11-drv-qxl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xorg-x11-drv-qxl-0.1.5-11.el8.x86_64.rpm
c9ab74b68da2c0a8021a878d52335943183eb7f0ce1b2d013c5ae7c46de513f8
xorg-x11-server-Xspice-0.1.5-11.el8.x86_64.rpm
6e37bd87969271a978c82782d84c47b3f79eeac1dbb942ebe1cd03ce4d47a6ac
RLBA-2020:1666
gcc-toolset-9 bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-9.0-4.el8.x86_64.rpm
3fb04ea97ffd31864961c227504c19bb08e0962250d78a56643bcbdeae512d6c
gcc-toolset-9-build-9.0-4.el8.x86_64.rpm
112a38a574d673354c64ad19318b927d6330e752518613d4a782c74a2a879b84
gcc-toolset-9-perftools-9.0-4.el8.x86_64.rpm
3b049cd421211ea3db048eb15cb19167c3eb621590fe05eddcbd23ab7de91f98
gcc-toolset-9-runtime-9.0-4.el8.x86_64.rpm
6f042a67a613e193878d9b3501c4c79295fee3e46cf6a1d4852c1a87495e485b
gcc-toolset-9-toolchain-9.0-4.el8.x86_64.rpm
478abaa58914ce5a4e6c16b7d7d2b9877d7dc307a7aeb1461f7e0fd0ff264828
RLBA-2020:1669
python-networkx bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-networkx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-networkx-1.11-16.1.el8.noarch.rpm
f36caec5411961dccb9763811ad3bf42705e11aaf0e35f8d540e999e50aa93d1
python3-networkx-core-1.11-16.1.el8.noarch.rpm
d2a88d113da8555607b9e2e85ebfed61a061d4da03098456722838993c25229c
RLBA-2020:1673
perl-IO-Socket-SSL bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-IO-Socket-SSL.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL
perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm
66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd
RLEA-2020:1675
new module: container-tools:2.0
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:2.0 module to Rocky Linux 8.
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:2.0 module to Rocky Linux 8.
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLSA-2020:1686
Low: libmspack security and bug fix update
The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.
Security Fix(es):
* libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libmspack.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.
Security Fix(es):
* libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libmspack-0.7-0.3.alpha.el8.4.x86_64.rpm
ffe3213cb432e8c9066e152afd41d5ff306eb626c83ad417f8ff23e7e5f9cb0f
RLBA-2020:1690
gtk-vnc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gtk-vnc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gtk-vnc2-0.9.0-2.el8.x86_64.rpm
2bfff0a24ce4eb6d52ec696e96c58aaf68bf49b081c47993bc451ce8446c24c9
gvnc-0.9.0-2.el8.x86_64.rpm
15fed146b4d63617c6855bffd308d6dd19c47968c01e9fe4d7252715703b341a
RLEA-2020:1692
php:7.3 enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for php-pear, php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm
c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45
libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729
libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61
libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d
php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm
33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744
php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5
php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
c488f0dba64ba85b4b9888f0ecef07cac2a26a600dee305c50c4eccbd22f018f
php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7
RLEA-2020:1694
new module: python38:3.8
This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-more-itertools, pytest, python-psycopg2, python-urllib3, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python-asn1crypto, python-py, python-chardet, python-markupsafe, python-pluggy, Cython, python-psutil, python-wcwidth, babel, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm
54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm
6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm
d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba
python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm
7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2
python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm
21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9
python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm
5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
RLBA-2020:1695
luksmeta bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for luksmeta.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libluksmeta-devel-9-4.el8.x86_64.rpm
8de7884362e85eead893c80b480f0aacf04435ead879224f1f271e6784395e70
libluksmeta-9-4.el8.x86_64.rpm
3db29d50509fd273d410b113d96cee5cfc30660aa09b3e31414b92bf4557df8f
luksmeta-9-4.el8.x86_64.rpm
d75fee723d6411a531fca66be33b001c5d990f59d08fcadd80fb104c8c207466
RLBA-2020:1700
libbytesize bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libbytesize.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libbytesize-1.4-3.el8.x86_64.rpm
bf0c4717f287401f9e7ef99509de83cb521164ac666a9f787d5e9d6a6baf58ec
python3-bytesize-1.4-3.el8.x86_64.rpm
669e9ddced50415ef55fe469d58a97e8fdd7cd582162a15135d1705a73bdaa7d
RLEA-2020:1707
spice-streaming-agent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-streaming-agent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-streaming-agent-0.3-2.el8.x86_64.rpm
b0510e805197699ce2ebfff6be3462cd1c6a6ed966ee376d896f0172f5f9ea9d
RLSA-2020:1708
Moderate: liblouis security and bug fix update
Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg).
Security Fix(es):
* liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684)
* liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685)
* liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577)
* liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for liblouis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg).
Security Fix(es):
* liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684)
* liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685)
* liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577)
* liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
liblouis-2.6.2-21.el8.x86_64.rpm
61df0b3c8c29746e62bdb76309ebd73857b125f47213671592f97a63bb5789f1
python3-louis-2.6.2-21.el8.noarch.rpm
89093ded5e8ce00b591e22de53b605d382def59dd9758607f9b211fbd71836b3
RLEA-2020:1709
new package: virt-p2v
Virt-p2v is a tool for conversion of a physical server to a virtual guest.
This enhancement update adds the virt-p2v package to Rocky Linux 8. (BZ#1704180)
All users who require virt-p2v are advised to install this new package.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-p2v.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virt-p2v is a tool for conversion of a physical server to a virtual guest.
This enhancement update adds the virt-p2v package to Rocky Linux 8. (BZ#1704180)
All users who require virt-p2v are advised to install this new package.
rocky-linux-8-x86-64-appstream-rpms
virt-p2v-maker-1.42.0-5.el8.x86_64.rpm
2288be0afbe6ef9ca5e037cb6d4508c644dcd34ae82c6aa040519f4f2af90513
RLEA-2020:1711
new module: maven:3.6
This enhancement update adds the maven:3.6 module to Rocky Linux 8. (BZ#1783926)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the maven:3.6 module to Rocky Linux 8. (BZ#1783926)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm
7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091
apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm
d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8
apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm
aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6
apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm
c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb
apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm
5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8
atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm
38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04
cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2
geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm
9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb
google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm
afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e
guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb
httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm
0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8
jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm
72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393
jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb
jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8
jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm
f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff
maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf
maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91
plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm
163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68
plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm
01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0
plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm
fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08
plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm
b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e
plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm
93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de
plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm
7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5
sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf
slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a
RLBA-2020:1713
gcc-toolset-9-binutils bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Bug Fix(es):
* Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default.
To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system.
Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Bug Fix(es):
* Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default.
To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system.
Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417)
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpm
4664b94c012a43fd9cbb22dbb2b5717b8f1c76453bdd654a0df1ce5c5a1ebe88
gcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpm
c4fd1717fd48949497da91cc88989d24e81fe925bb57e995aac790154d865c41
RLEA-2020:1718
jolokia-jvm-agent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jolokia-jvm-agent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jolokia-jvm-agent-1.6.2-3.el8.noarch.rpm
3d359cdb5143b577cca66c7991883d437d25806cf0391361055b2e348b8b3490
RLBA-2020:1723
parfait:0.5 bug fix update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for uom-parent, parfait, uom-systems, uom-se, si-units, uom-lib, unit-api, log4j12.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__parfait
si-units-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm
6d238596ee6d6869db170d90a9e9839e5c028ff1678dc08a7e8378978eb08b0b
si-units-javadoc-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm
a20389dc20459d8e277b084b313764a9171b7a63c2a83066dcf5c7de70f09aa5
unit-api-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm
45f3ea7141aeeab01121669fb9d1c71287d16b63126ead63ee3a0fa485fb6e34
unit-api-javadoc-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm
14e336b8562c8c326f1bf24d01515952681212155fdeee137857ba73261b7b0d
uom-lib-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm
94e383d27797c3563dd284f31e97761f3c859fabd6d43e6e2ddcfe2d66026d59
uom-lib-javadoc-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm
e28c245a0b6063f0cbae3e3dd0f8512c857d581acd0425605e372967df6e2d61
uom-parent-1.0.3-3.module+el8.3.0+214+edf13b3f.noarch.rpm
665b5f7355b65fd698defae938b12f45a0cbd09982662343e43d1e75bd76c628
uom-se-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm
1c5a33c14a4db1f5c1dde1b82c0847034c2b6643969a5d5511dade96439129f9
uom-se-javadoc-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm
bb06bb8d9e6d73cf8ed4d8a4c53289397dff79610badd5740d5e98c5250083f5
uom-systems-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm
ff8729c2bfb1bc8ee1d487882734d0e07fcf552e6eb3223b7d2ddd1686880b14
uom-systems-javadoc-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm
1bcb94fdab29d21ff7974980bb81f9d5165e81eeeaea52f0360905b1a9f8a187
RLBA-2020:1726
ipvsadm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipvsadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ipvsadm-1.31-1.el8.x86_64.rpm
791359c3e500082c6daa7610d495b285c8c4b174be527cd02b90d71e4b59a7b6
RLBA-2020:1737
gcc-toolset-9-strace bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-strace-5.1-6.el8.x86_64.rpm
1ddb53e90fbdfb19a7d0a556723e6394ecd1a16af69878e8637ba86e9e9b341b
RLBA-2020:1741
python-reportlab bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-reportlab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-reportlab-3.4.0-8.el8.x86_64.rpm
89753b1b2534dbc2c44b2cbd5b5ca7c06a1bedafbca56087c63a2ded0d9c2acd
RLBA-2020:1742
gcc-toolset-9-make bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-make.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-make-4.2.1-2.el8.x86_64.rpm
a886becf7389c72de970fa8bb32647d4348c543ce91f55a8c6af16c21aacfe13
gcc-toolset-9-make-devel-4.2.1-2.el8.x86_64.rpm
e0538a389200d2a4f4e1285e12d249d7e2918c94eba5b3bb5163ae3b4641a02c
RLBA-2020:1743
librevenge bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librevenge.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
librevenge-0.0.4-12.el8.x86_64.rpm
e02f71c18ad100ae01818134e706e2e75e6cfa5d4c14189f578205f8d6654593
librevenge-gdb-0.0.4-12.el8.x86_64.rpm
cb084768cf9ad94234a0923a4b6954a47963231f54c4d1259264965b06d50573
RLBA-2020:1745
python-pycurl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pycurl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pycurl-7.43.0.2-4.el8.x86_64.rpm
64ea29c73cbbf33a54abfeebe18880ed90d2b313f5f186a47247ffe3dfe0946a
RLBA-2020:1750
sblim-cmpi-base bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-cmpi-base.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-cmpi-base-1.6.4-14.el8.x86_64.rpm
4fdd9072c8d73b641504b5dbb352d17bc7afce04a11bf0a1233f5662ed08bfdb
RLBA-2020:1752
driverctl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for driverctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
driverctl-0.111-1.el8.noarch.rpm
71db251f4803f836e8613ed8eddfe590a275a40ab60918d207bbfb8220ef6620
RLBA-2020:1754
gcc-toolset-9-annobin bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-annobin-9.08-4.el8.x86_64.rpm
f82e9f47e52e802b14041b0a2abd8213e3941a33acc643fe94eb9a346f750d45
RLSA-2020:1926
Important: container-tools:1.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* conflicting requests: failed to install container-tools:1.0 (BZ#1813776)
* podman run container error with avc denied (BZ#1816541)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, slirp4netns, oci-systemd-hook, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* conflicting requests: failed to install container-tools:1.0 (BZ#1813776)
* podman run container error with avc denied (BZ#1816541)
rocky-linux-8-x86-64-appstream-rpms__container-tools
container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm
a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm
a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051
RLBA-2020:1928
nodejs:12 bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es):
* Rebuild the nodejs:12 module for Rocky Linux 8.2 (BZ#1811502)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es):
* Rebuild the nodejs:12 module for Rocky Linux 8.2 (BZ#1811502)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLBA-2020:1929
nodejs:10 bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es):
* Rebuild the nodejs:10 module for Rocky Linux 8.2 (BZ#1811499)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es):
* Rebuild the nodejs:10 module for Rocky Linux 8.2 (BZ#1811499)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2020:1931
Important: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLSA-2020:1932
Important: container-tools:rhel8 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLSA-2020:2041
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519)
* squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945)
* squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519)
* squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945)
* squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLBA-2020:2456
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman: Please backport correction patch for the native container healthchecks (BZ#1834346)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman: Please backport correction patch for the native container healthchecks (BZ#1834346)
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLBA-2020:2457
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman: Please backport correction patch for the native container healthchecks (BZ#1836978)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman: Please backport correction patch for the native container healthchecks (BZ#1836978)
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLSA-2020:2774
Important: virt:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)
* QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)
* QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2020:2848
Important: nodejs:10 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.21.0).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.21.0).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2020:2852
Important: nodejs:12 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.18.2).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.18.2).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2020:3032
Moderate: mod_auth_openidc:2.3 security and bug fix update
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857)
* mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cjose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857)
* mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107)
rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc
cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06
cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102
RLBA-2020:3036
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably
podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably
podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364)
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLSA-2020:3053
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-podman-api, udica, toolbox, runc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm
2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLEA-2020:3054
new module: eclipse:rhel8
Eclipse is an integrated development environment (IDE).
This enhancement update adds the eclipse:Rocky Linux8 module to Rocky Linux 8. The eclipse:Rocky Linux8 module provides Eclipse version 4.15, which is based on the Eclipse Foundation's 2020-03 release train. (BZ#1786637)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
For instructions on how to use the Eclipse module, see Using Eclipse linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for icu4j, glassfish-annotation-api.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Eclipse is an integrated development environment (IDE).
This enhancement update adds the eclipse:Rocky Linux8 module to Rocky Linux 8. The eclipse:Rocky Linux8 module provides Eclipse version 4.15, which is based on the Eclipse Foundation's 2020-03 release train. (BZ#1786637)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
For instructions on how to use the Eclipse module, see Using Eclipse linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__eclipse
glassfish-annotation-api-1.3.2-3.module+el8.6.0+852+cc16a686.noarch.rpm
703801e1ebfbf2db9652d0e01533b90244de682d93ef14a85747d96dce45f2e9
icu4j-65.1-3.module+el8.6.0+852+cc16a686.noarch.rpm
1102f0b1275d7fb89dfe91af7698838927cad6378d87a0d272191a1b5c76c477
RLSA-2020:3623
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810)
* squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810)
* squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLSA-2020:3662
Moderate: php:7.3 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655)
Security Fix(es):
* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)
* php: Buffer over-read in exif_read_data() (CVE-2019-11040)
* php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045)
* php: Information disclosure in exif_read_data() (CVE-2019-11047)
* php: Integer wraparounds when receiving multipart forms (CVE-2019-11048)
* oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224)
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
* oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163)
* oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203)
* oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204)
* pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454)
* php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059)
* php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060)
* php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062)
* php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063)
* php: Information disclosure in exif_read_data() function (CVE-2020-7064)
* php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065)
* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)
* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)
* php: Out of bounds read when parsing EXIF information (CVE-2019-11050)
* oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246)
* php: Information disclosure in function get_headers (CVE-2020-7066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655)
Security Fix(es):
* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)
* php: Buffer over-read in exif_read_data() (CVE-2019-11040)
* php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045)
* php: Information disclosure in exif_read_data() (CVE-2019-11047)
* php: Integer wraparounds when receiving multipart forms (CVE-2019-11048)
* oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224)
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
* oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163)
* oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203)
* oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204)
* pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454)
* php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059)
* php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060)
* php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062)
* php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063)
* php: Information disclosure in exif_read_data() function (CVE-2020-7064)
* php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065)
* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)
* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)
* php: Out of bounds read when parsing EXIF information (CVE-2019-11050)
* oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246)
* php: Information disclosure in function get_headers (CVE-2020-7066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm
c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45
libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729
libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61
libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d
php-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
81c845ff6e92154312d6dee84eb0a2420f555560c720df74c6ac28f91d6814a3
php-bcmath-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
3521b7280b6bb19c5c33fdb7bcc1d8900222cb720baad4f5aef0a64c24b5f501
php-cli-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66b575dd4de583eaa438e9fa29e1690622da46917506ff101a29d082d28666b2
php-common-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2b818cb38f29eb46323eb7f988e7eec6e57c54dee336cb9ad680624b4e5ae0c
php-dba-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
eacf57de74bb58757840239513992e3e2c48da900db3fae2f4a6fcd9d4e2d520
php-dbg-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
6de3d1723a37e21f09751a1df454ce3db61151f6886e857cd8a016968cbfa887
php-devel-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
a2d8a6b55e603788e61635c41a78bb88fcf23cd638b5b4605e64a793ef1c2723
php-embedded-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
d4a5467b1bf5aaa6eb5977c4e4e8638edc9abdb65a7f0a436fd6d4d142d52ea2
php-enchant-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
8f10ea82c11d1836ec6878a5ec5e307422b5f86900e0f569b9c1700089604643
php-fpm-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
beb88ba847269ee001e886db7f4b23d750c1d0f1f1d3bd7c0d77a8a4c5149fa3
php-gd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0bcaa3bb5600f7d6bfa85c7bdcf4fc34986413fdf7fab2a5f1dbe536893fbc61
php-gmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
a70d92c3cc81c1afd9df86741429fd58d948e19c4747c2dff43a55d3c1b64620
php-intl-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
16b3429667ecf09b1a359959940540167d31a12777564d7d9c318c5b90961b70
php-json-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e9b6597c148f59d8d6418aad929477baf26e0468f260c937281357b433f16c79
php-ldap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
178899d11efba895402fe773aafaf6510150f300aafb15294947b1d36d35a6c1
php-mbstring-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
999d14ab0851ef0a72da81beb3562166d8a02259f31562f91608eb413ce85a75
php-mysqlnd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4806123ba0bbd0586a1148b4b791d8041af7caf7ca3e2d5e92001393b23edb58
php-odbc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f934922a6bfcee875fc543c9cb76ce02687b611c717cfae9d9834b97c5bc29d4
php-opcache-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
3b7570d6416f18238605c38113ab52847f2e9d4527b63f20bdbdddb6c54ff511
php-pdo-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
d1a63ef832f6108bdd1e8c746b1b03489f1dca39457ed2cf135016ba277c9c06
php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm
33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744
php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5
php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
c488f0dba64ba85b4b9888f0ecef07cac2a26a600dee305c50c4eccbd22f018f
php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7
php-pgsql-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
b4a70ab74593d4a4e8bbcd147d6a9ef37f2ee73ea3d3fc2026cbb723a8410665
php-process-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f090d8f796e208d1da100151ad96fa24e609eca2a9b1ac728000d735ed5ae30f
php-recode-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
7a9b599d8d3a1ed64ebb713be92c2f5648b73b29332460fefbe8a2f2fc76a24a
php-snmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
3a288b202b968f5b0685f88e3794865db8a26fe7b94e7a8baf45420a4cede09a
php-soap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
510d2dc16daea3a229e16d5ebfdcf5e3a5f9c52a722768e98d754e1be4392a8f
php-xml-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
3f13bd0a62eee03261a23f6bcebe607dc20331acae2b7d5623c2cba3ba22b046
php-xmlrpc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e1b10e75e43aea2c9b6c6bdeda8087c6b7921c25e0e96d17e2dfdfbbd2a38564
RLSA-2020:3732
Important: mysql:8.0 security update
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.21).
Security Fix(es):
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702)
* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634)
* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925)
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725)
* mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580)
* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619)
* mysql: Server: Connection unspecified vulnerability (CVE-2019-3009)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632)
* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620)
* mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574)
* mysql: Server: Logging unspecified vulnerability (CVE-2020-2770)
* mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804)
* mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812)
* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694)
* mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898)
* mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921)
* mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926)
* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553)
* mysql: Server: UDF unspecified vulnerability (CVE-2020-14576)
* mysql: Server: JSON unspecified vulnerability (CVE-2020-14624)
* mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631)
* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651)
* mysql: Server: Locking unspecified vulnerability (CVE-2020-14656)
* mysql: Information Schema unspecified vulnerability (CVE-2019-2911)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for mecab-ipadic, mecab, mysql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.21).
Security Fix(es):
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702)
* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634)
* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925)
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725)
* mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580)
* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619)
* mysql: Server: Connection unspecified vulnerability (CVE-2019-3009)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632)
* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620)
* mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574)
* mysql: Server: Logging unspecified vulnerability (CVE-2020-2770)
* mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804)
* mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812)
* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694)
* mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898)
* mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921)
* mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926)
* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553)
* mysql: Server: UDF unspecified vulnerability (CVE-2020-14576)
* mysql: Server: JSON unspecified vulnerability (CVE-2020-14624)
* mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631)
* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651)
* mysql: Server: Locking unspecified vulnerability (CVE-2020-14656)
* mysql: Information Schema unspecified vulnerability (CVE-2019-2911)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mysql
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
RLSA-2020:4059
Important: virt:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364)
* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364)
* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2020:4272
Moderate: nodejs:12 security and bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.18.4).
Security Fix(es):
* nodejs-dot-prop: prototype pollution (CVE-2020-8116)
* nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201)
* npm: Sensitive information exposure through logs (CVE-2020-15095)
* libuv: buffer overflow in realpath (CVE-2020-8252)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* The nodejs:12/development module is not installable (BZ#1883966)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.18.4).
Security Fix(es):
* nodejs-dot-prop: prototype pollution (CVE-2020-8116)
* nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201)
* npm: Sensitive information exposure through logs (CVE-2020-15095)
* libuv: buffer overflow in realpath (CVE-2020-8252)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* The nodejs:12/development module is not installable (BZ#1883966)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLBA-2020:4435
abrt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-abrt, abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-abrt-1.2.6-6.el8.x86_64.rpm
f6d3d376330002979b7be8c06e394a42b5848cf49e856c0a27c04f9dc30883bc
libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpm
5e37019a5283ba0e43d7575bb7b92b89500f793ad5c4dbfcfaeb1872a7fc3030
libreport-anaconda-2.9.5-15.el8.rocky.6.3.x86_64.rpm
6194f8ba650bc7585a3e99cd6e7f827286456e62a6bf98ed46c46c35f9d08c77
libreport-cli-2.9.5-15.el8.rocky.6.3.x86_64.rpm
2fcf64301eaafa7fcf3a3c72cfb96f05615b56cfcea521a83561222b72e9db0e
libreport-gtk-2.9.5-15.el8.rocky.6.3.x86_64.rpm
695990373066594c0627a7a762537e5de49d7be1926d8be0a55b461bb20140d3
libreport-newt-2.9.5-15.el8.rocky.6.3.x86_64.rpm
0e3e56dc4087d864dc4d67b86cd2b3bfb8b8b4d6673987717d463e1bb87d26e5
libreport-plugin-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm
227c155b52ec31ca24fa66639452937725607195a4253414a2a46b8a3edf7dd5
libreport-plugin-kerneloops-2.9.5-15.el8.rocky.6.3.x86_64.rpm
3e1fa31840233fa95fb27c9c057cb8f2946d81f8f5c9f332f0fc7e5e09fa1bd9
libreport-plugin-logger-2.9.5-15.el8.rocky.6.3.x86_64.rpm
e6e49176296cc70d772e69e7b17ecf38a8be6d05a03ad52334b2c719701fb9a7
libreport-plugin-mailx-2.9.5-15.el8.rocky.6.3.x86_64.rpm
95ff8fc918313b921b34162c844e297774e9ef5e5ece711a4eff8ddd8426b608
libreport-plugin-reportuploader-2.9.5-15.el8.rocky.6.3.x86_64.rpm
fb9fa978de3e7d265f6c48ffcec76e28d5c736870f398c83580e5660d44e3711
libreport-plugin-rhtsupport-2.9.5-15.el8.rocky.6.3.x86_64.rpm
e05b4bb22fd320eeb356dca5d8c43a3ae011354f0f0e013bb534bbdae18dc170
libreport-plugin-ureport-2.9.5-15.el8.rocky.6.3.x86_64.rpm
28a9a4fe6ac7b2b65c8445bdf30c67d674c6af4fc9f7944492a4136cc8c38d02
libreport-rhel-2.9.5-15.el8.rocky.6.3.x86_64.rpm
76e60d9d32ef100959f7171a0e86253d7842d6c9fb2fea7e27535643aff7950f
libreport-rhel-anaconda-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm
69e5e743a1180cc8a7002d3a8f68cc27e071dc87ed0d18e9ec954c340d43d750
libreport-rhel-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm
c1de7ebf0c873e1247232573b8d8bb7c07e87fbab03e753c3af3826eab008e26
libreport-web-2.9.5-15.el8.rocky.6.3.x86_64.rpm
e6aa4595fb879aa45e101f8626e3bd4e43d2513948b23b113e7df6e4ade703ab
python3-libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpm
7567494607c825ed5eb4d4c02cda246483d90b5bde0f950cedd06d5d12ac5ceb
RLBA-2020:4621
iperf3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iperf3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
iperf3-3.5-6.el8.x86_64.rpm
b2bdb78d601c91f9a01bf9f229f02f0079bd92ca8bc37f615d720aba79fecb69
RLSA-2020:4628
Low: libreoffice security, bug fix, and enhancement update
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1). (BZ#1796893)
Security Fix(es):
* libreoffice: 'stealth mode' remote resource restrictions bypass (CVE-2020-12802)
* libreoffice: forms allowed to be submitted to any URI could result in local file overwrite (CVE-2020-12803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libcmis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1). (BZ#1796893)
Security Fix(es):
* libreoffice: 'stealth mode' remote resource restrictions bypass (CVE-2020-12802)
* libreoffice: forms allowed to be submitted to any URI could result in local file overwrite (CVE-2020-12803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libcmis-0.5.2-1.el8.x86_64.rpm
85fe680a824f5ec1a3e0dbeb6cd41abd45d672d462dc0fb1dd327095588a7307
RLSA-2020:4629
Moderate: libvpx security update
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126)
* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232)
* libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371)
* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libvpx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126)
* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232)
* libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371)
* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvpx-1.7.0-8.el8.x86_64.rpm
e78ccbde28d9eeb97e5cb37df37ef5a5e55b3de69bf2f6f260570076a2caee1c
RLBA-2020:4630
wget bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wget.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
wget-1.19.5-10.el8.x86_64.rpm
cb1dbb79240c60648916fed72bc3368e5394de1013b4135b54a812a40a279cff
RLBA-2020:4631
gom bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gom.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gom-0.4-1.el8.x86_64.rpm
bb7d6fd74621945051cdfc8a40a93c74bb5a6ef9cf399977b82e20d786c92092
RLBA-2020:4633
swig:3.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for swig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__swig
swig-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm
3a8d046a51dbf4a121fe67a46df74cd599c6f46a150a2eb1aa48c6c4ade3cd45
swig-doc-3.0.12-19.module+el8.4.0+385+82b6e804.noarch.rpm
796cea2ad5be73af934d2b97b8c00121f097496f215bd867f1de4645bedc5619
swig-gdb-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm
e9b828ca9e799c3c02d911fbfb4f430621de393e4361a45ef8bf734889057a10
RLBA-2020:4640
radvd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for radvd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
radvd-2.17-15.el8.x86_64.rpm
7ab537f957b4dd6b3fac3462f1b10cf5905591851c87f4190d6709b982de3152
RLSA-2020:4641
Moderate: python38:3.8 security, bug fix, and enhancement update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416)
Security Fix(es):
* PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477)
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)
* PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747)
* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)
* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-psycopg2, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416)
Security Fix(es):
* PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477)
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)
* PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747)
* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)
* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm
54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm
6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm
d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba
python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm
7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2
python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm
21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9
python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm
5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
RLSA-2020:4647
Moderate: freerdp and vinagre security, bug fix, and enhancement update
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.
The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287)
Security Fix(es):
* freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018)
* freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039)
* freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042)
* freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047)
* freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396)
* freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397)
* freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019)
* freerdp: Integer overflow in VIDEO channel (CVE-2020-11038)
* freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040)
* freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041)
* freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043)
* freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044)
* freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045)
* freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046)
* freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048)
* freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049)
* freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058)
* freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085)
* freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086)
* freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087)
* freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088)
* freerdp: out-of-bounds read in irp functions (CVE-2020-11089)
* freerdp: out-of-bounds read in gdi.c (CVE-2020-11522)
* freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525)
* freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vinagre.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.
The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287)
Security Fix(es):
* freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018)
* freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039)
* freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042)
* freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047)
* freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396)
* freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397)
* freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019)
* freerdp: Integer overflow in VIDEO channel (CVE-2020-11038)
* freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040)
* freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041)
* freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043)
* freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044)
* freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045)
* freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046)
* freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048)
* freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049)
* freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058)
* freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085)
* freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086)
* freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087)
* freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088)
* freerdp: out-of-bounds read in irp functions (CVE-2020-11089)
* freerdp: out-of-bounds read in gdi.c (CVE-2020-11522)
* freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525)
* freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
vinagre-3.22.0-23.el8.x86_64.rpm
b5c618c63d3360974aa20444687651e51c96bd2a84d47844ddc851391fd02d04
RLSA-2020:4649
Low: evolution security and bug fix update
Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.
The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.
OpenChange provides libraries to access Microsoft Exchange servers using native protocols.
Security Fix(es):
* evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for bogofilter, evolution-mapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.
The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.
OpenChange provides libraries to access Microsoft Exchange servers using native protocols.
Security Fix(es):
* evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bogofilter-1.2.5-2.el8.x86_64.rpm
055fb5f5338f3747eb7f7826bf0508cddc02cc4f1f7a1c81b3b37e7f3696219d
RLSA-2020:4654
Moderate: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)
* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)
* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm
6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc
python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568
python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm
cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm
d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b
RLBA-2020:4658
munge bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for munge.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
munge-0.5.13-2.el8.x86_64.rpm
0dd4fe5f637073ab3044226acb9c3a3a8b3d181bc94eb52e3def2535150d7966
munge-libs-0.5.13-2.el8.x86_64.rpm
26722a8ec5e88792ed5728241095a00692fdc93dc6f3165c048aae0983229c28
RLSA-2020:4659
Moderate: gd security update
GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats.
Security Fix(es):
* gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977)
* gd: NULL pointer dereference in gdImageClone (CVE-2018-14553)
* gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats.
Security Fix(es):
* gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977)
* gd: NULL pointer dereference in gdImageClone (CVE-2018-14553)
* gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gd-2.2.5-7.el8.x86_64.rpm
ace2c28939c77d3e0ed768fbcef2ad8414a6892b3eae03712ec12a92825fc45d
gd-devel-2.2.5-7.el8.x86_64.rpm
1839caff25d169b3fc2b29782ecc02e90fe225938deec1b81e8cc3c7a792b1a7
RLEA-2020:4664
memcached bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memcached.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
memcached-1.5.22-2.el8.x86_64.rpm
80ba002a662fb3b041467abdc1520436e0dbbbcf42b160e81b1d5e24a5a82234
RLBA-2020:4665
lftp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lftp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lftp-4.8.4-2.el8.x86_64.rpm
b777ff195179177c9703548dc35156c63f4c56509362bf834d551f3107ce3210
lftp-scripts-4.8.4-2.el8.noarch.rpm
cad46fc4eaa97de1a51c59d7e8679f8e838083898a49929dd1fec5cd9d69ca7a
RLSA-2020:4670
Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877)
Security Fix(es):
* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* bootstrap: XSS in the data-target attribute (CVE-2016-10735)
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
* bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676)
* bootstrap: XSS in the affix configuration target property (CVE-2018-20677)
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
* js-jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
* ipa: No password length restriction leads to denial of service (CVE-2020-1722)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877)
Security Fix(es):
* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* bootstrap: XSS in the data-target attribute (CVE-2016-10735)
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
* bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676)
* bootstrap: XSS in the affix configuration target property (CVE-2018-20677)
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
* js-jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
* ipa: No password length restriction leads to denial of service (CVE-2020-1722)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
RLSA-2020:4676
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296)
Security Fix(es):
* libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339)
* QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890)
* libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485)
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)
* libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)
* libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296)
Security Fix(es):
* libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339)
* QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890)
* libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485)
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)
* libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)
* libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2020:4678
tog-pegasus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tog-pegasus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tog-pegasus-2.14.1-46.el8.x86_64.rpm
1bed42c08cc37ebc5e1d7c20ef135fa1904ab9939c5101324054e3147eb52c97
tog-pegasus-libs-2.14.1-46.el8.x86_64.rpm
0a14c7352b8954b767c4d33bbba870054489d9bc87317678e48f93d8bdd9c52e
RLBA-2020:4679
pptp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pptp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pptp-1.10.0-4.el8.x86_64.rpm
403c469de3bd6f49b2b1f9c82fe72aa3f6dc887ab32184832f1e9db30ac7c25d
RLBA-2020:4681
ncompress bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ncompress.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ncompress-4.2.4.4-13.el8.x86_64.rpm
2e7cd19238f419b4b9315b96484d11c41393d2cfd6a22c67b52516e5f4a979e5
RLBA-2020:4688
itstool bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for itstool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
itstool-2.0.6-2.el8.noarch.rpm
887a6d89077f2c036291b58afa8bf12d6d871d82469ffb8a8b629130c21bc9e8
RLSA-2020:4694
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)
* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-podman-api, libslirp, toolbox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)
* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
RLEA-2020:4700
createrepo_c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for drpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
drpm-0.4.1-3.el8.x86_64.rpm
6dc369a31dfb6ca6aaf6b615aec3d52792d2411c276f8e392da041ab705fae87
RLBA-2020:4704
python36:3.6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python36
python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm
434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035
python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm
08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc
python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm
dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740
python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm
f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d
rocky-linux-8-x86-64-appstream-rpms__python27
python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm
d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b
RLBA-2020:4707
spice-protocol bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-protocol.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-protocol-0.14.2-1.el8.noarch.rpm
c00444c95aa153b8a621e3086e3a63cc9dd5fda8f1f46cf7a5a7c96f4bba8dd9
RLSA-2020:4709
Moderate: librsvg2 security update
The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library.
Security Fix(es):
* librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for librsvg2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library.
Security Fix(es):
* librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
librsvg2-2.42.7-4.el8.x86_64.rpm
be783a46ee945a6822831dc658d7e8bc6bc89ef84dea1ae6b39ef767efeb5147
librsvg2-devel-2.42.7-4.el8.x86_64.rpm
124de649dc6bfedfbbdddea386e9c78653e0d147b2115ac2c0ec02b36a8028b1
librsvg2-tools-2.42.7-4.el8.x86_64.rpm
eb0d175b2e1bb18dd7d8f9b0523238a68623abf4e05e4e022a63ee6442279d03
RLEA-2020:4711
HdrHistogram_c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for HdrHistogram_c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
HdrHistogram_c-0.9.13-2.el8.x86_64.rpm
55353693dcaf1b676fec269cda6ad65641c27dafd2fda21228a820a45b00d14f
RLSA-2020:4712
Moderate: subversion:1.10 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
RLEA-2020:4713
python-dasbus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-dasbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-dasbus-1.2-2.el8.noarch.rpm
2bee6c760ce64f9a0c0f286ed8865993d24a71a6d31ce56bf3fd55c20307cbf7
RLSA-2020:4847
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* bootstrap: XSS in the data-target attribute (CVE-2016-10735)
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
* jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
* pki: Dogtag's python client does not validate certificates (CVE-2020-15720)
* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146)
* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179)
* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221)
* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* bootstrap: XSS in the data-target attribute (CVE-2016-10735)
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
* jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
* pki: Dogtag's python client does not validate certificates (CVE-2020-15720)
* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146)
* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179)
* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221)
* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm
479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85
apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm
3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722
apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm
20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d
bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm
7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1
glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm
07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524
glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm
3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7
glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e
glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698
glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be
jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9
jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73
jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9
jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca
jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a
jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm
064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706
jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm
f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9
javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60
javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm
ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba
stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm
972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18
velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm
568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882
xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm
8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26
xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm
f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8
xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm
d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783
xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm
143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26
xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm
31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e
xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm
6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9
RLBA-2020:4715
chan bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chan.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
chan-0.0.4-3.el8.x86_64.rpm
effca9ba587bd1ece96428cc01c299d9d8212f97b71592babf23e1400de6e4ba
RLBA-2020:4717
new module: php:7.4
This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLBA-2020:4723
bpg-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bpg-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bpg-algeti-fonts-2.005-11.el8.noarch.rpm
47e6874b1c41f7f8fb9af54dbf5bbbd84540a380fc3c59b1498d442b8960de3c
bpg-chveulebrivi-fonts-3.002-11.el8.noarch.rpm
1ed1607a6fc5e6182532d24b68089af6c17712e53a9ad347d194a07da37d262c
bpg-classic-fonts-8.500-11.el8.noarch.rpm
c4489256ab3ad73a8de16bc7fb096ad6cb1f8115e48f4a19c733bf3dd6460d99
bpg-courier-fonts-4.002-11.el8.noarch.rpm
5b53df9a759a1f5b5b7b4e0eb22391663ad3b8182e6cfe514f1baa92c321dd0c
bpg-courier-s-fonts-4.000-11.el8.noarch.rpm
e5958e7c6e2314c0640e1405faf7aff87f9f36925c10b3d0c3be3e6ab5169812
bpg-dedaena-block-fonts-3.005-11.el8.noarch.rpm
d82a6f3febe389229e3c6258e1c8b26b4ceb19b92e1c400a26b5976ae8d16598
bpg-dejavu-sans-fonts-2.28-11.el8.noarch.rpm
1112365fa2797fced4f6dd5011f9a663f8af3517b93db6d2ed36618d0fbd188c
bpg-elite-fonts-3.000-11.el8.noarch.rpm
feca73e375e64fb414d392b2ffbaec526d8249f4294317176e758426ba8f1f90
bpg-excelsior-caps-fonts-2.003-11.el8.noarch.rpm
2d82c9702963480fa2790f4d877768acff685ea8fa7a54c2c78f5c93052dbaf7
bpg-excelsior-condenced-fonts-2.003-11.el8.noarch.rpm
2d08bb6292d03ea4f35b452460ac670387363748baf05cf8de2ce391fbee73ef
bpg-excelsior-fonts-2.03-11.el8.noarch.rpm
012c43fc487f0ef864c6b2de33884f934150ef1bc460f898b108fd7e84d58e89
bpg-fonts-common-20120413-11.el8.noarch.rpm
61b7c5b6e0f61a9eb355e6dd27ae076e57af8a2a9ec0195d86447ad7b49e34b2
bpg-glaho-fonts-9.000-11.el8.noarch.rpm
efd53c80a4c2c4839cf1a393b361bc7224f37ae8cee1238663d8365eb2cd5d8b
bpg-gorda-fonts-2.003-11.el8.noarch.rpm
1c385b59bc5570227569621f983379b20baf6f810f6f73182bcaff8dd81f00f1
bpg-ingiri-fonts-4.000-11.el8.noarch.rpm
72bc5b7db73a2f2f1fdf0c47dca130964179a2cbc3517e5f063f7823ad3bd581
bpg-irubaqidze-fonts-1.000-11.el8.noarch.rpm
4e6caf5c2c1b33b23028b6c9549900997ec814f4a82fb21e3555225092f78228
bpg-mikhail-stephan-fonts-2.500-11.el8.noarch.rpm
55400c32dec1f9648420b8957ff553afde11ad2669d31e354df5097593276b92
bpg-mrgvlovani-caps-fonts-1.002-11.el8.noarch.rpm
c0da6baafe1316d13523a487436047653f27ab9c2a2c36ce9bfbe56f5f315cdc
bpg-mrgvlovani-fonts-1.002-11.el8.noarch.rpm
2fe663408a4c49559e32751b9501f6e6f0e732e3e58a6f7a788370214dd777f5
bpg-nateli-caps-fonts-2.003-11.el8.noarch.rpm
cedee72fb59958ae0157b7036e2aa4c1e6c82626f16520842b18a3fb00169811
bpg-nateli-condenced-fonts-2.003-11.el8.noarch.rpm
484e9bbab1ec19deeb501173c0061943a0714859f576bdd4ab617cfc5d9a2216
bpg-nateli-fonts-2.003-11.el8.noarch.rpm
ca437135ac44fb40b0697b6221307ed35da5063b62de03f5d845cf22d5a62441
bpg-nino-medium-cond-fonts-4.005-11.el8.noarch.rpm
16a888290ba281ae33090c6acb4d87a956331e26ab6997e525def891670aaee1
bpg-nino-medium-fonts-4.005-11.el8.noarch.rpm
b67a48532714366c3f94089c38f26cbd46e5c07adaeeed6775fe72de6e0f2eb7
bpg-sans-fonts-1.005-11.el8.noarch.rpm
cf90e4b021f205476c1dffe9a8e340d571960681bccbd4d418acfe8eb2520499
bpg-sans-medium-fonts-1.005-11.el8.noarch.rpm
5d6ff7f18f2d7c8415be6867308d9085b6e16a07f9e6bdd0348140417f442a59
bpg-sans-modern-fonts-2.025-11.el8.noarch.rpm
63e9e7ccd18f2333b5053647a1b882d33b55630e3d83cd49388bda80bf833c02
bpg-sans-regular-fonts-1.005-11.el8.noarch.rpm
5f95b3c84182a3a10fdd518277db8ba54ca88a3fe943c4ae2aa7adc41bca74c9
bpg-serif-fonts-1.005-11.el8.noarch.rpm
c92fdd513eb927718cc07391e07072f0c933c2997337c2cc72255074946055a0
bpg-serif-modern-fonts-2.028-11.el8.noarch.rpm
72175ee483fcd31713aadcf7652dac55d0ab6b5f50757a4a1175b5bc130a13d3
bpg-ucnobi-fonts-3.300-11.el8.noarch.rpm
84b2d3be17f380b7d4704c95dc5e439f9d20633e7ea345f6391f31b69b8e5e50
RLEA-2020:4724
perl-IO-Socket-SSL:2.066 and perl-libwww-perl:6.34 update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-Net-HTTP, perl-HTTP-Message, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-WWW-RobotRules, perl-HTTP-Date, perl-LWP-Protocol-https, perl-Net-SSLeay, perl-TimeDate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl
perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm
4f838ceea3cf5dfefffdebe0181ef879213ea9c143a6d77859b8f97d37d7f2a2
perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpm
6f8ac7791b06c47866c5e688dacaef16d8bbc56e760e71ace7610b12fa6b1da1
perl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpm
3aaec32b508f40a97b7274018a707339b6a5877493b84f55769a47d84fbb7a5f
perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm
b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b
perl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpm
6f41b83ba68e184bda30ef525a7600673733aa444c2713bffb572eb691818b2d
perl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpm
39a934c51411a833c333671b2a7df180f1c9d0ef251889a8c1e9d48701cee459
perl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpm
9862723272cc2aba25739dc251961e0cbd90be7e3b3eb9a0eaf79c1b8504f080
perl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpm
0d9b36f3c0e80cadb8b5282c1b3be01f6501e2b1d95e80e84d9fb3b24a6f7e52
perl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm
9a1c248fb9f94b77b6b5afa60bef8e145057c8d1031957e09bfd42e188e17309
perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm
321334e0883dd66f5c7b6aa86ea601e5a1a831dd0950032128ac3909032bc343
perl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpm
7f33a736a361b53262ce8cbd273f26b8debe23f4f3fb0a1817d4c519ca2471c6
perl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm
3416b0bcbd18b2b38276c15376eb1560dace73dc40c613e5434a4b956ddf52bf
perl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm
e6121208c088b4a8c6d95d89aeee50c265ca21c7cd35ec9fde3ffc087fecdf49
perl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm
c350bea5407e56eb42eda4cbc77895da0ad65ae5ce23e08543fc3cfe56939793
perl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm
bf26ed1f8417e1a76d8bc96d609e74c2c8af22c5e3194b1c7d5dbb1fa7bdd911
perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpm
c0a260b0aaddebf1df80c0b98ea0f24abc32b2f7711f67c4982559dd19b98d7a
perl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm
47f5249f76519dc5d16c9dd6d74d51ba1c62ca0937e544395f9e67b10cf2f3cd
perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpm
1d87ab90226348884ea3741f614e33782a9176a71227f7d14c6fbc2aa69c35b9
perl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpm
4cb2c5f159200cb752acaca0293501f413bae3e4fc0a2263b633f847b5ab3d7d
rocky-linux-8-x86-64-appstream-rpms__perl
perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm
85d5b8dca8c11735fe4bb387756c332e49af51227cf76cce4ae44bae6a8641e0
rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL
perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm
66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd
RLBA-2020:4726
libmaxminddb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmaxminddb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libmaxminddb-1.2.0-10.el8.x86_64.rpm
aeba7e5152314138adb423a1f7d1d58fcbc5dfd9214b3de2f6b35e42da4b9ca5
libmaxminddb-devel-1.2.0-10.el8.x86_64.rpm
5392fc9570da9dc7d4deefff17b11964da9b68d900e35b4321d9cf4638430b0d
RLEA-2020:4732
new module: nodejs:14
This enhancement update adds the nodejs:14 module to Rocky Linux 8. (BZ#1815402)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the nodejs:14 module to Rocky Linux 8. (BZ#1815402)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
RLBA-2020:4737
sassist bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sassist.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sassist-0.8.6-1.el8.noarch.rpm
1b7b11ebb113e13742d03ff8229e112ea2025fca26f79416fd382b8578cbf86e
RLBA-2020:4738
fio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fio-3.19-3.el8.x86_64.rpm
9e3022392a68cb36d9b816ec9591b91a46bfd5229329c124284ccd8db026be0c
RLEA-2020:4742
userspace graphics, xorg-x11, and mesa bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libXft, xorg-x11-xkb-utils, xorg-x11-xtrans-devel, xorg-x11-drv-intel, libvdpau, libxkbfile, libXxf86dga, libXau, libXrandr, xorg-x11-proto-devel, xorg-x11-util-macros, libXext, libXi, libXdmcp, libXmu, libXvMC, mesa-demos, xorg-x11-drv-ati.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
glx-utils-8.4.0-5.20181118git1830dcb.el8.x86_64.rpm
751056a3ca9f371de399e28f0269347b8b83253401cace95a5420c30714fbdb2
intel-gpu-tools-2.99.917-39.20200205.el8.x86_64.rpm
ca18f49420bd77871652059de37c4ce2712c7972136796a6c4af5bc4c9b5e9ad
libvdpau-1.4-2.el8.x86_64.rpm
f45b5cf54aeb481ff4cf52b101736810c7aebedcc227019cafb14b7414bd8cc8
libXau-1.0.9-3.el8.x86_64.rpm
028141ae18fb41c9ee406307953e600eba388282b0d581c7132db5ff22ace362
libXau-devel-1.0.9-3.el8.x86_64.rpm
7a17dc2ed5eff71b97ec5036d404b3b3f6c3ee26c4a42d9cbcd5e62d10ea9da2
libXdmcp-1.1.3-1.el8.x86_64.rpm
0b69d5c1e3ceba8903038d00820e13e7a4dd63ce095e9b3f45af7fff0893311e
libXext-1.3.4-1.el8.x86_64.rpm
d4b037882da8eb6c588eee822f3227e7caf6ed2e9352ed490f0cd3577ed78470
libXext-devel-1.3.4-1.el8.x86_64.rpm
65c371a1efdad5cf9280b6e62fef1ef155991daea3f026cd5adc0025aff6aef9
libXft-2.3.3-1.el8.x86_64.rpm
2d4a1d4c0c9e61c70936873f0563ed2ac6b468549c3163bf73f91134ff2e9860
libXft-devel-2.3.3-1.el8.x86_64.rpm
5f165daab1a56d5339f5ed6d588e28dc48af44b27470f4f1a4fb06dc1c93d2e5
libXi-1.7.10-1.el8.x86_64.rpm
50085caa63b1a131251449903e9918d847702e5a9b64ed33bd2b72b1ff657343
libXi-devel-1.7.10-1.el8.x86_64.rpm
895888acfd024093b564da21b808c20c3ab93bcee12d604afefbe229f35d396c
libxkbfile-1.1.0-1.el8.x86_64.rpm
34a3b0f4f7966fac35d7f912ff9415d8d4ff858c35f27405e3a4e8f3e55a0dc7
libXmu-1.1.3-1.el8.x86_64.rpm
d6a17b0d20b9d510cde5ea0bfbb3434a7f3878dbf710246fc063ff49a3facd9f
libXmu-devel-1.1.3-1.el8.x86_64.rpm
efe847621d6d3d5a6cea7c0ee04ae377e29a0db2235daca5348c893b989bfdc7
libXrandr-1.5.2-1.el8.x86_64.rpm
6e162f68d0459598f596ee0698a504c795d6c992a807dec0e718efdc8a1e225e
libXrandr-devel-1.5.2-1.el8.x86_64.rpm
e080677e1c0a510493557023b483268b62aaa1788ecf4549d9f0702c0243c27b
libXvMC-1.0.12-1.el8.x86_64.rpm
a90a28f61c0b3b2b4d7f0ccde4a5910b40c0af50d97e32db8251ef8f4fc4a005
libXxf86dga-1.1.5-1.el8.x86_64.rpm
ccfbba780589fce2c706637c19d968f718e57025ca847ca988bd6e08866bb71b
libXxf86dga-devel-1.1.5-1.el8.x86_64.rpm
d9e6d5d4907a21410438713ba87cb8cac1b0845870e85cca30e9bcb625fbbf00
xorg-x11-drv-ati-19.1.0-1.el8.x86_64.rpm
f2044a3ef87c2233a795acfd4e453a204067ac7859154bb8cefa15260d64ea3f
xorg-x11-drv-intel-2.99.917-39.20200205.el8.x86_64.rpm
a753e4380e920df6184f68718e509ab792225037b3e7d17140413873d5481772
xorg-x11-proto-devel-2020.1-3.el8.noarch.rpm
aa75375b6709706c2dfeb39934ae46f7e499f9adb176d8e05942ab94584b7556
xorg-x11-xkb-utils-7.7-28.el8.x86_64.rpm
317f517f2b2624d859fa1ebd0c77f75d2f6707eaa0da526f9e27e815aec27b57
RLSA-2020:4743
Moderate: squid:4 security, bug fix, and enhancement update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467)
Security Fix(es):
* squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520)
* squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521)
* squid: Improper input validation in URI processor (CVE-2019-12523)
* squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524)
* squid: Heap overflow issue in URN processing (CVE-2019-12526)
* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)
* squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529)
* squid: Denial of service in cachemgr.cgi (CVE-2019-12854)
* squid: Buffer overflow in URI processor (CVE-2019-18676)
* squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677)
* squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678)
* squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679)
* squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860)
* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)
* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)
* squid: DoS in TLS handshake (CVE-2020-14058)
* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)
* squid: Improper input validation could result in a DoS (CVE-2020-24606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467)
Security Fix(es):
* squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520)
* squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521)
* squid: Improper input validation in URI processor (CVE-2019-12523)
* squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524)
* squid: Heap overflow issue in URN processing (CVE-2019-12526)
* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)
* squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529)
* squid: Denial of service in cachemgr.cgi (CVE-2019-12854)
* squid: Buffer overflow in URI processor (CVE-2019-18676)
* squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677)
* squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678)
* squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679)
* squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860)
* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)
* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)
* squid: DoS in TLS handshake (CVE-2020-14058)
* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)
* squid: Improper input validation could result in a DoS (CVE-2020-24606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLBA-2020:4747
julietaula-montserrat-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for julietaula-montserrat-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
julietaula-montserrat-fonts-7.200-2.el8.2.noarch.rpm
d7014c8bfba50a202864494ab1ce8b7d94d8fecd3b2f6099aee0a80cd8c8661c
RLEA-2020:4748
maven:3.6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm
7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091
apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm
d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8
apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm
aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6
apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm
c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb
apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm
5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8
atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm
38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04
cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2
geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm
9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb
google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm
afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e
guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb
httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm
0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8
jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm
72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393
jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb
jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8
jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm
f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff
maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf
maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91
plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm
163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68
plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm
01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0
plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm
fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08
plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm
b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e
plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm
93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de
plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm
7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5
sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf
slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a
RLSA-2020:4751
Moderate: httpd:2.4 security, bug fix, and enhancement update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)
Security Fix(es):
* httpd: memory corruption on early pushes (CVE-2019-10081)
* httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)
* httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)
* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)
* httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)
* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)
* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)
* httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)
* httpd: mod_rewrite potential open redirect (CVE-2019-10098)
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)
Security Fix(es):
* httpd: memory corruption on early pushes (CVE-2019-10081)
* httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)
* httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)
* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)
* httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)
* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)
* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)
* httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)
* httpd: mod_rewrite potential open redirect (CVE-2019-10098)
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLBA-2020:4752
new packages: gcc-toolset-10-dwz
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-dwz-0.12-1.1.el8.x86_64.rpm
a3fc3c8e50ede83b9dd42e816b7e3cb7c4b1bea76a7c27e6b9baa86b7de9aef4
RLBA-2020:4758
libosinfo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libvirt-glib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvirt-gconfig-3.0.0-1.el8.x86_64.rpm
d212dd8e8560f75d901e1e05a8b60dc221083d7c7ae4c6d38f690e611fe15dac
libvirt-glib-3.0.0-1.el8.x86_64.rpm
edbb5ddfe8604df94839c05863fbfec930c76b91cd04651d7841292f1c7be852
libvirt-gobject-3.0.0-1.el8.x86_64.rpm
54ce79c975115c186f7da62e5788ce09fff868e6e1e2de308071f9ee85c029c8
RLEA-2020:4759
new module: ruby:2.7
This enhancement update adds the ruby:2.7 module to Rocky Linux 8.
(BZ#1817135)
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the ruby:2.7 module to Rocky Linux 8.
(BZ#1817135)
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f
rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm
5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm
a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822
RLBA-2020:4770
container-tools:2.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLBA-2020:4771
container-tools:1.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm
a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm
a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051
RLBA-2020:4773
libgit2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgit2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgit2-0.26.8-2.el8.x86_64.rpm
2fd89961bb66c0f0356457bb232d3aefdb8262b5280b3c0ed3fd6270e690b9c5
RLBA-2020:4774
langtable bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for langtable.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
langtable-0.0.51-4.el8.noarch.rpm
e87cdf437e0d034b54e6033c58433150c339e509d9bfd411e663c727258d05f2
python3-langtable-0.0.51-4.el8.noarch.rpm
4f0e0d4f68336e8e79c5eab94d9ee24fbc08e54affbf456284dde6acaf4d8112
RLBA-2020:4776
new packages: gcc-toolset-10-make
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-make.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-make-4.2.1-1.el8.x86_64.rpm
108af38877fcfbe0a978849c72e88cb7dbb60680a1cd2936807fb34fec10d4ba
gcc-toolset-10-make-devel-4.2.1-1.el8.x86_64.rpm
9e4b9b3d7878c6d9b9695660b55998da5d9c1719f04cff1a9e2c9c35e47d478d
RLBA-2020:4777
new packages: gcc-toolset-10-ltrace
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-ltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-ltrace-0.7.91-1.el8.x86_64.rpm
671eb647a6e888e8832655ae9a3ffd566c15053bc6fba88ae9ff4b7b42ba9eb0
RLBA-2020:4779
ibus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus, ibus-hangul.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ibus-hangul-1.5.1-6.el8.x86_64.rpm
4917a3b7d03f8d640150d01cf98454973f9acaaf01d809c3dcf1e965ec7ed59b
RLBA-2020:4790
google-noto-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for google-noto-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
google-noto-fonts-common-20161022-7.el8.1.noarch.rpm
9054f4115d1f9261a89572c0d14aa2fac5a513f9d5b5baa232bbf3ada845187e
google-noto-kufi-arabic-fonts-20161022-7.el8.1.noarch.rpm
b8f953ee409ea1f18bba6be030c175e905cc1878fd6132eb95bee3254ea4bf75
google-noto-mono-fonts-20161022-7.el8.1.noarch.rpm
d6456554249139c1628f6628c877faf27fc4cea6bfb4f1d6922e2b45339655aa
google-noto-naskh-arabic-fonts-20161022-7.el8.1.noarch.rpm
9ddb9ca176cb011dce33f0debbd54047fe668b89150f4bf6494691b1a03b3216
google-noto-naskh-arabic-ui-fonts-20161022-7.el8.1.noarch.rpm
3d453fbc9a239b7c55afd77ce5f6d73a97860abebdfb3eacfab46d1e2400d6f7
google-noto-nastaliq-urdu-fonts-20161022-7.el8.1.noarch.rpm
881fe2872e13de931261e9e52d3b29c9183b73a3bbdb95422a7c30be3bc14483
google-noto-sans-armenian-fonts-20161022-7.el8.1.noarch.rpm
1afdb3c07ba26d67d0463255dfc71c5e316f24bf4fa6adf7e96204a6df097eb6
google-noto-sans-avestan-fonts-20161022-7.el8.1.noarch.rpm
8549d9509bb34983498b2a871584e7861b1b7e5b7620a82c8447c4363c24f8af
google-noto-sans-balinese-fonts-20161022-7.el8.1.noarch.rpm
95b38b22969a8afa2d5cf667aa690762eaa35010a1242efd88942739ca463747
google-noto-sans-bamum-fonts-20161022-7.el8.1.noarch.rpm
a0beba19c95e5c7bd2879cab9230492780ac0a3bdce3e652cbcf44e2ef7247f1
google-noto-sans-batak-fonts-20161022-7.el8.1.noarch.rpm
fa3c4c7e71bfe3e7591412839332f37bf9c3394efefc3e6a8ae00d77b888ee51
google-noto-sans-bengali-fonts-20161022-7.el8.1.noarch.rpm
c69876d017c262057100432557a7c11942686cf312c409c333f9451f08bbeed0
google-noto-sans-bengali-ui-fonts-20161022-7.el8.1.noarch.rpm
7f5a4bcfcc4dc9fb88bc4b5bbbbde63cb175053f57de1c0852c56d6eb3d2a76c
google-noto-sans-brahmi-fonts-20161022-7.el8.1.noarch.rpm
00f4a158384b075758dae1f14ada89ea6075565c33ebff7238e8c393eb899013
google-noto-sans-buginese-fonts-20161022-7.el8.1.noarch.rpm
d9827320d8332b8b441b9cd20c5a2ed1521fa4c2a8c918dbc1f96aece0df195b
google-noto-sans-buhid-fonts-20161022-7.el8.1.noarch.rpm
32042bbd855f80ae18b007b4476a93ff5507a11af8b8456183af3eabb2f0c5d5
google-noto-sans-canadian-aboriginal-fonts-20161022-7.el8.1.noarch.rpm
eeb8487dc495979dcf179770dbd978be58dbc86d6116f1ab25654a2f23cebed7
google-noto-sans-carian-fonts-20161022-7.el8.1.noarch.rpm
8da9a2b63f21af5205affe22deb41e75e2d5e0fdef9212409c95ad482d7761b6
google-noto-sans-cham-fonts-20161022-7.el8.1.noarch.rpm
bb82447e61bcea669eedf3658e612c1c69aad42381b7b6220736ade3a72b46bb
google-noto-sans-cherokee-fonts-20161022-7.el8.1.noarch.rpm
74c51fa685d4a7c04f0ea5c4f4ee6abfa1d82a285ec2397403f99c0b62986524
google-noto-sans-coptic-fonts-20161022-7.el8.1.noarch.rpm
4b53d69180d5b24e1594658ccd095129d538661bf0c9def0d37c57ac25710485
google-noto-sans-cuneiform-fonts-20161022-7.el8.1.noarch.rpm
107af3986cd3504d590e8a1896c577d7a488888c09b6dba9d5ad1c04884fb5d2
google-noto-sans-cypriot-fonts-20161022-7.el8.1.noarch.rpm
5a817b07d9267889ffd20abe01c0edcf67d08683885e01bff82ff5baf532297f
google-noto-sans-deseret-fonts-20161022-7.el8.1.noarch.rpm
1f99f054d6ccf566e7d7dd287fa2e7e75287ad3c3818d66a2a481be9531c93f2
google-noto-sans-devanagari-fonts-20161022-7.el8.1.noarch.rpm
06f907e62ad60a45e6bdef41c49c0f03f23264c8a7ba3526b25de68646ad6cdf
google-noto-sans-devanagari-ui-fonts-20161022-7.el8.1.noarch.rpm
d92409e642c58da1b1ae13a173505a765fb7fc3a59dd8b6212fb155d459cfced
google-noto-sans-egyptian-hieroglyphs-fonts-20161022-7.el8.1.noarch.rpm
b9ca8ce4b2fb1d0a5c91416388fc1715121d1b1800496f09dbd12482c4219f53
google-noto-sans-ethiopic-fonts-20161022-7.el8.1.noarch.rpm
3201e2e34512984a42f9a2166b34147a690a02e38318055ee099d2da9e3e8fd5
google-noto-sans-fonts-20161022-7.el8.1.noarch.rpm
f5e5e9f24c260852eea2b74dbba5363d9081d08f74dc4870eeb4874ebc9fbc55
google-noto-sans-georgian-fonts-20161022-7.el8.1.noarch.rpm
05abb9fc5269f05e1e2a2b26a55c4891b0f6625ec1124ec7fe6aae50e8718a78
google-noto-sans-glagolitic-fonts-20161022-7.el8.1.noarch.rpm
606a186eab06888ba297c87e8c43bdfe6531b49feab432d8d53e35fca0641467
google-noto-sans-gothic-fonts-20161022-7.el8.1.noarch.rpm
c1218c4756c88a48afa63dbe6239152bfabd1a415432be2ef67b3db41b261372
google-noto-sans-gujarati-fonts-20161022-7.el8.1.noarch.rpm
7301fe98ad704fcf073b2616aa52a4b0bbaec2463bf5406c70e7be03485424ef
google-noto-sans-gujarati-ui-fonts-20161022-7.el8.1.noarch.rpm
4f68ad38e8c87c89f57b962263cf5ee62c17fc63bc7e0c7cbeb4deb60b43980b
google-noto-sans-gurmukhi-fonts-20161022-7.el8.1.noarch.rpm
9e7b18d8d894e8cb7594ea6523393498a82f3a21f62aca7152bd2b6e014fec5b
google-noto-sans-gurmukhi-ui-fonts-20161022-7.el8.1.noarch.rpm
9e56039ba8b27a03b4f98621ab71ab8ff3f3fe119c91c85596f908d908f04874
google-noto-sans-hanunoo-fonts-20161022-7.el8.1.noarch.rpm
828c13f0fce2bfa346fd7d9441c5d2e2cb04dfaea0fa1f789e8cc613e3a4bc7f
google-noto-sans-hebrew-fonts-20161022-7.el8.1.noarch.rpm
b92f5dd304b9eb29cc7f5250e54eaaf8b3d6e7cd435483c1addc2490ae11ced1
google-noto-sans-imperial-aramaic-fonts-20161022-7.el8.1.noarch.rpm
180f5c232a18e8578bb19660aac3530b2e401c62719ff44c773a060f52804617
google-noto-sans-inscriptional-pahlavi-fonts-20161022-7.el8.1.noarch.rpm
d976db0a87a94ea3ba8da7c87f2f04bb2a55422ba79ba8417fb1c440d6ca8208
google-noto-sans-inscriptional-parthian-fonts-20161022-7.el8.1.noarch.rpm
fe45186363e56bbd733ad113dfc400b516171d79332d4a1ab0704cf7946a45ab
google-noto-sans-javanese-fonts-20161022-7.el8.1.noarch.rpm
6c142a3293c3ae57547a28e51bf01dfdaf997c92adce67de523b56d01e14962e
google-noto-sans-kaithi-fonts-20161022-7.el8.1.noarch.rpm
aad3715ff21c82d6ca2f9e4ef3182cda585abc76ed152b7b9ddfe127483ea089
google-noto-sans-kannada-fonts-20161022-7.el8.1.noarch.rpm
f6eecafd4beea6b4f8445e2f448ee5b2c80838115d8b80d5fccfca60887cda53
google-noto-sans-kannada-ui-fonts-20161022-7.el8.1.noarch.rpm
7c99250cf2026843102512351ba0af21d9b0a3f59d003e5cec1742bbc54e78b0
google-noto-sans-kayah-li-fonts-20161022-7.el8.1.noarch.rpm
60b483a0c9ed8b2f1a20e08c6099d273d38732977488963dd8a7968e7fecf8c3
google-noto-sans-kharoshthi-fonts-20161022-7.el8.1.noarch.rpm
cc5156d32dab923a94bedcb901fbd927928d54e101469c17be4cb888ddea846f
google-noto-sans-khmer-fonts-20161022-7.el8.1.noarch.rpm
d80e9a1fc77297e2862266f8115e7b1089d1dc8e818463d017da8912c8450383
google-noto-sans-khmer-ui-fonts-20161022-7.el8.1.noarch.rpm
ddd7809f2d875216c0e522c639c8ea1461f9b184eaad3b5c88876a7fdd6bc612
google-noto-sans-lao-fonts-20161022-7.el8.1.noarch.rpm
0b6f08aac4d4a4232aa2f14482a40e6b333fe85260a68ab338dea88722fb21ab
google-noto-sans-lao-ui-fonts-20161022-7.el8.1.noarch.rpm
2924d266d3dab3309f6c91ebdf14fae25d91e5edbe6c592ebe4171313dc41d19
google-noto-sans-lepcha-fonts-20161022-7.el8.1.noarch.rpm
60e73bad8007ef25e98a4eedd5f299c0c3698228728aa329849ba93e39c2f1aa
google-noto-sans-limbu-fonts-20161022-7.el8.1.noarch.rpm
cd867ab343bd34082155f9af40d1d42446215ee9cf9bbce0ad852d6cd788ec2f
google-noto-sans-linear-b-fonts-20161022-7.el8.1.noarch.rpm
70e61c43aefdec1b04c8d84911600adaa5d061fdad6f703a358bd0d96dc8aeaf
google-noto-sans-lisu-fonts-20161022-7.el8.1.noarch.rpm
3bd80ea7fdebd7625c81c7b889e99b82f8569f2288fe84cf8741406f3c7ce451
google-noto-sans-lycian-fonts-20161022-7.el8.1.noarch.rpm
d56f26d69b432891d45ed7e8efa760c544ba4b993f48bd079c812790840bbcb8
google-noto-sans-lydian-fonts-20161022-7.el8.1.noarch.rpm
924fecc774847165e8482fd6f4a77003dba7099f80f7f18129a9f4888b0e1715
google-noto-sans-malayalam-fonts-20161022-7.el8.1.noarch.rpm
596a7997a9ba17df887547c705e7a694d2d99e4d1dfcefcb37ee8ef6c2a0cda1
google-noto-sans-malayalam-ui-fonts-20161022-7.el8.1.noarch.rpm
b3bc779d1a6086f006fd5504fa465e8fd1d6fb7abdf26c44ae3991fbf3e2d115
google-noto-sans-mandaic-fonts-20161022-7.el8.1.noarch.rpm
43c39a98a28d9d95861800197ddc7e72ee5f430dcf4de6d8ed53e96f0aafc59c
google-noto-sans-meetei-mayek-fonts-20161022-7.el8.1.noarch.rpm
5d80de8a140f4ff37d56978f5b6a698534fff3f46e4359c8225153e3dcc8d26f
google-noto-sans-mongolian-fonts-20161022-7.el8.1.noarch.rpm
47ba6e340ec2de58d3fc5c698f7a6046a67446b7d5b238ccf09f833c48597dd1
google-noto-sans-myanmar-fonts-20161022-7.el8.1.noarch.rpm
78440d1722a5f7daaa95e4c302ab2d97739ac385968fbe85be5d7698ed363519
google-noto-sans-myanmar-ui-fonts-20161022-7.el8.1.noarch.rpm
1f327ecc610b021068746659a6a1a84d09fa5f4c50721b88223d4525b46b0a94
google-noto-sans-new-tai-lue-fonts-20161022-7.el8.1.noarch.rpm
718eed1d2f470e024b6994bdf80d5265ae659d228c46c2699826540031944848
google-noto-sans-nko-fonts-20161022-7.el8.1.noarch.rpm
7f35fbc6e542114c530841d076696a43b4879c38cb820045f5a388714fd9159a
google-noto-sans-ogham-fonts-20161022-7.el8.1.noarch.rpm
1ceb4a4a1ad86f2b3c8987da6e5881118ae372f7f7da1b5698719a90156031df
google-noto-sans-ol-chiki-fonts-20161022-7.el8.1.noarch.rpm
577fa59a3bd3b5653a44fc6ad111649d97c9f8fc69893b9808257e16ff8328f2
google-noto-sans-old-italic-fonts-20161022-7.el8.1.noarch.rpm
e7059bf126c5bdfe66fc4dc27414cfabbb42a32c00f246e3d44d5b4cb1a3e66e
google-noto-sans-old-persian-fonts-20161022-7.el8.1.noarch.rpm
36f7d58ad130d8886a5afdcc5a6a1c27ae32044d4224d7ff23f9ff4ca6c47bb7
google-noto-sans-old-south-arabian-fonts-20161022-7.el8.1.noarch.rpm
5146b3f7f9f7617ca1b85ec2e8ec3541d6dc21de917e578492f1a1a1614e6984
google-noto-sans-old-turkic-fonts-20161022-7.el8.1.noarch.rpm
78a54f8247040e17bd0ca4436f8f97780cb7ef8d0da7865fa0329943f056822e
google-noto-sans-oriya-fonts-20161022-7.el8.1.noarch.rpm
f4711424620ba201d257c9f8e0cab655a467e8a0016df3ec6465baf14287464d
google-noto-sans-oriya-ui-fonts-20161022-7.el8.1.noarch.rpm
549382c75c021ab8bb71cdd4d591e75effeb71d26cdbbedf606d6a292c4a7963
google-noto-sans-osmanya-fonts-20161022-7.el8.1.noarch.rpm
462080e011048f6cd91e785c20e2d58a2bdbfbec20909f0ab49fdd9ce4c36cef
google-noto-sans-phags-pa-fonts-20161022-7.el8.1.noarch.rpm
1654e2bf83c0009fd6f7492b6d3194bd05b0a81caa15ba1260d631547988538d
google-noto-sans-phoenician-fonts-20161022-7.el8.1.noarch.rpm
de9a02ab3108811c9ada8442977a0e6e27b17aebd05e57b4bd1bf4d0a89bc40a
google-noto-sans-rejang-fonts-20161022-7.el8.1.noarch.rpm
86ecdff8779c5d2c47bf53bb962bc7ce15b0f257e1969ddd05c9419e25dc7ab0
google-noto-sans-runic-fonts-20161022-7.el8.1.noarch.rpm
de7b23e118d889218329e95180fba6f5ee55fa32f1d46c4759edd7b3aa4c1f1e
google-noto-sans-samaritan-fonts-20161022-7.el8.1.noarch.rpm
c013cff0f199664040aa90b4bfbcd44ab0cd8f376a03f82bd9c2c6fe4ffd5a10
google-noto-sans-saurashtra-fonts-20161022-7.el8.1.noarch.rpm
2a162ead4e35e933fb9030df85f577c0f9daf9edbfeef8d8656b96ddcec399ed
google-noto-sans-shavian-fonts-20161022-7.el8.1.noarch.rpm
1a722c9b472ef029e6924b8bf2f49f3a0fa5d9210ab5ef72ef8dbadf910798df
google-noto-sans-sinhala-fonts-20161022-7.el8.1.noarch.rpm
732241415064377ba25a40b26b468fcbd73f2ef7d25d1a093004b6fad929d4db
google-noto-sans-sundanese-fonts-20161022-7.el8.1.noarch.rpm
1b4041239d8d3a655a67c0afbe53224a59c95a523d8c619c1f920ae90df67eb8
google-noto-sans-syloti-nagri-fonts-20161022-7.el8.1.noarch.rpm
e1d3b6bfe8c0808e5861fff22295a9353229fc9b8b1045089efc61994e0a0b4e
google-noto-sans-symbols-fonts-20161022-7.el8.1.noarch.rpm
445f9a3ba6837607d3da06a1621d8058732aa9a0b72238632e4cf0d3641654a7
google-noto-sans-syriac-eastern-fonts-20161022-7.el8.1.noarch.rpm
f4aeef574633a828f0d0046127b4eb11476275ab17d3161c713e46f289b78e5e
google-noto-sans-syriac-estrangela-fonts-20161022-7.el8.1.noarch.rpm
2ec396f9d6b7daab1d326cb557f71bcb8b5fd6fbf26ababcf39e9510b91f189a
google-noto-sans-syriac-western-fonts-20161022-7.el8.1.noarch.rpm
9bcf761f2a6b6515a4924697066dd10589d9860f248b520bb6765f1e5e791422
google-noto-sans-tagalog-fonts-20161022-7.el8.1.noarch.rpm
9513c313ac8baed19701397705eb80df22d453eb3ff7fee09daff328618ba8f7
google-noto-sans-tagbanwa-fonts-20161022-7.el8.1.noarch.rpm
a320e1a5e5f4c4ddc9ad6c4bedd14790803e3203ab3497ee53e976e23638d4d0
google-noto-sans-tai-le-fonts-20161022-7.el8.1.noarch.rpm
0eddb4c72b753720d0cd41326aa32330f9264c5aaa4ed02ec2b50deb15988419
google-noto-sans-tai-tham-fonts-20161022-7.el8.1.noarch.rpm
de23ad42f12dcde951a9ed2a9b2c8b2744a923ffe88f9e57588c59f0ef010e22
google-noto-sans-tai-viet-fonts-20161022-7.el8.1.noarch.rpm
36eead07805038f4f99a65d343ff728f3efa039432f3aab225a0896daaa07554
google-noto-sans-tamil-fonts-20161022-7.el8.1.noarch.rpm
2124b988ddc384ad951e6b582ffa4d151f46ef1fe86c2b3ea40e8217386d9506
google-noto-sans-tamil-ui-fonts-20161022-7.el8.1.noarch.rpm
8b662de72aa6d9f2512b93491ba95a1790d77266afda7fb0c3669146b02795b0
google-noto-sans-telugu-fonts-20161022-7.el8.1.noarch.rpm
f461e093f472a9c7d1d1b6c2116e44ff41a2c2790eea193f201ce890817eef08
google-noto-sans-telugu-ui-fonts-20161022-7.el8.1.noarch.rpm
891ce2398cde591c82445b719e1ea9d7e90f8f6c7291f49c03efe6cc59d7d796
google-noto-sans-thaana-fonts-20161022-7.el8.1.noarch.rpm
bf2bcd66091bafc88dc301f2ff0f4081f4ab3a80c21ff817d84ef6f527591e99
google-noto-sans-thai-fonts-20161022-7.el8.1.noarch.rpm
5c9f0078b7c5bc0e7c0811ad90949d361ac778b4657784258a6321c692a7b39a
google-noto-sans-thai-ui-fonts-20161022-7.el8.1.noarch.rpm
a6b013bc3f194c2c1f3bcddb01bdfa3c70eddec2b59c4923243400cde5e0f6cd
google-noto-sans-tibetan-fonts-20161022-7.el8.1.noarch.rpm
7c749e6c13864fbf2f123062dbf078edc7bb4a086dc6f6f8bbcd5a470f8868ab
google-noto-sans-tifinagh-fonts-20161022-7.el8.1.noarch.rpm
d73b184e3ac70dcef918d04f6d71d732c669f3e7650bf1d9eb609bae557eb04a
google-noto-sans-ugaritic-fonts-20161022-7.el8.1.noarch.rpm
c2b23c6ef16b4449d292788dffa8ec4330a495a3400f2bd55b5a1bffec9f0afb
google-noto-sans-ui-fonts-20161022-7.el8.1.noarch.rpm
3c2f8335cfd198916a192f431b8714a63370b80de5c4f11cf57f172c74c014e9
google-noto-sans-vai-fonts-20161022-7.el8.1.noarch.rpm
47d6ea20f593be3893dc23c6ef20adb49325fa534890049bac9cc70ed745ba61
google-noto-sans-yi-fonts-20161022-7.el8.1.noarch.rpm
e602ac52168ec2649b85e01b2307f7f6888c6468dfd2cf28610d76e5a47d5eec
google-noto-serif-armenian-fonts-20161022-7.el8.1.noarch.rpm
316d0b9104eb7df90cf05316a8549694a5ccc3eca1fa6f2d3b408d22017518c5
google-noto-serif-bengali-fonts-20161022-7.el8.1.noarch.rpm
f975618990610842d350d936dcddcb18d49987d1c937bf7d759d85f713606e3d
google-noto-serif-devanagari-fonts-20161022-7.el8.1.noarch.rpm
33a22bc760dc6e333b85008cbd9a54fda9185af5bf81d3dd51c88ad49460c75d
google-noto-serif-fonts-20161022-7.el8.1.noarch.rpm
bc2a72c11edfd2ffbb662adaf6e45ccc00ce8d6b8e2253b1419b64376073a891
google-noto-serif-georgian-fonts-20161022-7.el8.1.noarch.rpm
88370f2a2e7e9056e2838a2c6a503a79ec8496658c4a91993ed076f548c172f6
google-noto-serif-gujarati-fonts-20161022-7.el8.1.noarch.rpm
a9780ebb04e2462dbc9ab3335edeb8068542131fb47ae73ab1033b81cdbef847
google-noto-serif-kannada-fonts-20161022-7.el8.1.noarch.rpm
ad7511bdf37887e2327234151c9e7e350ea734dfde715c0836c0494fd66dc878
google-noto-serif-khmer-fonts-20161022-7.el8.1.noarch.rpm
633bd366630acc49451b90027b3e1891e01e97c2dd7e5763ec2d8ea19dcaa42c
google-noto-serif-lao-fonts-20161022-7.el8.1.noarch.rpm
16b575e7835dba5057a82708e1cabd30340d51d237250dd3cd725f5a995b0b16
google-noto-serif-malayalam-fonts-20161022-7.el8.1.noarch.rpm
dc01c2d61bfe5fa43a2c0fd5e8453c1da1922f5f08a905f566baa9abd3a9229e
google-noto-serif-tamil-fonts-20161022-7.el8.1.noarch.rpm
26adb2a3043264f623e3b8056aeebfb7b5518e9507fcb7f8ba21c21f08282f60
google-noto-serif-telugu-fonts-20161022-7.el8.1.noarch.rpm
26e9e20667b482fc729cf245e916c81eb1a77165f6e963290e2854eee2a2dd67
google-noto-serif-thai-fonts-20161022-7.el8.1.noarch.rpm
a1de6ac7f1c39cbf49e15668260901a0f8fd1337a0a3931477bbe6d2976cb4ef
RLBA-2020:4792
omping bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for omping.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
omping-0.0.4-18.el8.x86_64.rpm
7c52cea22fe1414818800cf2e4b030ee2b22daac0d2cce173f57aff3f29893cf
RLBA-2020:4795
rpmlint bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpmlint.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rpmlint-1.10-14.el8.noarch.rpm
4c1a93528d02390318976858c4daa1a77cf258c69c5d1e80b75f443544e53672
RLBA-2020:4798
python-justbases bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-justbases, python-justbytes.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-justbases-0.14-4.el8.noarch.rpm
e194b11631a284bf9f7ece9b2fba00f1748bffcbcf540a6c943c4d8445c31e1a
python3-justbytes-0.14-2.el8.noarch.rpm
cac2a8bcd4ef610d9498f194540f62c4ded2894080b4396d01f44f73609c1b70
RLEA-2020:4803
perl:5.30 metadata for the Rocky Linux 8 module matrix (3/3)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
RLBA-2020:4824
ruby:2.5 bug fix update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm
43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
RLSA-2020:4827
Moderate: oniguruma security update
Oniguruma is a regular expressions library that supports a variety of character encodings.
Security Fix(es):
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for oniguruma.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Oniguruma is a regular expressions library that supports a variety of character encodings.
Security Fix(es):
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
oniguruma-6.8.2-2.el8.x86_64.rpm
b0e45f265d039cb2f8e12fd3c85ed1f95eaa44f37978c4a3faf169020907d6e7
RLBA-2020:4828
rpmdevtools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpmdevtools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rpmdevtools-8.10-8.el8.noarch.rpm
35b7558165c1564c655fba49a8acf0d03ed7c361d0dcde47cf85740e052c46b9
RLBA-2020:4832
torque bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for torque.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
torque-libs-4.2.10-25.el8.x86_64.rpm
d8ea26158c65c5e8a729e117ee07c15cbbf864caa1f267f2dbe7bb830f3914a9
RLBA-2020:4834
new packages: gcc-toolset-10-systemtap
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-gcc-9.2.1-2.3.el8.x86_64.rpm
9773ebdd8bc8be47124faad82a588ac87521b1ccba5968aee2cadd7f446a7f87
gcc-toolset-9-gcc-c++-9.2.1-2.3.el8.x86_64.rpm
ea925505982b6aef4b57ce7221b18c7c0af4d6cbf79703dbe7f1d78bc68c1897
gcc-toolset-9-gcc-gdb-plugin-9.2.1-2.3.el8.x86_64.rpm
9fdeac6aa41b7aa1d96d66458c0635f416fb181b4913cb987ff94e15f78455b5
gcc-toolset-9-gcc-gfortran-9.2.1-2.3.el8.x86_64.rpm
fbb05fc9585b6e6a98572c78955654f77c0fbc1bf70c644379ded2908f63b3ab
gcc-toolset-9-libasan-devel-9.2.1-2.3.el8.x86_64.rpm
b3a980f8f8533d2c850c6ea94e64fcfb0ea95478ab043b1847309916e306efe3
gcc-toolset-9-libatomic-devel-9.2.1-2.3.el8.x86_64.rpm
a44828c99683dee995ff1dcf9e76dfb18c621e9a37e412eebaef846732a610bd
gcc-toolset-9-libitm-devel-9.2.1-2.3.el8.x86_64.rpm
38f6ffa33a061227cdc266ab1c6e31c4e81465cabe7c167ac1b69ec641d443d2
gcc-toolset-9-liblsan-devel-9.2.1-2.3.el8.x86_64.rpm
5a93eec6b35977c58c875613b92ed09b42bc27cb2eb4904ea10940d44d62c2a5
gcc-toolset-9-libquadmath-devel-9.2.1-2.3.el8.x86_64.rpm
bd26ee22d060d9ee6192c90c62f30dbc3da18d7fc0bf97867b0bdda1073eaa3c
gcc-toolset-9-libstdc++-devel-9.2.1-2.3.el8.x86_64.rpm
570fbb1b45eab5c8de6c14aeeff538333e7371d623995835b217f9610f34d7c8
gcc-toolset-9-libstdc++-docs-9.2.1-2.3.el8.x86_64.rpm
1d38b3f8d8083cf36b97b69d488f9ac7ce837515bb65131f765f41e6eec0467d
gcc-toolset-9-libtsan-devel-9.2.1-2.3.el8.x86_64.rpm
37ce964fb081c4109ae2dbc90a7965e1c56184fb7fdfec030c1ceae70f19515e
gcc-toolset-9-libubsan-devel-9.2.1-2.3.el8.x86_64.rpm
2a65df9b0cbd1661ed2deed9c0b23fe54fba4830823ffde1f5458fad3f95dcab
RLBA-2020:4857
idm:DL1 bug fix update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* nsslapd-db-locks patching no longer works (BZ#1882472)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* nsslapd-db-locks patching no longer works (BZ#1882472)
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
RLBA-2020:4859
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443)
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLBA-2020:5097
eclipse:rhel8 bug fix update
Eclipse is an integrated development environment (IDE).
The metadata for the eclipse:Rocky Linux8 module has been updated to remove the following unused profiles:
c
everything
To check whether you have the obsolete profiles installed, run:
# yum module list eclipse
The installed profiles have the [i] indicator next to their names.
To ensure the eclipse:Rocky Linux8 module contains the correct metadata, remove the unused profiles and reinstall the module with the java profile:
# yum module remove -y eclipse
# yum module reset -y eclipse
# yum clean all
# yum module -y install eclipse:Rocky Linux8/java
To install the eclipse:Rocky Linux8 module from scratch, use the java profile:
# yum module -y install eclipse:Rocky Linux8/java
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for eclipse-emf, eclipse-ecf, apache-commons-compress, hamcrest, opentest4j, xz-java, google-gson, glassfish-el, icu4j, xmlgraphics-commons, jsch, felix-scr, apiguardian, junit, glassfish-jsp, lucene, jetty, junit5, apache-commons-jxpath, eclipse, univocity-parsers, xml-commons-apis, felix-gogo-command, sat4j, batik, felix-gogo-shell, glassfish-annotation-api, jzlib, glassfish-jsp-api, objectweb-asm, felix-gogo-runtime, glassfish-servlet-api.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Eclipse is an integrated development environment (IDE).
The metadata for the eclipse:Rocky Linux8 module has been updated to remove the following unused profiles:
c
everything
To check whether you have the obsolete profiles installed, run:
# yum module list eclipse
The installed profiles have the [i] indicator next to their names.
To ensure the eclipse:Rocky Linux8 module contains the correct metadata, remove the unused profiles and reinstall the module with the java profile:
# yum module remove -y eclipse
# yum module reset -y eclipse
# yum clean all
# yum module -y install eclipse:Rocky Linux8/java
To install the eclipse:Rocky Linux8 module from scratch, use the java profile:
# yum module -y install eclipse:Rocky Linux8/java
rocky-linux-8-x86-64-appstream-rpms__eclipse
eclipse-ecf-runtime-3.14.8-1.module+el8.6.0+852+cc16a686.noarch.rpm
c022be04f3a9c9808a10c02968cbfad7d42d3473797331752a61c36e9f5df38d
apache-commons-compress-1.20-3.module+el8.6.0+852+cc16a686.noarch.rpm
54bfab89adfcbe6ce45d011bbe815251a7e087859fdd4c2d5f536f8d51d5e676
apache-commons-jxpath-1.3-36.module+el8.6.0+852+cc16a686.noarch.rpm
f86dbab30d8a81766e5b614494bf372c3358398fbc913031eaa2df32ca51a98c
apiguardian-1.1.0-4.module+el8.6.0+852+cc16a686.noarch.rpm
5d211569920bca4c30624745f955ff8bb888c78200e7674a26f12cbbe6d7a7b9
batik-css-1.11-6.module+el8.6.0+852+cc16a686.noarch.rpm
da439b9e2feb947a1039d1249cf8fd29dc56b40c6eec7e458362a0602f2ed1fe
batik-util-1.11-6.module+el8.6.0+852+cc16a686.noarch.rpm
5f697a0c964fe55f1d8c7c5655b764a9323861b69f575ddc75335619dd51e153
eclipse-ecf-core-3.14.8-1.module+el8.6.0+852+cc16a686.noarch.rpm
2b6551f4c6b7faaed75e686870d2f34566048ba7b7c28180acd0eb4a005a927d
eclipse-emf-core-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm
b3a066be91f18606ed687f9bc6a0295754810ab521913ddbdb79114c6614007b
eclipse-emf-runtime-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm
b50f7f15849c846af7d0ebd29c7ecef6b8b10b2651d79b07b8fd71bf83bbbdcb
eclipse-emf-xsd-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm
1b1a18ff22c0353c2cf27275beed2ef81d55df5c803e20ffe3a755189a7842e5
eclipse-equinox-osgi-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm
d2fc4ee364038cff7ca2fd9d5ee324b3c2917c8fe19f9cc2c8567cd2f22d68d0
eclipse-jdt-4.16-7.module+el8.6.0+852+cc16a686.noarch.rpm
5cbeeaa9ea911616176c976c1265f58a41c1a6fa776387cbfb86a60befcb8e3c
eclipse-p2-discovery-4.16-7.module+el8.6.0+852+cc16a686.noarch.rpm
832cfb689a483c8454b46af419ab5f821a07e33fb1fb7938e3e036b4792f574b
eclipse-pde-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm
e10fa2a6f9fa5bd832b102474a5e56e30a3f43d529b0c610afb1d4b7bb272091
eclipse-platform-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm
bc48bd19edd1e7cb1f3ec77432a3488c3d0fc897a67b72901bbc18ededf5238e
eclipse-swt-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm
31b6d7f61a6397a5649ab93a070546075d19c7184e8349b5d3925158645bcf0e
felix-gogo-command-1.0.2-11.module+el8.6.0+852+cc16a686.noarch.rpm
3a93e517847fc4c81b5402a07e4c56c29a8c429f4b334248479f369a995defb1
felix-gogo-runtime-1.1.0-7.module+el8.6.0+852+cc16a686.noarch.rpm
a4a5f3b3ea3511eba6cf5291235c22ad00ac5b1c9cf635aa261f3e95ca3a4b82
felix-gogo-shell-1.1.0-5.module+el8.6.0+852+cc16a686.noarch.rpm
273ada9d85f59f99df697c94156dfafff6195c3c1b944dd886ea8cbc9089628e
felix-scr-2.1.16-6.module+el8.6.0+852+cc16a686.noarch.rpm
8a67a0b3d084db0b4858321e5367fd991c1006d9db50224dee1eccccd37b31d0
glassfish-annotation-api-1.3.2-3.module+el8.6.0+852+cc16a686.noarch.rpm
703801e1ebfbf2db9652d0e01533b90244de682d93ef14a85747d96dce45f2e9
glassfish-el-3.0.1-0.14.b08.module+el8.6.0+852+cc16a686.noarch.rpm
294ccea2bf1e4ec3b1b5b22c72ecf1a7048c8fe4c788505268a3af11ba76b75a
glassfish-el-api-3.0.1-0.14.b08.module+el8.6.0+852+cc16a686.noarch.rpm
8a4b2147c1e2c48ef79b28849c2d9abc2769916b4fd64e099cd7ba76ac6796b0
glassfish-jsp-2.3.4-6.module+el8.6.0+852+cc16a686.noarch.rpm
10ded3bb70fe97a33665f35d93b110af72549dd1674201c1e1e6960274dd0f9f
glassfish-jsp-api-2.3.3-3.module+el8.6.0+852+cc16a686.noarch.rpm
bc5159d48df06a63a147b1450232276cce31f41119248e7121434841525da050
glassfish-servlet-api-3.1.0-19.module+el8.6.0+852+cc16a686.noarch.rpm
701cd9989836037d2351416166746d199bc27a961975abf1abb1cc0d97d0dc97
google-gson-2.8.6-5.module+el8.6.0+852+cc16a686.noarch.rpm
ec905915ae8d0fb45e77a70ed2b5c7d59141cf8d29ca5d4bc117d43a0e02caac
hamcrest-1.3-29.module+el8.6.0+852+cc16a686.noarch.rpm
d6961beb16096fc8cb043926865610afff28b8fdafb441480c952309f869cd28
hamcrest-core-1.3-29.module+el8.6.0+852+cc16a686.noarch.rpm
bd758285f531c699073d64dc1dcd91de9c2deef1a8b88c8d6b9b0009cf42e909
icu4j-65.1-3.module+el8.6.0+852+cc16a686.noarch.rpm
1102f0b1275d7fb89dfe91af7698838927cad6378d87a0d272191a1b5c76c477
jetty-continuation-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm
1ebf769924a1d9310ca1f47b0f720c1c6bde93c19055d6e09816b89e17b2b2df
jetty-http-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm
d9fa84fc32ac55b4005d61f55f6cfd28974fa961d72ea798f98279edb0bb1cec
jetty-io-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm
67bb386c7e94198c7e2fefd9010c2ceccb7fa4c3bec027a3a2b24c9a79881138
jetty-security-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm
df6da93a9ad6b422e86060bb2f8f8713a14ee85b3da39af0f927c66a6a97f3d9
jetty-server-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm
0b79315d24eaebcc30dca6cc7836435fc6e9a763dda48220673362ee6f7fba13
jetty-servlet-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm
376d8d54e05c2c59ee805427c69859d645be3bb6389e729442048883c4297f79
jetty-util-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm
2df8425fa30d85dfbc2cacbb99daf67b2cb1fc3b1528317a3e33edcf1b91de79
jsch-0.1.54-12.module+el8.6.0+852+cc16a686.noarch.rpm
7819f4825e0e1f5032ab3e830b2c31378c99d173ee5206e97fef9f6ae4815728
junit-4.12-14.module+el8.6.0+852+cc16a686.noarch.rpm
50c7ed83373b39becd030cabb7e8642e8b93a989c430c90f5c020cd1f22fa9a2
junit5-5.6.2-2.module+el8.6.0+852+cc16a686.noarch.rpm
ffd97d82955713cbd27bcb1bad226bde853980b08c2e17bf773197129d7ae5ff
jzlib-1.1.3-14.module+el8.6.0+852+cc16a686.noarch.rpm
cde0e8f72aa6bb0e3e6c6e7dd8ab9b35ea357cdc3a28e0cc42f0e2f5e4445ed8
lucene-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm
ac562d24219b7f6b075948e8072ce4ba1bc9f0ca70b7eded84210533a0216c96
lucene-analysis-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm
dc5759041513365440d1d204e578a501c3348c7743ebeefdc90b630b79ec89cf
lucene-analyzers-smartcn-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm
534c30d5d86143f31e6a43397c6186e5e78bf4f992931961a83c163835cd1d0e
lucene-queries-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm
0bdc59a0ed4e582d7aacf63768889696c7d641ddc5ea73c76a5bb9c6de78d99b
lucene-queryparser-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm
60af65c5e33288467ff96fad195a11970029e1eb172057c9a2aa7e91692264e1
lucene-sandbox-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm
ac1f7779560a51e86dc69919dbba3140a4f9d91f5cbffc29dc6aa76c2cb58c35
objectweb-asm-7.3.1-3.module+el8.6.0+852+cc16a686.noarch.rpm
280c6e526eee27c056bd66c775913d3de25276626fda634b0f8ba5b5286da26f
opentest4j-1.2.0-2.module+el8.6.0+852+cc16a686.noarch.rpm
e69408548274dcfc21b005ea1337e165ebbc8a777fc7ec9c82bfca624a6f5938
sat4j-2.3.5-19.module+el8.6.0+852+cc16a686.noarch.rpm
7073d09ef3cf849d253baa77593bf149a7bc31e812bd32e2a10134ad09e3106c
univocity-parsers-2.8.4-3.module+el8.6.0+852+cc16a686.noarch.rpm
9f94b2b287f91b1e3d4644a0e833a0e4728c72aebf417e1ce52cb2e174f2db62
xml-commons-apis-1.4.01-31.module+el8.6.0+852+cc16a686.noarch.rpm
567ab7f5f432d4366046a8eae2d10cad1ebc1a13e9185e28fbc2a4f6d697b91b
xmlgraphics-commons-2.3-4.module+el8.6.0+852+cc16a686.noarch.rpm
3cc01663d6dbea331c9ced9b6a39e51a422ebd9885ac3493706053a07c8fac68
xz-java-1.8-8.module+el8.6.0+852+cc16a686.noarch.rpm
f420a85d668422c1ee2dc1ffdc2aaaa04fc56e00bab58225e378bfbed3b908a8
RLEA-2020:5101
nodejs:14 bug fix and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.15.0). (BZ#1891809)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.15.0). (BZ#1891809)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
RLSA-2020:5393
Important: libexif security update
The libexif packages provide a library for extracting extra information from image files.
Security Fix(es):
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libexif.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libexif packages provide a library for extracting extra information from image files.
Security Fix(es):
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libexif-0.6.22-5.el8_3.x86_64.rpm
e54c3df642c1d98430f783e10d314adeddf2ebab3fdf4a2da274af4a91f9980f
RLBA-2020:5494
virt:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2020:5496
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* update description and summary for container-tools module for 8.3.0 (BZ#1898204)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-podman-api, libslirp, toolbox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* update description and summary for container-tools module for 8.3.0 (BZ#1898204)
rocky-linux-8-x86-64-appstream-rpms__container-tools
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
RLBA-2020:5497
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* update description and summary for container-tools module for 8.3.0 (BZ#1898251)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* update description and summary for container-tools module for 8.3.0 (BZ#1898251)
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLBA-2020:5498
container-tools:1.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm
a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm
a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051
RLSA-2020:5499
Moderate: nodejs:12 security and bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* yarn install crashes with nodejs:12 on aarch64 (BZ#1901045)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* yarn install crashes with nodejs:12 on aarch64 (BZ#1901045)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2020:5500
Important: mariadb:10.3 security, bug fix, and enhancement update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086)
Security Fix(es):
* mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974)
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780)
* mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814)
* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)
* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776)
* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789)
* mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812)
* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009)
* Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017)
* Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021)
* There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for Judy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086)
Security Fix(es):
* mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974)
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780)
* mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814)
* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)
* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776)
* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789)
* mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812)
* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009)
* Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017)
* Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021)
* There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077)
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLSA-2020:5503
Moderate: mariadb-connector-c security, bug fix, and enhancement update
The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases.
The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993)
Security Fix(es):
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922)
* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)
* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Code utilizing plugins can't be compiled properly (BZ#1899001)
* Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005)
* Replace hard-coded /usr with %{_prefix} (BZ#1899099)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mariadb-connector-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases.
The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993)
Security Fix(es):
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922)
* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)
* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Code utilizing plugins can't be compiled properly (BZ#1899001)
* Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005)
* Replace hard-coded /usr with %{_prefix} (BZ#1899099)
rocky-linux-8-x86-64-appstream-rpms
mariadb-connector-c-3.1.11-2.el8_3.x86_64.rpm
7e41a8173ee09b353a8e2052e6802488223928a6d840b765406606930b400d3a
mariadb-connector-c-config-3.1.11-2.el8_3.noarch.rpm
a766f0f5d7ca81d2cf761edfe23b15e847daca41579928bf6789f950478d3f41
mariadb-connector-c-devel-3.1.11-2.el8_3.x86_64.rpm
9a0ce0a6e724517550bd10188dc247491765bd5ecb774d0b160185951ea4186d
RLSA-2020:5620
Important: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.5).
Security Fix(es):
* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694)
* postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695)
* postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349)
* postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350)
* postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696)
* postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.5).
Security Fix(es):
* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694)
* postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695)
* postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349)
* postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350)
* postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696)
* postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:0507
Important: subversion:1.10 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
RLSA-2021:0531
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for udica, toolbox, python-podman-api, libslirp, oci-seccomp-bpf-hook, slirp4netns, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLBA-2021:0542
virt:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix(es):
* qemu-ga aborts after guest-shutdown command (BZ#1900578)
* Report logical_name for disks without mounted file-system (BZ#1913818)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix(es):
* qemu-ga aborts after guest-shutdown command (BZ#1900578)
* Report logical_name for disks without mounted file-system (BZ#1913818)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2021:0546
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman exec is fragile in the presence of signals (BZ#1913294)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman exec is fragile in the presence of signals (BZ#1913294)
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLBA-2021:0547
idm:DL1 bug fix and enhancement update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* IPA WebUI inaccessible after upgrading to Rocky Linux 8.3.- idoverride-memberof.js missing (BZ#1895910)
* IPA should handle situations where krb5 library breaks FAST armoring with referrals (BZ#1914821)
* ipa-kdb: support subordinate/superior UPN suffixes (BZ#1914823)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* IPA WebUI inaccessible after upgrading to Rocky Linux 8.3.- idoverride-memberof.js missing (BZ#1895910)
* IPA should handle situations where krb5 library breaks FAST armoring with referrals (BZ#1914821)
* ipa-kdb: support subordinate/superior UPN suffixes (BZ#1914823)
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
RLSA-2021:0548
Moderate: nodejs:10 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.23.1).
Security Fix(es):
* libuv: buffer overflow in realpath (CVE-2020-8252)
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-dot-prop: prototype pollution (CVE-2020-8116)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* npm: sensitive information exposure through logs (CVE-2020-15095)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.23.1).
Security Fix(es):
* libuv: buffer overflow in realpath (CVE-2020-8252)
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-dot-prop: prototype pollution (CVE-2020-8116)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* npm: sensitive information exposure through logs (CVE-2020-15095)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2021:0549
Moderate: nodejs:12 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3).
Security Fix(es):
* nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746)
* nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747)
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3).
Security Fix(es):
* nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746)
* nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747)
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2021:0551
Moderate: nodejs:14 security and bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.15.4).
Security Fix(es):
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* yarn install crashes with nodejs:14 on aarch64 (BZ#1916465)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.15.4).
Security Fix(es):
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* yarn install crashes with nodejs:14 on aarch64 (BZ#1916465)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
RLSA-2021:0611
Important: xterm security update
The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.
Security Fix(es):
* xterm: crash when processing combining characters (CVE-2021-27135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for xterm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.
Security Fix(es):
* xterm: crash when processing combining characters (CVE-2021-27135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
xterm-331-1.el8_3.2.x86_64.rpm
8629d4e72f706d5517709ad3bda5acb21001ae8d719e4d50edd8e45677061939
xterm-resize-331-1.el8_3.2.x86_64.rpm
15a174cdbba3b93c9dc25350b13385951de4f8bfd22f0732527728a6489d1ab0
RLSA-2021:0705
Important: container-tools:1.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, podman, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm
a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
podman-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.x86_64.rpm
c2d84d68508ad6a5f13e002fde9bec2a1b8c4b11d90b1ba7a17f20ddaabba31f
podman-docker-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.noarch.rpm
be8182cafbea4dc23e96a23c5ba0369a54ad19f7e5343dc0d03b309e85a126e0
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm
a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051
RLSA-2021:0706
Important: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLSA-2021:0711
Important: virt:rhel and virt-devel:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2021:0734
Important: nodejs:12 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.21.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.21.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2021:0735
Important: nodejs:10 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.24.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.24.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm
870dbeeaa5f7b37574e9275de98cdf81fe4768b2e22737876605f8fce22d1d4c
nodejs-devel-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm
c3f560c1c3539be8785136e74c3969d7292b4c337141423871baebd523d85d05
nodejs-docs-10.24.0-1.module+el8.3.0+101+f84c7154.noarch.rpm
14e41f41751e32d29c7dcb89d504e776e064e7d3871dc2342d38c7a933043bda
nodejs-full-i18n-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm
536c12bcc471e7a975674aa3218f437ff0a4809a85c370211d73636e743586a2
nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm
31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
npm-6.14.11-1.10.24.0.1.module+el8.3.0+101+f84c7154.x86_64.rpm
485c30db6030bf7e9220026a983a18c9fc0f551ef4428a43a06bf7e12f40f28b
RLSA-2021:0744
Important: nodejs:14 security and bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.16.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Node.js should not be built with "--debug-nghttp2" (BZ#1932427)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.16.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Node.js should not be built with "--debug-nghttp2" (BZ#1932427)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
RLSA-2021:1064
Moderate: virt:rhel and virt-devel:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2021:1083
idm:DL1 bug fix update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* IPA krb5kdc crash possible doublefree ipadb_mspac_struct_free finish_process_as_req (BZ#1930562)
* krb5kdc is crashing intermittently on IPA server (BZ#1935146)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* IPA krb5kdc crash possible doublefree ipadb_mspac_struct_free finish_process_as_req (BZ#1930562)
* krb5kdc is crashing intermittently on IPA server (BZ#1935146)
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
RLSA-2021:1242
Important: mariadb:10.3 and mariadb-devel:10.3 security update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32).
Security Fix(es):
* mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for Judy, asio, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32).
Security Fix(es):
* mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLSA-2021:1744
Moderate: sane-backends security update
Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers).
Security Fix(es):
* sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sane-backends.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers).
Security Fix(es):
* sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sane-backends-1.0.27-22.el8.x86_64.rpm
5e51281735365b78c5cbb2bbe580ee627ef9a0ae9ed491a174ac15ed7e1da50d
sane-backends-daemon-1.0.27-22.el8.x86_64.rpm
ceaf43c39768dac95eb46f0c8166d80385b70b64c8f6900324817b15a7aa0490
sane-backends-devel-1.0.27-22.el8.x86_64.rpm
a1898f7f84202652fda3328dd7abd4d6911caf62e4ec05b986b7efaa5aa59d7c
sane-backends-doc-1.0.27-22.el8.noarch.rpm
c2bca9ba6c3a187210c85521c811eb69c39a4b34188789c94692f4214e0a1655
sane-backends-drivers-cameras-1.0.27-22.el8.x86_64.rpm
045035fcd28fbb83cdb665d99a12c262bcf93a7e87a5ab5d99e3bcc0f1bcf762
sane-backends-drivers-scanners-1.0.27-22.el8.x86_64.rpm
ec81145a169e319c4f5c82274b1ea767ccb99c973dbcd485411b6440d7778381
sane-backends-libs-1.0.27-22.el8.x86_64.rpm
c2b80bcdde2d92bd159c033a77ce66cc8d9f95806e9de209b0385687015152f0
RLBA-2021:1750
gcc-toolset-10 bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-10.1-0.el8.x86_64.rpm
b41ee01dd7669723b7e624b20313163c16c5633aa7d28697fb3fa72db8b71591
gcc-toolset-10-build-10.1-0.el8.x86_64.rpm
75a25a624fe30073ba1da3f72beb62f9551eb7c38445413b12b60a277b5b5d4b
gcc-toolset-10-perftools-10.1-0.el8.x86_64.rpm
4c6d56bfe9f684c0ce47de8a93043c9ec80f2a9b7d744437cb2b2483200e4d53
gcc-toolset-10-runtime-10.1-0.el8.x86_64.rpm
1c11a36181256ffb06b52d4113d396f293cfeae3868e24ea1de0aa32c0f4956d
gcc-toolset-10-toolchain-10.1-0.el8.x86_64.rpm
3e9e18f10a85bdd93f24a817f8542eb818dd91aeb8123100575fa003acf19600
RLEA-2021:1755
new module: swig:4.0
The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces.
This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for swig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces.
This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__swig
swig-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm
981d26677e3dda23830d9a31a22c7539f8ebf6475f390baa98cd3bac058bd1cb
swig-doc-4.0.2-3.module+el8.4.0+386+8a292e6f.noarch.rpm
5468f8ba21746e1be94f3d85d8a6366e88bf3a51e140c301eb5cd7464f503fba
swig-gdb-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm
7a5380ac73c17d68a5dc97bb6f0994cc912e393577365c784590b0755da0fa9a
RLBA-2021:1760
libmpc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmpc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libmpc-1.1.0-9.1.el8.x86_64.rpm
4fbf751702394211896af9f253ad2f38c80f603e007a7c9ed2b9c8e5d97f2f95
libmpc-devel-1.1.0-9.1.el8.x86_64.rpm
256386b3cbf600bf2f9652c6ad57f47d5a7eac2125f6839b8348782389e2166f
RLSA-2021:1761
Moderate: python27:2.7 security and bug fix update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)
* python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137)
* python-lxml: mXSS due to the use of improper parser (CVE-2020-27783)
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)
* python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137)
* python-lxml: mXSS due to the use of improper parser (CVE-2020-27783)
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm
6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91
python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm
b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm
6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc
python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568
python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9
python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm
a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc
python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm
cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm
7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm
7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326
python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm
5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm
a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509
python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm
d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b
RLSA-2021:1762
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)
* QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821)
* QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443)
* QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947)
* QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092)
* QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707)
* QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723)
* QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916)
* QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)
* QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821)
* QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443)
* QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947)
* QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092)
* QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707)
* QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723)
* QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916)
* QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2021:1765
brltty bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for brltty.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
brlapi-0.6.7-32.el8.x86_64.rpm
e12574dee65b73eb727b9e01f250aa5dda6f37ae78942daf3a7b3093f577bc17
brltty-5.6-32.el8.x86_64.rpm
7a8d74532ca43c68bec2e24920147afd39fbf8f1cb4af2439607de08467a9d96
brlapi-java-0.6.7-32.el8.x86_64.rpm
b6eb6ab93760a709036f0da60c7c2da0b04a2ebc688437f611675024f5e4d852
brltty-at-spi2-5.6-32.el8.x86_64.rpm
7fad2f8c334c754975b00ac6481305ca9cf9a1a80ebe8e12e7a2e32f920fa9be
brltty-docs-5.6-32.el8.noarch.rpm
5ec25c600859daf510d637ea02a0e14ce5d78362ecc8de1f57abc300280210a5
brltty-dracut-5.6-32.el8.x86_64.rpm
d18672cc32943d29dce0be6c093f255aab4ba4b612dba80c8e7256d32cf0b7ee
brltty-espeak-ng-5.6-32.el8.x86_64.rpm
f8ef16ebeb5f499bb8ba362db96463d6fbc232a14188c3efae23ea6feaae2d78
brltty-xw-5.6-32.el8.x86_64.rpm
57b0c4f00d1a4a54b33808f910b57a29a3d00a6fd935e687a5830cd1249f5ba6
python3-brlapi-0.6.7-32.el8.x86_64.rpm
1f5637a51db2115ff4beaae2634252f34f975843dca3a4d92bf4b820694bb945
tcl-brlapi-0.6.7-32.el8.x86_64.rpm
25f5045a9611b5dadf55e0a53cdda928a83646f164b2959a691e3fcd5b7601e9
RLSA-2021:1775
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm
479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85
apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm
3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722
apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm
20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d
bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm
7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1
glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm
07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524
glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm
3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7
glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e
glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698
glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be
jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9
jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73
jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9
jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca
jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a
jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm
064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706
jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm
f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9
javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60
javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm
ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7
resteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpm
92ea72f7a67d5de0fb940e1cbbc36752c56f02d056915d35be500fe51e146e6e
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba
stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm
972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18
velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm
568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882
xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm
8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26
xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm
f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8
xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm
d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783
xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm
143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26
xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm
31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e
xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm
6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9
RLEA-2021:1779
libreoffice bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liborcus, libnumbertext.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libnumbertext-1.0.6-2.el8.x86_64.rpm
a297230b7871a750b88dd9575330532e0fc2838a6fd8e7d8029ba41b3fc6e939
liborcus-0.15.4-2.el8.x86_64.rpm
27d2c59c48323cd4c572039cef4f9b81e05942efccc961cd33181196a2d3125b
RLSA-2021:1789
Moderate: gssdp and gupnp security update
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP.
The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928)
Security Fix(es):
* hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gssdp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP.
The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928)
Security Fix(es):
* hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gssdp-1.0.5-1.el8.x86_64.rpm
1140c0c9c62164c69a64b232db2eaca5c7dd1108b68dff7132b272a03c5fc8e1
RLBA-2021:1790
ibus-libpinyin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus-libpinyin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ibus-libpinyin-1.10.0-2.el8.x86_64.rpm
e8de7254d89399e087915d093fef05c3d7cf5c65687022d163dca69a85aeee28
RLBA-2021:1793
pyOpenSSL bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pyOpenSSL.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pyOpenSSL-19.0.0-1.el8.noarch.rpm
1cf5962508446261b2aa4b02dd687be8bb82191c25494216ea605e8af1931511
RLSA-2021:1796
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLBA-2021:1799
telnet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for telnet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
telnet-0.17-76.el8.x86_64.rpm
4bf95fac7aa4068028dc381f349f63c0c3778dc88197f1dd53e01ac40a6bd400
telnet-server-0.17-76.el8.x86_64.rpm
f32edb8ceee19d8ba7b45a00c385f9f77c4270bf44afbd8dd286299cee31d95c
RLBA-2021:1801
libgpod bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgpod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgpod-0.8.3-24.el8.x86_64.rpm
4fe6a1855a14fce2d8c15ecfa8f5fbf3bfa75c0e36bb9d520e78153e6b0deb20
RLBA-2021:1802
gnome-bluetooth bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-bluetooth.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-bluetooth-3.34.3-1.el8.x86_64.rpm
4405d99a81e84ec9f506c2d02a2c79c505575f721d5c97f8bf604112c4fea8f6
gnome-bluetooth-libs-3.34.3-1.el8.x86_64.rpm
b61617cb2c800149a772cf9143bb5d8f50961534802606e8513c654dea7ac39c
RLSA-2021:1804
Moderate: userspace graphics, xorg-x11, and mesa security, bug fix, and enhancement update
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips.
The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655)
Security Fix(es):
* xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345)
* xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346)
* xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360)
* xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361)
* xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)
* libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363)
* xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712)
* libX11: Heap overflow in the X input method client (CVE-2020-14344)
* xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libwacom, xorg-x11-drivers, libX11, mesa, libinput, libdrm, libglvnd, xorg-x11-server, egl-wayland.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips.
The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655)
Security Fix(es):
* xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345)
* xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346)
* xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360)
* xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361)
* xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)
* libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363)
* xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712)
* libX11: Heap overflow in the X input method client (CVE-2020-14344)
* xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xorg-x11-drivers-7.7-30.el8.x86_64.rpm
4feb07c0b7dba12f36983fcf2eddfce96c747e61b92cb8833a148ca1ac4fadea
RLBA-2021:1807
gcc-toolset-10-dyninst bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-dyninst-10.2.1-2.el8.x86_64.rpm
3628ca20014ba600e2deef311adf1f3ecaf8b169ea290d3c1755ad6781b2cc37
gcc-toolset-10-dyninst-devel-10.2.1-2.el8.x86_64.rpm
36ec6e021428699304c0fb462d494018b6d8d7da984f0f9e667fb4c32301f224
RLSA-2021:1809
Moderate: httpd:2.4 security, bug fix, and enhancement update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199)
* httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984)
* httpd: mod_http2 concurrent pool usage (CVE-2020-11993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199)
* httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984)
* httpd: mod_http2 concurrent pool usage (CVE-2020-11993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLEA-2021:1810
micropipenv bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for micropipenv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
micropipenv-1.0.2-1.el8.noarch.rpm
19d23dbe8b285e8459e8800558fc7de59bb5a0eb39d8bfceabe5f47144a30bf7
RLSA-2021:1811
Moderate: libvncserver security update
LibVNCServer is a C library that enables you to implement VNC server functionality into own programs.
Security Fix(es):
* libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247)
* libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839)
* libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397)
* libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405)
* libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libvncserver.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibVNCServer is a C library that enables you to implement VNC server functionality into own programs.
Security Fix(es):
* libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247)
* libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839)
* libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397)
* libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405)
* libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvncserver-0.9.11-17.el8.x86_64.rpm
38ec5ff34fff0a426bd377186afed28a8370441f300af098d5959601147d09e5
RLEA-2021:1813
new module: subversion:1.14
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
RLEA-2021:1816
perl-IO-String bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-IO-String.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
perl-IO-String-1.08-32.el8.noarch.rpm
eb31671c09bc2bfbbca872cfa92a2b1caa57f1b96303b803d68fcb056e75f241
RLBA-2021:1821
spice-gtk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-gtk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-glib-0.38-6.el8.x86_64.rpm
8814c47eecaee1eb462199f94515b93833c611c26882e152ee257b84561fda60
spice-glib-devel-0.38-6.el8.x86_64.rpm
b2a4d27b80d27dd2f8ab8f6d3d7de0a8878a0a2bb570e31d5aa635e91fcdad9e
spice-gtk-0.38-6.el8.x86_64.rpm
7285e6a3292af38d0e24d515af5ec6e1976068c7ff14d5af58ac5f7df6568595
spice-gtk3-0.38-6.el8.x86_64.rpm
315f85dd0f0494fb42a94a3e50c518cdbd386dd5908f4b48a38931ab7a3986de
spice-gtk3-devel-0.38-6.el8.x86_64.rpm
498331b3d6a778df41e04336354773e88f2ba3290e41831b2bd61d8b9c41ded8
spice-gtk3-vala-0.38-6.el8.x86_64.rpm
fd440611163373050491b18223548fab12a21cfee52f2f7faba5b3e7fb09064e
spice-gtk-tools-0.38-6.el8.x86_64.rpm
373e38bdff58b36b689e94de258778b07d44f14f84782355d57ec8caa4613cbd
RLBA-2021:1822
perl-Time-HiRes bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Time-HiRes.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
perl-Time-HiRes-1.9758-2.el8.x86_64.rpm
fae5102e437c83981a9c6cc1d957462bd4010e059ccd92d0c1542e6560ef1950
RLEA-2021:1831
gcc-toolset-10-strace bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-strace-5.7-2.el8.x86_64.rpm
43d2c8d98a0bc67d2b039967dd91195256aeec6f5f648b9f7e04d9ad4257ad03
RLEA-2021:1833
mod_security bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_security.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_security-2.9.2-9.el8.x86_64.rpm
0c307e12c65d00832938f7676bf9fc204db744eb8e48f310c4e68081de76dbd3
mod_security-mlogc-2.9.2-9.el8.x86_64.rpm
128c0e3b588c755cef6a9d74bdd9c11825e59a97461e23b94433ddab38d58c45
RLEA-2021:1834
nginx:1.18 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7
nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90
nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e
RLBA-2021:1837
liblangtag bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liblangtag.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
liblangtag-0.6.2-8.el8.x86_64.rpm
b2f6701fa925b087b454fb00b152cc3adad415d88a9fea28b0c6c401ace72688
liblangtag-data-0.6.2-8.el8.noarch.rpm
4769f05ed11e855cede6d77a472b2f56dd2eb51ff9a9695a26fd7f84bd4154b3
RLBA-2021:1838
libcanberra bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcanberra.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libcanberra-0.30-18.el8.x86_64.rpm
4250c90196fa1fd761ad985adfe702647b4a990829e33cd2bce7ad81007b4323
libcanberra-devel-0.30-18.el8.x86_64.rpm
a9ba387d2876731c26bc4ff6b1f0588a29e01026140c4acccaacc68a425386aa
libcanberra-gtk2-0.30-18.el8.x86_64.rpm
9ec58605dea28c7136b0236c5b5424e4cad7aa447a3cb68d4f5564888602f555
libcanberra-gtk3-0.30-18.el8.x86_64.rpm
58d60f6bc91fced10e23f0a37df0111e13e2ec2a652a1a279add5a6e3efa1d35
RLBA-2021:1839
gcc-toolset-10-systemtap bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-systemtap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-systemtap-4.4-5.el8.x86_64.rpm
e54a70603f27c83eeee3ee144153296da6bc730668054187f5ebdaff9e0debdb
gcc-toolset-10-systemtap-client-4.4-5.el8.x86_64.rpm
e664a7166e068b4d3b709249791c6b20b15051277c3083910b1502a01a12cf58
gcc-toolset-10-systemtap-devel-4.4-5.el8.x86_64.rpm
d124fe2423d1228e188491c9bd7056694ebd565b0e51d1a7d0834d802ab5165f
gcc-toolset-10-systemtap-initscript-4.4-5.el8.x86_64.rpm
729435248b1ada8434729f638aad21d44a20d8a87be08562135321b98fa6ad89
gcc-toolset-10-systemtap-runtime-4.4-5.el8.x86_64.rpm
33863b7b3220086746258bafcbfbf167083e8b8c3ad5ef3fc1adc01dde3be385
gcc-toolset-10-systemtap-sdt-devel-4.4-5.el8.x86_64.rpm
7ef4e54e7fa1203cedfee393041404380e0265875b7741aea76f9774327d19d9
gcc-toolset-10-systemtap-server-4.4-5.el8.x86_64.rpm
ca4d199fda08c1e62e16fa7241b51d80bb7dddffad0cb5dd804650c8320dfc88
RLSA-2021:1842
Moderate: raptor2 security and bug fix update
Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples.
Security Fix(es):
* raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926)
* raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for raptor2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples.
Security Fix(es):
* raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926)
* raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
raptor2-2.0.15-16.el8.x86_64.rpm
1a7d901ba0d259189d3b83ebcfa33ee04cae242c19cb181b4bb78eecb0dccebe
RLBA-2021:1845
sblim-sfcb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-sfcb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-sfcb-1.4.9-17.el8.x86_64.rpm
bec650953f943da05bbb7c5a90fe7178c22bc66e6db00e29ceba86089732a1b3
RLSA-2021:1846
Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2021:1848
dconf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dconf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dconf-0.28.0-4.el8.x86_64.rpm
7b50268254a1a308f2ee2dc13783603d8da3a3e4d9723cca8d541007241c59d3
RLEA-2021:1850
jbig2dec bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jbig2dec.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jbig2dec-libs-0.16-1.el8.x86_64.rpm
b203ea84fb770705d42348816339f0b0ddb3c560f7a841dfe05bdfb5fd6640ee
RLBA-2021:1858
sendmail bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sendmail.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sendmail-8.15.2-34.el8.x86_64.rpm
156730e9c4db72ebfaa54b95a87e07bffd94526da024db5dc2f961cfeac0754c
sendmail-cf-8.15.2-34.el8.noarch.rpm
a36f63c459f7aac2720ead056105802702f9e10a2f6a49721fd404d7dabc53bc
sendmail-doc-8.15.2-34.el8.noarch.rpm
758ce1efd92433ff8b87228a7af6a2f0e0d4575508f86ef0c6500a338dc5714a
sendmail-milter-8.15.2-34.el8.x86_64.rpm
f02eef48d7b4802656658b8f9819d4a5d67ae1e70d46d05edd9ba2e3923588ab
RLEA-2021:1861
pyodbc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pyodbc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pyodbc-4.0.30-2.el8.x86_64.rpm
db4d19f991a354d7c95135bd0ebdbf85b54294a154c87ba75dc929d799ae1227
RLBA-2021:1863
icedtea-web bug fix and enhancement update
migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for icedtea-web.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java
rocky-linux-8-x86-64-appstream-rpms
icedtea-web-1.8.4-4.el8.x86_64.rpm
feaac8dd236c1cb26df3883f0a87cda23e6adf12a883130ccb4bd258038f34ec
icedtea-web-javadoc-1.8.4-4.el8.noarch.rpm
6169d567421f91ec5a71fbf28bbbca94ad61dda8421dbe60bdd1a3920fd5aa10
RLBA-2021:1867
targetcli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for targetcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
targetcli-2.1.53-2.el8.noarch.rpm
5a7a8a86a342614db2b0e1b7a9e0f5fad7d96bc88b5698cc8f35972040ad4b48
RLEA-2021:1869
new module: postgresql:13
PostgreSQL is an advanced object-relational database management system (DBMS).
This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLBA-2021:1871
perl:5.30 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl
perl-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
be39133cd5aa9bfd0ce8ff6128a31858f7907ce317762fd852affb340341cfaa
perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm
a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93
perl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm
4ae5d31a58e084256d22b67d1c4a35c947fb7829b40bea49b2ca54e21bda4908
perl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpm
3b4eaea2d1eaf8d161f48a771f08fac793d30846ad09b36883cce5952ff3ad2a
perl-Attribute-Handlers-1.01-452.module+el8.6.0+878+f93dfff7.noarch.rpm
8ee59b6f6685970541cb905ef75a3682c077b86ccac773cd7e09161d67cdc0ad
perl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
b5b1b87db685204860ad90cc43b8ee94f9cd71824431bd6a81b8363c5e751e33
perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm
ba92a2cb502c3000180f08e99fd70b5fe1d867c629fe7f88ae62e884a805992d
perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpm
9f0471053a901dc7d005594d190e10e8c8b2fab6e1e43e8d7962c9abb86b1890
perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm
69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6
perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
ed229dccbc0b92ac2a641e672a1b62281cb7887ad180cf0eb7bf70a72d8190e8
perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
70b3d3861ab9c1695c9bd398d4bd822fed4f52f843ccb34d987b1c72fb6f6190
perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpm
8dac2514b5b2da9f4b0cb4d6e0e5a381eb88a40c888f56643175a0d4e68074d0
perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500
perl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm
a3447e3b3260b007272f8c84ef84acb17cb71d37b7880d1ef6357951ac562315
perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm
22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05
perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm
99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94
perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm
37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215
perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67
perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16
perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm
401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b
perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpm
73ba6e41ae0df4855079b75bbf5b2131a5b0fb3f99f0ea9b91ad8812b5df0b02
perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm
847b4fb0ddf80554f9db4f306d9b404f77ff15198af23e1afe2abf866e91117f
perl-devel-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
585f8362cf74ed848f3445bed0952f343ac30d51ae393244d5eed738adcadc7e
perl-Devel-Peek-1.28-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
067cf2dc67c1e9c5a402034ec3b340e886228a66c99ae15b785109c57ff94161
perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
1da6e17c67943d6d69e57ebd15f72bfa43b6015870fdd338c76b117b2be9f67f
perl-Devel-SelfStubber-1.06-452.module+el8.6.0+878+f93dfff7.noarch.rpm
2d5e00575dfa0fbcdaf020a04456459c776b478497f6f122cc4861713aec2e85
perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm
11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f
perl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm
497e2b909674fed7b47c3dfa281121621efded7d05d019363aff9bfad4c1a527
perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm
457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91
perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm
4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3
perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
7acf6021827fa52dc9a1fcebcb239d23d9096de93e0a6132f0fe4fd541f3f1f2
perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
4189d9a4acaa4add86f0991f50f74e444b59afb872b205e444480c428e247eaf
perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
5e8ac50accc1d9281fedfb67c5f38066ac8d9e1237e1d7cc7fbef1e973fb89fb
perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm
843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297
perl-Errno-1.30-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
6638a5f0666fb87c5a1b13ca99bd76fdcc01f29f8709d206655e62ea694afcd9
perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm
4e8daf0287ea71e64fdb9e6391f257d9ea6c23547d5894df74a595b3ff610199
perl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm
65b9ba1b7e84507cc648a422475283e27ed53de4097f1ff2121b9f9ff3d97c7e
perl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm
043ff366aad10957c32292d322c3458202d739c703261b8cbfd14f58bb5da151
perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm
f636b21815be2e444fa5b42e99e4328c024327af776bffaebd9d33825d346be7
perl-ExtUtils-Embed-1.35-452.module+el8.6.0+878+f93dfff7.noarch.rpm
e3b71b76d50572759d35712baafd58373b9a07b5610284575d7678294d03c655
perl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm
857b4014bddf434d5e21745f92b52a4f046f666cbbdeade6c4043a1b8796e40c
perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm
398bd10b093a537a73d3d0df58d4581b21c67d612279a37b22fd614d23adea17
perl-ExtUtils-Manifest-1.72-438.module+el8.6.0+878+f93dfff7.noarch.rpm
4d1776ec7edef8aa7ef06b53a9ccfe28eb78d28dbac1fcdc0f9826591cff9ba6
perl-ExtUtils-Miniperl-1.09-452.module+el8.6.0+878+f93dfff7.noarch.rpm
5b1840a6605732ecda572a10e704e82201b12a674f49f4e3a78cd9c25c4f5534
perl-ExtUtils-MM-Utils-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm
cca7d27dbc8d3bb0f080aecd8c1f15e5164a9d9087bac91fffb21753ea601f17
perl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm
d8b1feea37aabbfefe537f9b4b886a095d450334b9fb457ceb469a75d53dcd6c
perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm
13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180
perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpm
fc532cf1d81ed8b642813f397665294f4b8e78cbfa9aaff012563de356187cc4
perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpm
995e08ed28513f82e5821425a4d4fc6edc45ee0a783a1f26eacb6359b3f42e11
perl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm
f404d9e30a5f8768ff3926e32b45b0b8334f72e3e92b0e4b25c64e05f727708c
perl-File-Temp-0.230.900-439.module+el8.6.0+878+f93dfff7.noarch.rpm
67bff95e50d168699ea7a9ea2ec030daabd312f2aaa5d945ac34f92266216242
perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpm
5094b53d07808bfd255aa5b9a1315ad01f5d1892624a3381074d552d82ed562d
perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
c8ba40590e844230d1f154071d9e092cb479fa4993a8352a0d9c7b3ed9764e01
perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm
1ff0c6c297133b9629712d61b0751dab739548a09a9ed1a014f89b19e210942c
perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm
37fcc7a1a0384d0d2fed35aa935e2249dc65641c6ed36cfbaffb844dce6ea14a
perl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpm
78bd8b6bb85141daa4c8a4ed9f292276d00dc3d79511de14a028deda013b6f89
perl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm
22f6dae1203f60f7112d8a3bf69f730cca7e92ff26307fa0479297b263a5a853
perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpm
0ee7a2f08d700939b9878147d4a711c27fff146c037bdddd7f4375dfbe632c5d
perl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpm
46aa912995002371271894c952f50b8f1fb45fd4afe94a1a0a12708173c5d73d
perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm
13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be
perl-interpreter-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
02d644ab73c948161e823d1c6944f52564dc8d06ecd73bba0b9957295350387d
perl-IO-1.40-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
1b5f6a564f11bdb4ceeef49e03cc7b9e8ba622b99a3f74bbda31653a1bbdb1ec
perl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpm
e1b32c483db01fa644aa11da6316c65ae15c52cdc683702f2724e1bd74c36fc6
perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm
1a865597d7d0da824043c62c50cdd0d3fa02e1f9e1e3420b743a4cffa03d0b4d
perl-IO-Zlib-1.10-452.module+el8.6.0+878+f93dfff7.noarch.rpm
274ec5cde7f09867747e7b5a0fe03632ea11a46c12d6795bf72d3347a6737312
perl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm
24140d4b859d7da7b5422b39bb33058cb4ed037ec81a33cb29331d61b8391d36
perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpm
0785aa352684de2b27e973a2414cabfd1f60ff94cb9b1c8f1595b8a773d74ecd
perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm
d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524
perl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm
fcf81923aca881d995501ac6adb0b600d85acbe1e146c92024e96bd92c8adfa1
perl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm
b721a1d996c4455e7c4973dbe7740cc31e3f6956124c2b3bd9ad8005c98e5f3e
perl-libnetcfg-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpm
f9ab6fdfa12dec0592ef9a8b503a9c8211420f0e9dfdecb2d0e31175be92bd88
perl-libs-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
6a2d197b52df3e9e8d372ddb5735269efeda9c3915a22818b5877593cd957617
perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm
b642ac31df8f05336d101b3607d855839335742ba4b80652bcd4d19fa8c71b2e
perl-Locale-Maketext-Simple-0.21-452.module+el8.6.0+878+f93dfff7.noarch.rpm
5580a081788e52639ea7195fc9dc42a331ddee3c17d8b01dffc8fd4ed8d89078
perl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm
1bc02c4b987dcdcba510201debe3955a9fb8212874e3d7ee8342cc5b248dceb8
perl-macros-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
a00992fdb69978b36a93933ab608b73c31c23ad22477d71e2f6a6cd50f576ab6
perl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm
d12bc389fea342859c1ce3fa9a6116e31ae66d6225797ed145796ee1d73325d8
perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217
perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm
3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14
perl-Math-Complex-1.59-452.module+el8.6.0+878+f93dfff7.noarch.rpm
f3417b4d9357bff6b547c14fe045cbf57152240481737d1e6bb38bb7d13d5dca
perl-Memoize-1.03-452.module+el8.6.0+878+f93dfff7.noarch.rpm
fece125172c411eab99d0801c835b1713860fce7cd859cc8e385a52c9d08e88d
perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm
ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3
perl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpm
df5dd4eb3e9897dba7b9d45123b567b21f33f83fe70141c3ed2fa6132d619c82
perl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm
20d8397c0ab7ad88baf463277dd8fc673e094ea05a4adda02fa0f692ff6374c1
perl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm
cc8295684213d6c1f1b9bd7f25a88b9621fce85560e9a719a32121cb3b762361
perl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpm
ad836cedbb118144fbb29c1adacf8745b0be196bed0e7c20a7918df0c7632327
perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpm
1d281d8bb79c2f3a7f8e8245faeac9d5381e450515d7e510b4bbf8f9313205e0
perl-Module-Loaded-0.08-452.module+el8.6.0+878+f93dfff7.noarch.rpm
a98e64eacbd340f91a116ffc76ee54bf9a1172724e499dfb940f115da0a57d11
perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm
23471694783ed058ce2795ffffb3754ac5f991a18d78b9e6760850e3faef4b79
perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm
3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691
perl-Net-Ping-2.71-452.module+el8.6.0+878+f93dfff7.noarch.rpm
e864c75d268bd9c134560ba2a1c2b035df4b9026c7c5880b25f09a06a764a242
perl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm
2107d6fe2bd4c30f879d05e9e91f3a67b669e9311a7d821bc1eaedc69362ac0e
perl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm
4e7d56c452587e7eda8a6d95f035df77838d724beb89d8300f489bf05c4119c6
perl-open-1.11-452.module+el8.6.0+878+f93dfff7.noarch.rpm
aba23b29cc51a254171cbe50bfa2b77c9aa795ed73d507c532d00d37f0770097
perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm
4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737
perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm
04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf
perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm
658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f
perl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpm
030735bc0b0a45c4329c3cff957df2bc31efcaf85e8a83ac14caaf7590278bbe
perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf
perl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpm
68d69421e6ecdd0c17b838ce5cd87e6178e480b859e741d75790a38e001a0e3a
perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpm
9233f630e519b178b9d2554a6567fa54427edb910b2305affe3fd505c3eebdaf
perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm
608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437
perl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpm
e9edbfc3c8c01620a652dd1dabfdaf9aaa6f8b245ffdc98aaa49d59185f5016a
perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm
e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8
perl-Pod-Html-1.24-452.module+el8.6.0+878+f93dfff7.noarch.rpm
fff84361d5bf54b52cb450af2c8c89420b80a02c1c4595ac2169907e320563df
perl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpm
f97ad11912e5d33ff4ecd9080ca24d427fbf5d44165f53d663e0affa77f2b01c
perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm
2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5
perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpm
35d8c093f5f2aacfab1e753a4c0c2bcf2736885654ccd881b194eccb8a3490d9
perl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpm
684f8c4f2fad53955dc42f7e46620c817d77f6ada02b3585ed01890bc86ac7e0
perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpm
8e0adc72bb11846ec003cf0b3d8a7fda73b819b12cb4cd1f83cb74372e7e1917
perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
19c9476b75c247420525ff36ad321453c46d0262305cad01bfd0eea652a70093
perl-SelfLoader-1.25-452.module+el8.6.0+878+f93dfff7.noarch.rpm
6554f62819084c0bf385d680182d9b56880743886ebeab6d361157f29a6f3157
perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpm
b60d7dc5e566fbe0b9282e1f90b628d86d87f6e7c091290737cddea24d9bdc1b
perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm
f303faa506dc1d7735a1fba64383acc4c4075c37a502e5f3a6793849dd3f50c4
perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpm
b7f894a292d6278b60fb5754d1ed5ad9d199c8f84d140f47dbeb260d6a3eaa35
perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpm
75489ca0ff106abbfe0c4bcae3fed2348adfeba22114e664f4d4f000f43d3f08
perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm
e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7
perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359
perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpm
94c51f36928bb91516b6f64205a2589ac0da63b50f1b2fe2b39b8dd3e89cdb57
perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm
245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253
perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm
77b7f51b21e2373d909905b0d45191814fbb1c8dd9c855a250048f9437944533
perl-Test-1.31-452.module+el8.6.0+878+f93dfff7.noarch.rpm
f381236a3739fde90a197fa1177fc4a2589b2d1b6d78ac6d1a0b88d78357b7a8
perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm
3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc
perl-tests-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
3b5e10bdb757229457125f796ffa71dfbaf8635a4ad4cc218b91fce7a0ecfe3f
perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpm
fa90202ab3e84856ac931df1ec5dfe31e4854dae428d3dc1a888e17baeccb30b
perl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpm
a66f0ac7400eb036108d48bac612d9b6e2f35cb1c252f7f0cb16e7a5f1e062ce
perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpm
a6145f9481f9059c301eb1355d0cdd688feebab8d19fc2b2ebcd591737903628
perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm
21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d
perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm
bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5
perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm
f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8
perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm
0ad56d5e6405906910a2efe8448960cdb0b14fe3557e69cf8b59651e75a6abca
perl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm
e3e8703e0c6628e7814fe4c7533d995643a929b4fbb931708d6e22729b694f6e
perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
2e5b2999050f52a5be6078a7024fa2d8696471958b37582c6ae57f869b22b247
perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
e95a1149d05da0bdfc99db4a561b0ffee93dd2d670951b8bf9e9f0bcd867473c
perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
c32bff30e752a3efa107b8a0d0a6758e720770d895c642fbd8434f86f54ef46e
perl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm
d7d4e67d3dad8f5cf8721b9842d490a23b2d2db38e107fdb785b5b84045aa8a4
perl-Time-Piece-1.33-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
0983e9e7fb85c4ce71777a0205c985ed57df8a543f13cb4ed349f9fd8fdb62c1
perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
329b8a55fd6c40d52610e15f55037edc8395d682ed5ceca6611930c6ec0c80fb
perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
641de0fcef19c0f7ab506f797d92584ac6c17d3f1335d5fa6fb0d515c8220612
perl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm
6852a1483a15b008cb44a2881bae6beec4dd4e1e00d6743caf3d1e822e38bfa0
perl-utils-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpm
2a0972dc24a20292397915a852656304ffd8ec958239b0c9f1f226658179a158
perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm
96805b92a1012403138db9d46d761fcafc05517684b5ff73a5ccfbf75edb0d59
RLBA-2021:1878
squid:4 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLSA-2021:1879
Moderate: python38:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)
* python-lxml: mXSS due to the use of improper parser (CVE-2020-27783)
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python38, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, python-ply, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)
* python-lxml: mXSS due to the use of improper parser (CVE-2020-27783)
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm
54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm
6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm
49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm
d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba
python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm
0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b
python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm
7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2
python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm
21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9
python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm
5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm
693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e
RLBA-2021:1880
mod_fcgid bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_fcgid.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_fcgid-2.3.9-17.el8.x86_64.rpm
96b06bcbf7c919d7860e97fdee65d347132301964163b676678f0edd3b06dd96
RLBA-2021:1882
inkscape:0.92.3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-scour, inkscape.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__inkscape
python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm
2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1
RLBA-2021:1885
spice-qxl-wddm-dod bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-qxl-wddm-dod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-qxl-wddm-dod-0.21-2.el8.noarch.rpm
b28da22033bb81319f22ce360c8316ff7d50b1c405ea7fb772a5684826beb03d
RLEA-2021:1889
libfprint bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fprintd, libfprint.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fprintd-1.90.9-2.el8.x86_64.rpm
6491c1b1a2cf6143b8fa443bef28504be7be0503f6e3c9dc8a55ca79065c2c5d
fprintd-pam-1.90.9-2.el8.x86_64.rpm
1efdd9068c4be78be4a38ad0f81d2f7a7655b4275a3cc9b7bd63fdda1451ef21
libfprint-1.90.7-1.el8.x86_64.rpm
028164883c21054399e9240cfc0367a4ec61ff4b86801066ee110951b78afc06
RLBA-2021:1892
source-highlight bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for source-highlight.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
source-highlight-3.1.8-17.el8.x86_64.rpm
0e196806afe493edb18aa1a760819f175f69d698f5c748bab3f5c9dd9984e20b
RLEA-2021:1893
new module: mariadb:10.5
MariaDB is a multi-user, multi-threaded SQL database server that is binary
compatible with MySQL.
This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary
compatible with MySQL.
This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLBA-2021:1894
abattis-cantarell-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for abattis-cantarell-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
abattis-cantarell-fonts-0.0.25-6.el8.noarch.rpm
467a74c9b44fd7ca2910712a83ed040fcbcaafbc7fda8b541bd1d6d8cfc6988d
RLBA-2021:1895
libgovirt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgovirt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgovirt-0.3.7-4.el8.x86_64.rpm
545a6b1e83548cbcc04f46b3109ade9651b99c4c1cb7f0061c42e716d370aebc
RLBA-2021:1897
maven:3.6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm
7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091
apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm
d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8
apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm
aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6
apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm
c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb
apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm
5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8
atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm
38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04
cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2
geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm
9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb
google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm
afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e
guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb
httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm
0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8
jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm
72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393
jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb
jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8
jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm
f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff
maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf
maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91
plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm
163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68
plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm
01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0
plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm
fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08
plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm
b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e
plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm
93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de
plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm
7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5
sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf
slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a
RLBA-2021:1899
gcc-toolset-10-gdb bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-gdb-9.2-4.el8.x86_64.rpm
72a19b8ae9245f67865cd410b7d5f357756735b86ea8b2287eeee52dd737b561
gcc-toolset-10-gdb-doc-9.2-4.el8.noarch.rpm
86571499188f38badc2490256a2476342b11c70891d3a9d27ce75c640781c5bd
gcc-toolset-10-gdb-gdbserver-9.2-4.el8.x86_64.rpm
c9cba6cf5dc0e84a17356ec5200c135b2d03ef5a5b68288b3de0fbc2e1a39087
RLEA-2021:1900
memkind bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memkind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
memkind-1.10.1-1.el8.x86_64.rpm
6e14104dcc6708e2351d57b77f26893e44c23e35b33cdf05078fe46c42524d9d
RLBA-2021:1902
uuid bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for uuid.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
uuid-1.6.2-43.el8.x86_64.rpm
f1e86f91c8e650975437970e0c91d0bf5c398eee60b6e0905400d65823ae17e8
RLBA-2021:1903
pulseaudio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pulseaudio, twolame.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
twolame-libs-0.3.13-12.el8.x86_64.rpm
029e7f5810df21c2da415b3c5a0a0732f5cdf2c185f82ae756706775913bd2c8
RLEA-2021:1906
libyang bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libyang.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libyang-1.0.184-1.el8.x86_64.rpm
a18b82afa4780f61864a7cd2bd28a7bc870964039c91ee5a429fae5626178eae
RLBA-2021:1911
container-tools:2.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLBA-2021:1912
ilmbase bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ilmbase.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ilmbase-2.2.0-13.el8.x86_64.rpm
4d46f7970d6415e15081a9f22f3d9afebc7467b373d8bbcd1d9704c236a3cc00
RLBA-2021:1913
SDL and gstreamer bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for SDL, gstreamer1-plugins-base, gstreamer1-plugins-good.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gstreamer1-plugins-base-1.16.1-2.el8.x86_64.rpm
080de6123569b64faac1939ca663245bf7099e20974ca0c59ad7aa92ba870bae
gstreamer1-plugins-base-devel-1.16.1-2.el8.x86_64.rpm
fb49590c7cca49cf399a894fe5093e9e4077164cf97b706451498e6217814b31
SDL-1.2.15-39.el8.x86_64.rpm
9ed4e04c21f25fae0421f47c9334a5d58b123708004650b7817a3f5a6c8124c9
SDL-devel-1.2.15-39.el8.x86_64.rpm
39b8c51c2ad75b19a80ff692a5c73a3717f47748cd82caf03a0a4b3a74f37bbb
RLBA-2021:1914
libsmi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libsmi-0.4.8-23.el8.x86_64.rpm
48ede3425a13595c69ab1ec38b0ab3acb192b4da13173886b1b2b933f6c782bf
RLBA-2021:1915
gpm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gpm-1.20.7-17.el8.x86_64.rpm
9576114888fa8c265da2bedc5de8789e3d5edc597d4ef6963354c72a46ef9839
gpm-devel-1.20.7-17.el8.x86_64.rpm
da9cdd5ac686e1edbca85896c9507ef04eb92e9d9c57b43e6eec4541fb4de34d
gpm-libs-1.20.7-17.el8.x86_64.rpm
9a1109ffb7ae23caa6a6776f2d5fe0b11b452a3779c9edc157c9dbaebd2a7987
RLBA-2021:1916
automake bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for automake.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
automake-1.16.1-7.el8.noarch.rpm
cdb509c8eeff8702dd46562eea024cdbe930a70b8cb8592cda1305a0cb8c5e87
RLBA-2021:1917
tang bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tang.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tang-7-6.el8.x86_64.rpm
ee9ae1dc56ca1d5b38b35add16d02f318dacf13c6957f8b02f1124b55e2049b0
RLEA-2021:1919
new module: python39:3.9
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm
5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm
4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748
python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm
1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm
12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm
a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9
python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm
e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94
RLBA-2021:1920
go-srpm-macros bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for go-srpm-macros.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
go-srpm-macros-2-17.el8.noarch.rpm
18ed6d3a24dac62dea1c6facc0045ddc89c05f450128561a9b063579727b1ced
RLBA-2021:1921
docbook-style-xsl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for docbook-style-xsl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
docbook-style-xsl-1.79.2-9.el8.noarch.rpm
c75d7bbcdb5fe5b6ca066fa140672e69eab050a305884ee5380618d1ba0ceabe
RLSA-2021:1924
Low: spice security update
The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.
Security Fix(es):
* spice: Client initiated renegotiation denial of service (CVE-2021-20201)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for spice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.
Security Fix(es):
* spice: Client initiated renegotiation denial of service (CVE-2021-20201)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-server-0.14.3-4.el8.x86_64.rpm
0b42ed068415f6f6755f7d7efbfdcb6f7f15d59d1a9a837df2d6bc5b1552be38
RLBA-2021:1930
python36:3.6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python36
python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
fe5acf5b333e19f8028820c4fdc9736984d0e79466cc28d1605dbc766f3942a0
python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm
434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035
python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm
08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc
python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm
dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740
python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
1d3f8a8f08584719452bea07bd3790bd3a282b39842f25f5bd9f40acffe1e97c
python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
284c71458cac84d2f339a1438ec01395f82d9f54935d0479274f5bb3882f913f
python3-PyMySQL-0.10.1-2.module+el8.4.0+597+ddf0ddea.noarch.rpm
f8fc550646c9ac5e7f2c076a7a7a341ce148be616d7e2415ed7ab35157835e00
python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm
f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d
python-pymongo-doc-3.7.0-1.module+el8.5.0+671+195e4563.noarch.rpm
2e11f6f4f770a9b60d561dc8f80e554fac2919dfc041a3f18639fef6f328838e
rocky-linux-8-x86-64-appstream-rpms__python27
python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm
d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b
RLBA-2021:1933
mod_auth_openidc:2.3 bug fix update
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_auth_openidc, cjose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc
cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06
cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102
RLBA-2021:1936
scap-workbench bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for scap-workbench.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
scap-workbench-1.2.0-8.el8.x86_64.rpm
dbc084d9736353c535f44d800926704fbcd69953e841cf010a525332b1386e74
RLBA-2021:1937
protobuf-c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for protobuf-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
protobuf-c-1.3.0-6.el8.x86_64.rpm
f3a99aed36ada0451b36b9682ef6b6d07f790d4cc157bf13e8d3c04856b7c489
protobuf-c-compiler-1.3.0-6.el8.x86_64.rpm
08916c494c2a4b29608e6ebe1d70f8960df4065c1ba0d80c4c45f3fcbec61348
protobuf-c-devel-1.3.0-6.el8.x86_64.rpm
4c57f3d2a16b8aab617e5e52087b065eb3955c14b1acf36e7aebe8d24e9d0b9f
RLBA-2021:1939
libosinfo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libosinfo, osinfo-db, osinfo-db-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
osinfo-db-tools-1.9.0-1.el8.x86_64.rpm
adc8c8996f88803b72ac5fc2325714318a2b2f03a22c77f4cc8d4e7797609e0f
RLBA-2021:1942
ibus-typing-booster bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus-typing-booster.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
emoji-picker-2.1.0-5.el8.noarch.rpm
b0ea7833388d43f69702d5e0c2b71af58aa8821874411aeb3090a466a7fcc7a9
ibus-typing-booster-2.1.0-5.el8.noarch.rpm
7d2418858ad069c2dafc8b05c15f57b82b0909048c508cec05fb439af48b1209
RLBA-2021:1943
crash-trace-command bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crash-trace-command.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
crash-trace-command-2.0-18.el8.x86_64.rpm
9998511793ac0e78c4972e891317b0bab2a10d4dd5c7a65a0a991726490e3c07
RLEA-2021:1946
tracer bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tracer.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-tracer-0.7.5-2.el8.noarch.rpm
2ff784b8c47308fe359a02880d75967a9b02893cffa151521f65dd15ca7d2df5
tracer-common-0.7.5-2.el8.noarch.rpm
524bbd9c63719d338077423b5af14aec807df7065848f01371e45c79b4e45e63
RLBA-2021:1948
ibus-table bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus-table.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ibus-table-1.9.18-6.el8.noarch.rpm
c6b5e4c48e6f2147bc59122720ba4b62a1f3b0ca48a1bacf7917ed348f53a846
RLBA-2021:1951
new module: container-tools:3.0
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLEA-2021:1955
jmc:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jmc, ee4j-parent, jaf, HdrHistogram, lz4-java, owasp-java-encoder, directory-maven-plugin, jmc-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__jmc
directory-maven-plugin-0.3.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm
cdc5571895b15a244639a7a8fb40e9f851303ba1809ea2ebfd2e4184b78d7c96
directory-maven-plugin-javadoc-0.3.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm
c0c939f0fa8a2e652dca4ae7408f8dd1fceb4f72ece36f1e79c37ef4b3ef365c
ee4j-parent-1.0.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm
1238f6bff74e9abcc8cd5ecbe3ca3d672d30baf5e25ef186caf54eb839034d54
HdrHistogram-2.1.11-3.module+el8.4.0+405+66dfe7da.noarch.rpm
1769e580d88893bc4a07b3cb1bbe4d6fef5d25c6f3dc113f5a2669a52c46952d
HdrHistogram-javadoc-2.1.11-3.module+el8.4.0+405+66dfe7da.noarch.rpm
200c628bb67b200a081372ee71e6e047ff677ac0109ad7facd11dbc47faca336
jaf-1.2.1-5.module+el8.4.0+405+66dfe7da.noarch.rpm
8cf5e7153281991005aeebc36fb2682a1563ccd9ee01235d15f26f190f287ad6
jaf-javadoc-1.2.1-5.module+el8.4.0+405+66dfe7da.noarch.rpm
9a3f0e098c12962f572fbabc318529b8e1b506c1e7a77b83a41e177fb625064b
lz4-java-1.7.1-14.module+el8.4.0+394+13a3c723.x86_64.rpm
9bb5f1fde802c20380728f69ca4c08d6279caa11f65a801c7347095d5687c31c
lz4-java-javadoc-1.7.1-14.module+el8.4.0+394+13a3c723.noarch.rpm
245f94bfb83331301c0ff01518b70da7b759591de06c1bc9145aa82fc857b3d7
owasp-java-encoder-1.2.2-3.module+el8.4.0+405+66dfe7da.noarch.rpm
a9437a61ea81da96e73368b14e8fe815d0819f62c4710d8a2b40896803f228e2
owasp-java-encoder-javadoc-1.2.2-3.module+el8.4.0+405+66dfe7da.noarch.rpm
87a1e57a334335da8869b63bde30b791a34ad727abdbe6c2b05787a34c1f7061
RLSA-2021:1979
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLSA-2021:1983
Important: idm:DL1 security update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:2259
Important: nginx:1.18 security update
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7
nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90
nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e
RLSA-2021:2290
Important: nginx:1.16 security update
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee
nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de
nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991
nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20
nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55
nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904
nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f
nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462
RLSA-2021:2291
Important: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLSA-2021:2360
Important: postgresql:9.6 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (9.6.22)
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for postgresql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (9.6.22)
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgresql-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
0b1c99a3e81edc34c35bcce7ac55f6db1876fd0fe74d04258e3f9703810165b9
postgresql-contrib-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
e524c0629c6d38353c7da4ba6bfeaed2c82a39a5e1024fb9425c578d60e4c93c
postgresql-docs-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
88df40af56e602aad0cd0ccff1891e214c7f252b061d1adcf8e75033d3daacee
postgresql-plperl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
0109c22adfb0829ee7967550f1500a5101504890e82ff63ceec7ada1a8d0d0d6
postgresql-plpython3-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
020f1729ea269e28a16781d3666fcc0d6b0a4bbb9ac725ae84300cc7b049ec12
postgresql-pltcl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
8de17b6cb46b1d1a3aa5bc6842728e4e57da3a23175d3a8596a0cfc48c55a7db
postgresql-server-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
c76ddbe828fec9fe1a71bb618dc2a6b705e01782c6845081fe78ae45debb4aa8
postgresql-server-devel-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
323b8b1c3f0f5b6790ce6e710859aefeda899a2195b72086eea50bc32e300c5d
postgresql-static-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
120a9aaf53b223981e347dc1fd215de958a1b5279fc78c061093d07d5afb5cdf
postgresql-test-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
11897a3ba65c0e88aa99c4502c19f94bc91db7124f5d60388d31ac996ebf9719
postgresql-test-rpm-macros-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
25ac98b62c359b013fba2af6bf95ce9ef44d1ee87611b2a92af9a526e2ceacff
RLSA-2021:2363
Important: gupnp security update
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
Security Fix(es):
* gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for gupnp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
Security Fix(es):
* gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
gupnp-1.0.6-2.el8_4.x86_64.rpm
99156c05f5915a79b954b5a4e6d5d38b65d7c455f9a66af27e036a35635570cc
RLSA-2021:2370
Important: container-tools:3.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLSA-2021:2371
Important: container-tools:rhel8 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3af0efabcac69789ce47fab592ecc29899095fcc2be8f8a6201db544376bc188
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLSA-2021:2372
Important: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.7)
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
* postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029)
* postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.7)
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
* postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029)
* postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:2375
Important: postgresql:13 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.3).
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
* postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.3).
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
* postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:2583
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm
54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm
6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm
49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm
d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba
python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm
0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b
python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm
7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2
python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm
21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9
python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm
74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5
python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm
5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm
693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e
RLSA-2021:2584
Moderate: ruby:2.7 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999)
Security Fix(es):
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999)
Security Fix(es):
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000)
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f
rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm
5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm
a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822
RLSA-2021:2587
Moderate: ruby:2.5 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626)
Security Fix(es):
* ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
* ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201)
* ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
* rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
* ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
* ruby: HTTP response splitting in WEBrick (CVE-2019-16254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626)
Security Fix(es):
* ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
* ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201)
* ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
* rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
* ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
* ruby: HTTP response splitting in WEBrick (CVE-2019-16254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm
43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
RLSA-2021:2588
Moderate: ruby:2.6 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627)
Security Fix(es):
* rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881)
* ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
* ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201)
* ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
* rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
* ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
* ruby: HTTP response splitting in WEBrick (CVE-2019-16254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627)
Security Fix(es):
* rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881)
* ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
* ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201)
* ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
* rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
* ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
* ruby: HTTP response splitting in WEBrick (CVE-2019-16254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968)
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm
2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a
rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm
338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197
rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm
b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df
rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm
0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372
RLBA-2021:2592
idm:DL1 bug fix update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984)
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:3020
Important: ruby:2.7 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f
rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm
5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm
a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822
RLSA-2021:3061
Moderate: virt:rhel and virt-devel:rhel security and bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754)
* hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504)
* QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617)
* QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416)
* qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301)
* Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754)
* hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504)
* QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617)
* QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416)
* qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301)
* Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2021:3070
container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLSA-2021:3073
Moderate: nodejs:12 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.22.3). (BZ#1978201)
Security Fix(es):
* nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)
* nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290)
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.22.3). (BZ#1978201)
Security Fix(es):
* nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)
* nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290)
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2021:3074
Moderate: nodejs:14 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.17.3). (BZ#1978203)
Security Fix(es):
* nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)
* nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290)
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.17.3). (BZ#1978203)
Security Fix(es):
* nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)
* nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290)
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
RLSA-2021:3075
Low: libuv security update
libuv is a multi-platform support library with a focus on asynchronous I/O.
Security Fix(es):
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libuv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libuv is a multi-platform support library with a focus on asynchronous I/O.
Security Fix(es):
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libuv-1.41.1-1.el8_4.x86_64.rpm
1a1e44d7537433919bdf760fe9a2bb545720b7d054706e5c3871cca3b40f0f31
RLBA-2021:3083
gcc-toolset-10-valgrind bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
Bug fix(es):
* incorrect pkgconfig virtual provides in devel packages (BZ#1968378)
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-valgrind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
Bug fix(es):
* incorrect pkgconfig virtual provides in devel packages (BZ#1968378)
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpm
eaee7045eb86911441e2ca185719dac4846cf6761b34b1cd4503e66276f0b650
gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm
4b0fc0732a44b410281e4ebb01b853a5ae5b49173e876bfba3064ea2a42410d3
RLSA-2021:3590
Moderate: mysql:8.0 security, bug fix, and enhancement update
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)
Security Fix(es):
* mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)
* mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)
* mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)
* mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)
* mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)
* mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)
* mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)
* mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)
* mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)
* mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)
* mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)
* mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)
* mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)
* mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)
* mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)
* mysql: Server: Options unspecified vulnerability (CVE-2021-2146)
* mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)
* mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)
* mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)
* mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)
* mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)
* mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)
* mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Segfault and possible DoS with a crafted query (BZ#1996699)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mecab-ipadic, mecab, mysql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)
Security Fix(es):
* mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)
* mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)
* mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)
* mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)
* mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)
* mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)
* mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)
* mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)
* mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)
* mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)
* mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)
* mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)
* mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)
* mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)
* mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)
* mysql: Server: Options unspecified vulnerability (CVE-2021-2146)
* mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)
* mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)
* mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)
* mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)
* mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)
* mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)
* mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Segfault and possible DoS with a crafted query (BZ#1996699)
rocky-linux-8-x86-64-appstream-rpms__mysql
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
RLBA-2021:3593
gcc-toolset-10-elfutils bug fix update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
Bug fix:
* The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
Bug fix:
* The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013)
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm
f64e85941a97279c482bbd079fbd153255a348556053cf6e40b7b1abea70c7bf
gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm
fbf71de210a57662e2215e22fe634b8822b0533020a47c1f6615e0e50b9c2e66
gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm
47103bfcc834e8d9585ea457e023013726ea8fd98bfb6cc9ab1003ac9df38925
gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm
20d78a08fcad187ce1fe69bdb260016abe2cfc43d6fe882099adfc1c11cb4b55
gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm
b27fdaf713c099c491534f785cc4418944976ced9ace65c6a1b4cfdc64441000
gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm
06e63e0c75d6871db6259dca49854a356e43dfc658de0edfb41b193111939565
gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm
769e4bb8af44477862465592d22f364ae865f1f7cd86bf005b0a2e304ce20765
RLSA-2021:3623
Important: nodejs:12 security and bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)
* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)
* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)
* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)
* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)
* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)
* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:12/nodejs: Make FIPS options always available (BZ#1993927)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)
* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)
* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)
* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)
* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)
* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)
* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:12/nodejs: Make FIPS options always available (BZ#1993927)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLBA-2021:3661
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLSA-2021:3666
Important: nodejs:14 security and bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)
* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)
* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)
* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)
* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)
* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)
* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:14/nodejs: Make FIPS options always available (BZ#1993924)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)
* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)
* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)
* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)
* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)
* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)
* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:14/nodejs: Make FIPS options always available (BZ#1993924)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
RLSA-2021:3816
Important: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438)
* httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438)
* httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2021:3918
Important: redis:5 security update
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
* redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for redis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
* redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__redis
redis-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm
07ed98eddf06d6cf89b3b44f3d2437fb863fb94b8366cb76e071ee3949d87eab
redis-devel-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm
88dc345660dcc3b1735cf173bdbee0cab0259caa738f353d60ebd210ce021a88
redis-doc-5.0.3-5.module+el8.5.0+657+2674830e.noarch.rpm
cc89c6dc3eb7d9da7535a2c52fd8e647cf7a30943882c964ecfe17691cbd6d78
RLSA-2021:3945
Important: redis:6 security update
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
* redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for redis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
* redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__redis
redis-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm
4eef6a7e2f37e49feb209a59bf02823274ca392247433e04dc4d20f43a1990cd
redis-devel-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm
23152bf30dc357235e82eeaf7c6e53ea18f2e50f7bc3b9eaa1d38f99fa160a90
redis-doc-6.0.9-5.module+el8.5.0+658+72172854.noarch.rpm
122e5ea03b660cf7ca8077dfa41fc80b9aa56912ae5939b4f3c2cbd32d0fc4e0
RLBA-2021:4093
container-tools:3.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fixes:
* kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245)
* 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264)
* [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fixes:
* kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245)
* 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264)
* [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409)
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLBA-2021:4094
idm:DL1 bug fix update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Dirsrv memory leak (BZ#2003607)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Dirsrv memory leak (BZ#2003607)
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:4150
Moderate: python36:3.6 security and bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270)
* python-pygments: ReDoS in multiple lexers (CVE-2021-27291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270)
* python-pygments: ReDoS in multiple lexers (CVE-2021-27291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python36
python36-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm
cc13e57ac650df29ee9ed66c0dac505cfbde741608604acfd60ff5ed455b3687
python36-debug-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm
43b88c0a96a9906b7aded4fbfd2d2bf4de6b1753dd6e0e84faec8106a66cab1c
python36-devel-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm
a9a046234a026579a675db98b8dc5a2dc0d354897b6f749a2264f097eb6a42a6
python36-rpm-macros-3.6.8-38.module+el8.5.0+671+195e4563.noarch.rpm
5d5cb6a94d730cd2f0891c146c7573420dfc826fc93d700ea925410a6ce2dba8
python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
fe5acf5b333e19f8028820c4fdc9736984d0e79466cc28d1605dbc766f3942a0
python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm
434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035
python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm
08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc
python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm
dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740
python3-nose-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm
168de63ea406adedd5a74f273c0b3d1aadc5667d846b3bdba00eeaf589425a78
python3-pygments-2.2.0-22.module+el8.5.0+671+195e4563.noarch.rpm
ace34fc5c06e34c0b64edec161daab6c2bf43c1133a4db8114b6703e75938527
python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
1d3f8a8f08584719452bea07bd3790bd3a282b39842f25f5bd9f40acffe1e97c
python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
284c71458cac84d2f339a1438ec01395f82d9f54935d0479274f5bb3882f913f
python3-PyMySQL-0.10.1-2.module+el8.4.0+597+ddf0ddea.noarch.rpm
f8fc550646c9ac5e7f2c076a7a7a341ce148be616d7e2415ed7ab35157835e00
python3-scipy-1.0.0-21.module+el8.5.0+671+195e4563.x86_64.rpm
496d5d8cfad3f4edb2251e0515c299893db4792d67cab28efc43d45d251b8f79
python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm
f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d
python3-virtualenv-15.1.0-21.module+el8.5.0+671+195e4563.noarch.rpm
7361f47ffdde2c3fa7401442abefe24d77a49f83d37aaa6ca75342c14e89947c
python3-wheel-0.31.1-3.module+el8.5.0+671+195e4563.noarch.rpm
cbaa19578812079d4740b405915ba967621c5a6fe38e7233768ed66ec63f057b
python3-wheel-wheel-0.31.1-3.module+el8.5.0+671+195e4563.noarch.rpm
cffee93a34dda22e1c734f372ca0fa49d40d1eeba6f2096c008d4bad7088efbe
python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm
65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960
python-pymongo-doc-3.7.0-1.module+el8.5.0+671+195e4563.noarch.rpm
2e11f6f4f770a9b60d561dc8f80e554fac2919dfc041a3f18639fef6f328838e
python-virtualenv-doc-15.1.0-21.module+el8.5.0+671+195e4563.noarch.rpm
6e4ea32c00bc4246b137a8ffcfd8d138ae6f1b9535a1cd45d4097065ad79235f
rocky-linux-8-x86-64-appstream-rpms__python27
python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm
d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b
RLSA-2021:4151
Moderate: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-pygments: ReDoS in multiple lexers (CVE-2021-27291)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-pygments: ReDoS in multiple lexers (CVE-2021-27291)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm
4af53602814c4e6074f48e25713ef6f8384bf956bdcefb1d33abd3c1071671ad
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm
9de14f945b487d8dc1f04035a229c98f3f2cc7ec0522d921c10217b302ef997b
python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm
6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91
python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm
b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm
6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc
python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568
python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-jinja2-2.10-9.module+el8.7.0+1062+663ba31c.noarch.rpm
d273ecf02c532bb6e73c45d77e576f1b36560f9b9d913ac3f82f031b3503292e
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9
python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm
a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc
python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm
cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm
7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm
7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326
python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm
5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm
a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509
python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm
d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b
rocky-linux-8-x86-64-appstream-rpms__python36
python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm
65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960
RLEA-2021:4152
modulemd-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for modulemd-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
modulemd-tools-0.7-6.el8.noarch.rpm
01640844480f9cef20b7fa975091cc940229c56a7a70aeda65cbb96e731a77da
RLSA-2021:4154
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
* containers/storage: DoS via malicious image (CVE-2021-20291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
* containers/storage: DoS via malicious image (CVE-2021-20291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLSA-2021:4160
Moderate: python39:3.9 and python39-devel:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Information disclosure via pydoc (CVE-2021-3426)
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Information disclosure via pydoc (CVE-2021-3426)
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm
5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4
python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57
python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm
c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4
python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm
4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748
python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm
1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm
12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm
2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55
python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm
fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e
python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm
a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9
python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm
e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94
python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm
58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa
python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm
b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190
python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm
c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0
RLSA-2021:4161
Moderate: python-jinja2 security update
The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment.
Security Fix(es):
* python-jinja2: ReDoS vulnerability due to the sub-pattern (CVE-2020-28493)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-jinja2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment.
Security Fix(es):
* python-jinja2: ReDoS vulnerability due to the sub-pattern (CVE-2020-28493)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-jinja2-2.10.1-3.el8.noarch.rpm
6624b52c38082ab83ac01bbf3786d69fa2c657891a618341c6ad2fb24eeb69bf
RLBA-2021:4163
mariadb-connector-odbc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mariadb-connector-odbc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mariadb-connector-odbc-3.1.12-1.el8.x86_64.rpm
77f9ed66d4c10737a40f1dfe9d25177eae63e27d168d41e92b823d15840d636a
RLBA-2021:4164
sil-nuosu-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sil-nuosu-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sil-nuosu-fonts-2.200-2.el8.noarch.rpm
1e07923894f365e4800ecd2bb2ab8416f14ce654202bdefcaf651b8bacb6c0ab
RLBA-2021:4167
socat bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for socat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
socat-1.7.4.1-1.el8.x86_64.rpm
12653938d941afafbaa7fedd576fea5ad9a69124b5003aef196b8b5d26154747
RLBA-2021:4170
libreoffice-voikko bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libreoffice-voikko.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libreoffice-voikko-5.0-6.el8.x86_64.rpm
68c67ec0e50e488c398f5470f9528c4851f615beb1549f1aaaa5d09ea61b1dba
RLSA-2021:4179
Low: file-roller security update
File Roller is an application for creating and viewing archives files, such as tar or zip files.
Security Fix(es):
* file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for file-roller.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
File Roller is an application for creating and viewing archives files, such as tar or zip files.
Security Fix(es):
* file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
file-roller-3.28.1-4.el8.x86_64.rpm
774249365a784f0f1ddec77ece69c5f945aea411d0fb82fe80f35b95e0f5ca61
RLBA-2021:4180
evolution, evolution-data-server, evolution-ews bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evolution, evolution-ews, evolution-mapi, evolution-data-server.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evolution-3.28.5-18.el8.x86_64.rpm
52099aaa38d080cab8e5ad7d2752560f444e7f9eebb0c9d2a7e04e0ee4125e1a
evolution-bogofilter-3.28.5-18.el8.x86_64.rpm
cc6330c94c49457a8d2f56b3cb453baa7f287c820d88772368121fe3652ffdcc
evolution-help-3.28.5-18.el8.noarch.rpm
c00ed48438b6959f73c813a2b666c8ef343fc0f3345817aa14fd0921ec2bf0c0
evolution-langpacks-3.28.5-18.el8.noarch.rpm
935263444cac801b4b8cbba1ac49b4a54eb24631c6d1c842f86f752384b04dae
evolution-pst-3.28.5-18.el8.x86_64.rpm
3a8b77dd43293eaeccf413117992e0695e74c9aa6ff31edf4bc5253effdc9f98
evolution-spamassassin-3.28.5-18.el8.x86_64.rpm
a493ffbbaa757d8dcff030bfc959f5d9ee6c4fc92caf48dcb0385e4144f8d858
RLSA-2021:4191
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595)
* libvirt: Insecure sVirt label generation (CVE-2021-3631)
* libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595)
* libvirt: Insecure sVirt label generation (CVE-2021-3631)
* libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2021:4193
rsyslog and its related dependencies bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rsyslog, libfastjson, librelp, liblognorm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
librelp-1.9.0-1.el8.x86_64.rpm
c6fc1c283dfd3d98e337bc9e4dfa643c53657c0fec5515713ba75fdac61842f8
libfastjson-0.99.9-1.el8.x86_64.rpm
427188c6f09a570c668cee4e22ab62832788c6f6c6a99d07126466308e04f13a
liblognorm-2.0.5-2.el8.x86_64.rpm
bc00a8717bbea75b192e417e9cbf3525f9ccd6dd328de5f49f883dabf8c686a7
liblognorm-doc-2.0.5-2.el8.x86_64.rpm
25face4c27d1c40f02b3738653637a107a64b7360f5c91d3d84e69172da02e2a
RLBA-2021:4195
powertop bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for powertop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
powertop-2.14-1.el8.x86_64.rpm
729ffc74c690fbbff0b6e3f9ceee824079f3e70fe5d5f29a079eb606332821e5
RLBA-2021:4196
libgweather bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgweather.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgweather-3.28.2-4.el8.x86_64.rpm
4c69a5c6bd5a4e3cfacce7a740228f49cf1ae41c28511ade87c1f12b9eb032f9
libgweather-devel-3.28.2-4.el8.x86_64.rpm
04206eb4ee259438d53647ee5b8281a4f5330fac03f12ba6952a23613587f61c
RLEA-2021:4200
new module: nodejs:16
This enhancement update adds the nodejs:16 module to Rocky Linux 8 as a Technology Preview. A future update will provide a Long Term Support (LTS) version of Node.js 16, which will be fully supported. (BZ#1953991)
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
For information on Rocky Enterprise Software Foundation scope of support for Technology Preview features, see Technology Preview Features Support Scope.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the nodejs:16 module to Rocky Linux 8 as a Technology Preview. A future update will provide a Long Term Support (LTS) version of Node.js 16, which will be fully supported. (BZ#1953991)
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
For information on Rocky Enterprise Software Foundation scope of support for Technology Preview features, see Technology Preview Features Support Scope.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm
b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75
RLSA-2021:4201
Moderate: babel security and bug fix update
Babel provides tools to build and work with gettext message catalogs, and a Python interface to the CLDR (Common Locale Data Repository), providing access to various locale display names, localized number and date formatting, etc.
Security Fix(es):
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for babel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Babel provides tools to build and work with gettext message catalogs, and a Python interface to the CLDR (Common Locale Data Repository), providing access to various locale display names, localized number and date formatting, etc.
Security Fix(es):
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-babel-2.5.1-7.el8.noarch.rpm
26dd61290b95ee471a82a445e9af1dc566452d8e92d6d330a03de4eb43e51984
RLBA-2021:4209
redfish-finder bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for redfish-finder.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
redfish-finder-0.3-6.el8.noarch.rpm
2816ac8e1697a09d9feb8e393f380209c7b52b005618712e67c33519d83fef84
RLBA-2021:4212
mailman bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mailman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mailman
mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm
b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3
RLSA-2021:4213
Moderate: php:7.4 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110)
Security Fix(es):
* php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069)
* php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071)
* php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068)
* php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070)
* php: NULL pointer dereference in SoapClient (CVE-2021-21702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110)
Security Fix(es):
* php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069)
* php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071)
* php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068)
* php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070)
* php: NULL pointer dereference in SoapClient (CVE-2021-21702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLBA-2021:4216
xorg-x11-font-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xorg-x11-font-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xorg-x11-font-utils-7.5-41.el8.x86_64.rpm
afd2b72c9233ef3489cdc0c47125bd19ccd8f93cf4ff0bd2f60213d3e6c22e53
RLBA-2021:4217
stratis-cli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for stratis-cli, stratisd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
stratis-cli-2.4.2-1.el8.noarch.rpm
ffe7f009e4a58be113042e2fe76c82c1e815d5a0d2c6c3f807213ce3fda16b19
stratisd-2.4.2-2.el8.x86_64.rpm
512ed0de3294b1af949e2af690f45b72ad1a8f2e19472b1dac715058d308a8b6
stratisd-dracut-2.4.2-2.el8.x86_64.rpm
ead1ebd70d475ea2caf5ce0c19f03d66ad818ee36fc044fb137c1ce759b7162e
RLBA-2021:4218
udftools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udftools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
udftools-2.3-2.el8.x86_64.rpm
98bdda0c742d835d9875a0b6da1453a13ae1b63c1ab35bce343898029bca5c4b
RLBA-2021:4219
libinput and libevdev bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libevdev, libinput.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libevdev-1.10.0-1.el8.x86_64.rpm
5a7495b56a09a76c54ad5fce64f6adbeda62d1cc6bd0accce4c9386ac9bff4fb
RLBA-2021:4220
xapian-core bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xapian-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xapian-core-1.4.18-3.el8.x86_64.rpm
53e29be7231b6ebf376f7c89e6d654597c4931af8dd219787cb9ac630da69d3b
xapian-core-libs-1.4.18-3.el8.x86_64.rpm
31cb47e61ca8961dde64cd276b4e991594462e0ac63e3054263f617fd04fd3d0
RLSA-2021:4221
Moderate: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm
2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLSA-2021:4222
Moderate: container-tools:3.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLBA-2021:4224
libwacom bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libwacom.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libwacom-1.6-3.el8.x86_64.rpm
289ee5b010e498d615a969b48e600668c2351bd34b2e2908b24fc57d827494a9
libwacom-data-1.6-3.el8.noarch.rpm
7e5450f5dc8a0ebb6181f737709bfa81cd5879251d77ccf6aa28b1b8024e5f11
RLBA-2021:4228
rshim bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rshim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rshim-2.0.5-2.el8.x86_64.rpm
97e027fb20b53d88f4943792d036df6a87be61e8c2e5360c617b349bb115ba83
RLEA-2021:4229
google-noto-emoji-fonts and pango bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for google-noto-emoji-fonts, pango.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
google-noto-emoji-color-fonts-20200916-2.el8.noarch.rpm
1361deafeac4dd12c648898ddb7d3ecf58becbe687b6da95e3bf1899d1c1c944
google-noto-emoji-fonts-20200916-2.el8.noarch.rpm
b8a87ada948fe61bb422a66a54b6b7dae60b63269fd1430cf4d004af12d29ae2
pango-1.42.4-8.el8.x86_64.rpm
481dc7c787260e8d261cd4f7d7499105def3a3a64835e4f7f4ed6ab0ddf92723
pango-devel-1.42.4-8.el8.x86_64.rpm
2782d37b80b2e47d284ec7395f60a3bcbb77edf63f1f4ead25ad1b2dccd464c4
RLBA-2021:4230
ipa bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:4231
Moderate: libwebp security update
The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.
Security Fix(es):
* libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009)
* libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010)
* libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012)
* libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013)
* libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014)
* libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330)
* libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331)
* libwebp: excessive memory allocation when reading a file (CVE-2020-36332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libwebp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.
Security Fix(es):
* libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009)
* libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010)
* libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012)
* libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013)
* libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014)
* libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330)
* libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331)
* libwebp: excessive memory allocation when reading a file (CVE-2020-36332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libwebp-1.0.0-5.el8.x86_64.rpm
f3a9a91ed62713359b0255f51c68185ac36426fbe542469c22fcf709df97bfad
libwebp-devel-1.0.0-5.el8.x86_64.rpm
274e1428df907f6f75a7093330bb69359132f90e1398978b3cc5b282db668d23
RLEA-2021:4234
mesa and related packages bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xorg-x11-server-Xwayland, libepoxy, wayland, wayland-protocols, libdrm, xorg-x11-server, egl-wayland.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libepoxy-1.5.8-1.el8.x86_64.rpm
fa45b6c15f3a168ecb19032e0e2321541e1ac5bc8775d28491889b32696332bd
libepoxy-devel-1.5.8-1.el8.x86_64.rpm
f3df3fb27f03617cca795772e3d8450ec6347161fcae7af29676f18b7b60ac73
libwayland-client-1.19.0-1.el8.x86_64.rpm
f8be8d0b50f23d997f7643d9dba4d149a1b29f26c61ce6bb85f8b136cb2265d7
libwayland-cursor-1.19.0-1.el8.x86_64.rpm
2d9e5c9557e076c1730c407955d4959668bf72c1b33f257ba240a221e19daea9
libwayland-egl-1.19.0-1.el8.x86_64.rpm
22c6e952f8edce3aaf3dd0caaf3c2544b4cae56a0f0bc11c47ae9263c935cd6f
libwayland-server-1.19.0-1.el8.x86_64.rpm
81752663a48a83b6251f80cbbc8f49e19032cbdb2452a83647034f2a372e259b
wayland-devel-1.19.0-1.el8.x86_64.rpm
7641020d95b21798a2bea97e7cd1676d4637229d58dd129a7d9be11d4133d4a5
RLSA-2021:4235
Moderate: jasper security update
JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard.
Security Fix(es):
* jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828)
* jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272)
* jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926)
* jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jasper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard.
Security Fix(es):
* jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828)
* jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272)
* jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926)
* jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jasper-libs-2.0.14-5.el8.x86_64.rpm
5830d55c1e5a8b07c706d339f3deb917c7d0a4364160859ccbd59044315ca93c
RLEA-2021:4239
pki-core bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm
479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85
apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm
3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722
apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm
20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d
bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm
7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1
glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm
07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524
glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm
3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7
glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e
glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698
glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be
jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9
jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73
jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9
jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca
jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a
jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm
064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706
jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm
f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9
javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60
javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09
pki-servlet-4.0-api-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpm
e5e14595fb89c52de31e9c18905ff0f305c68812d2756b12c2991c6da74d5548
pki-servlet-engine-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpm
73172dac5348a21d14d062762eeea65d223ca1bb1ab8b63c47e7b8685c8ef79a
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm
ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7
resteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpm
92ea72f7a67d5de0fb940e1cbbc36752c56f02d056915d35be500fe51e146e6e
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba
stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm
972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18
velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm
568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882
xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm
8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26
xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm
f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8
xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm
d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783
xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm
143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26
xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm
6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9
xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm
31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e
rocky-linux-8-x86-64-appstream-rpms__pki-core
ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3
ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f
RLEA-2021:4242
new packages: gcc-toolset-11-dwz
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-dwz-0.14-2.el8.x86_64.rpm
414ba44d288436081a409b4e578b86c1f284347262b45f47cc0fe4c07af80bf9
RLBA-2021:4244
dwz bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dwz-0.12-10.el8.x86_64.rpm
d4682e21463097454b01d788a980f13c2377cdc5f757d6a446c30ed1061ba00c
RLEA-2021:4246
cmake bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cmake.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cmake-3.20.2-4.el8.x86_64.rpm
9d21c01f081a4b8f553192a92fe4d5fcf48530fe318383c12d8b2b78114b81e5
cmake-data-3.20.2-4.el8.noarch.rpm
3eb6cae9285351ed5df68d5f98d396dab1f5125577a0c42381640da78854be55
cmake-doc-3.20.2-4.el8.noarch.rpm
afd4d5f0d1eb996de0186288a429f72d37e08b1dd99a496be29a53f5412514f3
cmake-filesystem-3.20.2-4.el8.x86_64.rpm
d7d94d53b80ea0fca0c7c6af95e71260daf4fb15240928d201d8c0aa6f1455eb
cmake-gui-3.20.2-4.el8.x86_64.rpm
e67e49c592112e86feb8459cd94ed0c5e31428a9bf87bd0fe7413863c330bf08
cmake-rpm-macros-3.20.2-4.el8.noarch.rpm
77231aae5f117ce89706ca1918261d89d013df1471294267211ad0e5b6bf3e11
RLBA-2021:4255
copy-jdk-configs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for copy-jdk-configs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
copy-jdk-configs-4.0-2.el8.noarch.rpm
84ec4532ff1042cad6ce9340a36e6522af0e09eb2bbe77152b5af79aaff1d2b7
RLSA-2021:4256
Moderate: graphviz security update
Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains.
Security Fix(es):
* graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for graphviz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains.
Security Fix(es):
* graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
graphviz-2.40.1-43.el8.x86_64.rpm
2be0fa27c439694487dacbb62531a62dd1d0fd76b5c145c5f9fc810708b73287
RLSA-2021:4257
Moderate: httpd:2.4 security, bug fix, and enhancement update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690)
* httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690)
* httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLBA-2021:4259
new packages: gcc-toolset-11-dyninst
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-dyninst-11.0.0-2.el8.x86_64.rpm
52aa51970a45cb360d40b51fc6950ac1d378f03f7e441f3302847fb4a0416b23
gcc-toolset-11-dyninst-devel-11.0.0-2.el8.x86_64.rpm
892e60f0d4b29630fa5239a1c9d88c344c4cbd697bae563cf5a06bb9347d14cc
RLBA-2021:4263
new packages: gcc-toolset-11-valgrind
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-valgrind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-valgrind-3.17.0-6.el8.x86_64.rpm
22e3c8bb50f033855ffbb6f0a0cd5584ad40c22096494a26e73921a9f311e957
gcc-toolset-11-valgrind-devel-3.17.0-6.el8.x86_64.rpm
4fa4a361e3a93cd0f3167f9c3c324001858ab8647df00d1654dd80b89b52f132
RLBA-2021:4264
cloud-utils-growpart bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cloud-utils-growpart.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cloud-utils-growpart-0.31-3.el8.noarch.rpm
18d89bc1cd3b035cf124512c7878cf4e636001bd1cd982efddc321623ae2fe8f
RLBA-2021:4266
cldr-emoji-annotation bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cldr-emoji-annotation.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cldr-emoji-annotation-39-2.el8.noarch.rpm
909ccf54467dbdd5edbe12253e5bfcb85367712b47b5e46f139bb8fd50ebbba7
RLBA-2021:4274
new packages: gcc-toolset-11-ltrace
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-ltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-ltrace-0.7.91-1.el8.x86_64.rpm
440eb2bf1e4b352c859409c520a72ec4afa00268b06a568a952766dc1ed61470
RLEA-2021:4275
postgresql:12 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLEA-2021:4276
postgresql:13 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLEA-2021:4277
mod_security_crs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_security_crs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_security_crs-3.3.0-2.el8.noarch.rpm
be66db99becaa558aac5933314c0783c9e43732c0e07a090e039229acde4ff9f
RLBA-2021:4279
new packages: gcc-toolset-11-make
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-make.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-make-4.3-2.el8.x86_64.rpm
580e8e84640ba2dccd1fbc460b3c2581c1d6ccfd130a29e427590785dbc244bd
gcc-toolset-11-make-devel-4.3-2.el8.x86_64.rpm
44e8f297fa2de647b81fdb7e54560792707abe9c3c3721ee9d4a7b93a804acc2
RLBA-2021:4280
autoconf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autoconf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
autoconf-2.69-29.el8.noarch.rpm
1a4bd3963411aa30fe199196d2ef58405310adda90a6060903518dfd37892857
RLEA-2021:4282
new module: ruby:3.0
This enhancement update adds the ruby:3.0 module to Rocky Linux 8.
(BZ#1938942)
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the ruby:3.0 module to Rocky Linux 8.
(BZ#1938942)
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f
rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm
5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm
a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822
RLBA-2021:4285
libvoikko bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libvoikko.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvoikko-4.1.1-3.el8.x86_64.rpm
5c7ee590aa167c204857ef2e994e26be9c8ac3b74a0a5907dbb266fdddedc00f
python3-libvoikko-4.1.1-3.el8.noarch.rpm
893e612a10890c76e4bcefab2513eb6c34085f801b00b1d2e28c8417956873ed
voikko-tools-4.1.1-3.el8.x86_64.rpm
b0f7a35b787c63187c9175d9435a7773bf9d1911543fa6e3769191347017f150
RLEA-2021:4286
lpsolve bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lpsolve.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lpsolve-5.5.2.0-21.el8.x86_64.rpm
e476606c04389d6be46b60f23064e4f60ebf06df3686442956f9a3c078911d45
RLSA-2021:4288
Moderate: libjpeg-turbo security and bug fix update
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libjpeg-turbo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libjpeg-turbo-1.5.3-12.el8.x86_64.rpm
71a9f44edce13938e9fb1557ec88d9d923fe2ea547fdb3cb0926489d04e93c01
libjpeg-turbo-devel-1.5.3-12.el8.x86_64.rpm
777786c85899f62d57f0cb029424e4b6cd928de19aea0cd7ecf369a7353b245a
libjpeg-turbo-utils-1.5.3-12.el8.x86_64.rpm
8f7e075b1ddbff3238735af3cb79ed0883dd1a8b7c2a35afb473d4507d707a4e
turbojpeg-1.5.3-12.el8.x86_64.rpm
0a042fe31a447a3204ffa910a05cec647e16d7952f7f19d32a8e24aa2680bd2e
RLEA-2021:4289
sblim-gather bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-gather.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-gather-2.2.9-24.el8.x86_64.rpm
fc460831084b0f087a10aa0011b5c7ee044622bcb040a401a4e0e8cb77e508d5
RLSA-2021:4292
Moderate: squid:4 security, bug fix, and enhancement update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384)
Security Fix(es):
* squid: denial of service in URN processing (CVE-2021-28651)
* squid: denial of service issue in Cache Manager (CVE-2021-28652)
* squid: denial of service in HTTP response processing (CVE-2021-28662)
* squid: improper input validation in HTTP Range header (CVE-2021-31806)
* squid: incorrect memory management in HTTP Range header (CVE-2021-31807)
* squid: integer overflow in HTTP Range header (CVE-2021-31808)
* squid: denial of service in HTTP response processing (CVE-2021-33620)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384)
Security Fix(es):
* squid: denial of service in URN processing (CVE-2021-28651)
* squid: denial of service issue in Cache Manager (CVE-2021-28652)
* squid: denial of service in HTTP response processing (CVE-2021-28662)
* squid: improper input validation in HTTP Range header (CVE-2021-31806)
* squid: incorrect memory management in HTTP Range header (CVE-2021-31807)
* squid: integer overflow in HTTP Range header (CVE-2021-31808)
* squid: denial of service in HTTP response processing (CVE-2021-33620)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLBA-2021:4298
pyparted bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pyparted.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pyparted-3.11.7-4.el8.x86_64.rpm
78e4ef6771cb8ef1d187a15434b7063d4e95f83fc84a924085dd879494670473
RLBA-2021:4307
ipmitool bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipmitool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
exchange-bmc-os-info-1.8.18-18.el8.noarch.rpm
4a31d488720ee841ce30d3bda59e805351b6b7976c20ddc28b4a7d6ea4baa626
ipmievd-1.8.18-18.el8.x86_64.rpm
6f60b773a641fd698637567c687565d7c0f61c8012b102beebdfc19733677a58
ipmitool-1.8.18-18.el8.x86_64.rpm
4499de1e8f15fb44c99a77be0b38f895522b39f21a0c2ea503338f7055984bde
RLBA-2021:4309
python-rpm-generators bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-rpm-generators.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-rpm-generators-5-7.el8.noarch.rpm
6a1020de171188f81815c1afd2efd06227d114be9f5f0f83efc47cd45f50884d
RLBA-2021:4311
varnish:6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for varnish, varnish-modules.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__varnish
varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
b9e50c31d639d02ea7ac7dfd44542da1eb99e9e500ff67d94cd101de8939fb2c
varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
a8db537b818eb564f557f5c29fcbae4d49c524380c6dfbd3d863dcafcea915d4
varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
67d172546cc350ba9674f91c3a1cd72149280cddff3ad7851ead00923b1378f6
varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm
9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e
RLBA-2021:4313
python-ldap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-ldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-ldap-3.3.1-2.el8.x86_64.rpm
721a8e6a717b034e306d1b21ffb2d3c6d9f175bd27c818e3a25d3ea416e410a1
RLSA-2021:4316
Low: zziplib security update
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for zziplib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
zziplib-0.13.68-9.el8.x86_64.rpm
b14f7c6ee1108658863a2c7254d5c2e1829fa9ee54c13ad089854f7d42e14c2d
zziplib-utils-0.13.68-9.el8.x86_64.rpm
fe43deb8bc190c8a2a423b7a5621122b253abe8459dbe4d78d767c3b1cc04a81
RLBA-2021:4318
apr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for apr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
apr-1.6.3-12.el8.x86_64.rpm
23636f805dc36996a57264a872409dd6c1ef9150dfa02dca7b2fa0a6016ce46b
apr-devel-1.6.3-12.el8.x86_64.rpm
3e1190a514704461ab4528e39d1abb2da8be8e23327c822791750a4ba864cc5b
RLEA-2021:4322
unicode-ucd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for unicode-ucd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
unicode-ucd-11.0.0-2.el8.noarch.rpm
04bc0503d057701556aad5918d466d41c36877fd58183445017f34175e11a5ad
RLBA-2021:4323
saab-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for saab-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
saab-fonts-0.91-18.el8.noarch.rpm
c66fe7899c5ac30176a23d20a250b34d63af83382fae61ceec0898c902ab4940
RLSA-2021:4324
Moderate: python-psutil security update
psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python.
Security Fix(es):
* python-psutil: double free because of refcount mishandling (CVE-2019-18874)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-psutil.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python.
Security Fix(es):
* python-psutil: double free because of refcount mishandling (CVE-2019-18874)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-psutil-5.4.3-11.el8.x86_64.rpm
93541c8c1475fbd127831e367cbf33db3c0881499f84ff19b057d1d64af12c6c
RLSA-2021:4326
Moderate: libX11 security update
The libX11 packages contain the core X11 protocol client library.
Security Fix(es):
* libX11: missing request length checks (CVE-2021-31535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libX11.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libX11 packages contain the core X11 protocol client library.
Security Fix(es):
* libX11: missing request length checks (CVE-2021-31535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libX11-1.6.8-5.el8.x86_64.rpm
66600448091b07b90d26aad07eef05f65693d5ede2d1272c7d5b75a07b2deaa2
libX11-common-1.6.8-5.el8.noarch.rpm
98f5d2c3d2a2da96383645800c79d4794ee2387ad58378e65c16e32d62204190
libX11-devel-1.6.8-5.el8.x86_64.rpm
2e1561f3442cfafcae05e05640156a198cfaa3509df21a931f9ae945b51f7040
libX11-xcb-1.6.8-5.el8.x86_64.rpm
8aba2186142e2053bb7e06f871ba1fd5b71e4822ef2e6d8f8d7dcabe250e5302
RLBA-2021:4327
perl-GSSAPI bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-GSSAPI.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
perl-GSSAPI-0.28-25.el8.x86_64.rpm
4c8d266e4446421ac55fdf9fa865f8c3603a67d45473f93926c2543d8c2f1cf8
RLBA-2021:4328
scrub bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for scrub.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
scrub-2.5.2-16.el8.x86_64.rpm
55f4085d7fae3b814497e5a3a380c91667e4e124099432e36032927d3fa643a0
RLBA-2021:4329
jmc:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jmc, ee4j-parent, jaf, HdrHistogram, lz4-java, owasp-java-encoder, directory-maven-plugin, jmc-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__jmc
directory-maven-plugin-0.3.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm
cdc5571895b15a244639a7a8fb40e9f851303ba1809ea2ebfd2e4184b78d7c96
directory-maven-plugin-javadoc-0.3.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm
c0c939f0fa8a2e652dca4ae7408f8dd1fceb4f72ece36f1e79c37ef4b3ef365c
ee4j-parent-1.0.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm
1238f6bff74e9abcc8cd5ecbe3ca3d672d30baf5e25ef186caf54eb839034d54
HdrHistogram-2.1.11-3.module+el8.4.0+405+66dfe7da.noarch.rpm
1769e580d88893bc4a07b3cb1bbe4d6fef5d25c6f3dc113f5a2669a52c46952d
HdrHistogram-javadoc-2.1.11-3.module+el8.4.0+405+66dfe7da.noarch.rpm
200c628bb67b200a081372ee71e6e047ff677ac0109ad7facd11dbc47faca336
jaf-1.2.1-5.module+el8.4.0+405+66dfe7da.noarch.rpm
8cf5e7153281991005aeebc36fb2682a1563ccd9ee01235d15f26f190f287ad6
jaf-javadoc-1.2.1-5.module+el8.4.0+405+66dfe7da.noarch.rpm
9a3f0e098c12962f572fbabc318529b8e1b506c1e7a77b83a41e177fb625064b
jmc-8.0.1-4.module+el8.5.0+676+5f023c1e.x86_64.rpm
bd544cc77d0049e0a4f0781b8b45f79d1fdfe7ff83a95ec4c03b980892140c98
jmc-core-8.0.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm
612cb3ec890392a776edadc5a19d37b1b77624b58df5bcfef6d13858014834e6
jmc-core-javadoc-8.0.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm
a2ee0526ff552417c1db0462ba0310c8f0102705a98843fa8da3129c1a70440e
lz4-java-1.7.1-14.module+el8.4.0+394+13a3c723.x86_64.rpm
9bb5f1fde802c20380728f69ca4c08d6279caa11f65a801c7347095d5687c31c
lz4-java-javadoc-1.7.1-14.module+el8.4.0+394+13a3c723.noarch.rpm
245f94bfb83331301c0ff01518b70da7b759591de06c1bc9145aa82fc857b3d7
owasp-java-encoder-1.2.2-3.module+el8.4.0+405+66dfe7da.noarch.rpm
a9437a61ea81da96e73368b14e8fe815d0819f62c4710d8a2b40896803f228e2
owasp-java-encoder-javadoc-1.2.2-3.module+el8.4.0+405+66dfe7da.noarch.rpm
87a1e57a334335da8869b63bde30b791a34ad727abdbe6c2b05787a34c1f7061
RLEA-2021:4331
New packages: ansible-collection-redhat-Rocky Linux_mgmt and python-pyghmi
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ansible-collection-redhat-rhel_mgmt, python-pyghmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pyghmi-1.5.29-1.el8.noarch.rpm
a5b93ca14507537ff24149b64441a1ce35470a51ecd2686df8b3e769e548cf8d
RLEA-2021:4335
tesseract bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tesseract.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tesseract-4.1.1-2.el8.x86_64.rpm
7e804dcc73b5431686744c78849dd6abe1906a3a2d947143cd04cc22e11bcec1
RLBA-2021:4337
numpy bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-numpy-1.14.3-10.el8.x86_64.rpm
88426273e627094ce60d92e2f38d7d8e7a24d64f5e09ba5cd30ddc7aa4d03d0f
python3-numpy-f2py-1.14.3-10.el8.x86_64.rpm
26f0c3b1f51b2806a59e14b7f03c97a80d3420c80b3aeabb5ccc94f2520bc2d5
RLBA-2021:4338
python-coverage bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-coverage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
platform-python-coverage-4.5.1-9.el8.x86_64.rpm
2440743216f1852078cab6ac55e74643d943ba61b58f1df96677ac6c68ae328c
python3-coverage-4.5.1-9.el8.x86_64.rpm
508eb87fcf60df12f9b13ffa9bbf3c5159e90478a343d519e47aef4858818529
RLSA-2021:4339
Moderate: grilo security update
Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements.
Security Fix(es):
* grilo: missing TLS certificate verification (CVE-2021-39365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grilo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements.
Security Fix(es):
* grilo: missing TLS certificate verification (CVE-2021-39365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
grilo-0.3.6-3.el8.x86_64.rpm
406faa8be9d8e3cecbdb5d88224218bc8064a1ba7c0232000e18e516e394825d
RLEA-2021:4345
pcm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pcm-202107-5.el8.x86_64.rpm
92ae3ce4eda9c08e467fbdd8c8f41056ca9e78500a631407a8028f726648b02d
RLBA-2021:4348
brasero bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for brasero.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
brasero-3.12.2-5.el8.x86_64.rpm
b44d64dd22fb33e76e2e1d190be29a9ae36a78fcf4089ea35f5ba60b3376f9b2
brasero-libs-3.12.2-5.el8.x86_64.rpm
932ab06fe910ca25148f898c4fdfe8cb862a0101f13407012498b2231552dae9
brasero-nautilus-3.12.2-5.el8.x86_64.rpm
b4cfeaf97a50976c95f4a3f7de0c394acd5b20598d9dc38c25227cf97044d9fa
RLBA-2021:4350
setroubleshoot-plugins bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setroubleshoot-plugins.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
setroubleshoot-plugins-3.3.14-1.el8.noarch.rpm
f22c8a85ae65d42461748dd87cffd48bd13104b11b4b2eefcbae707514129d8c
RLSA-2021:4162
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-psutil: Double free because of refcount mishandling (CVE-2019-18874)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python: Information disclosure via pydoc (CVE-2021-3426)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-psutil: Double free because of refcount mishandling (CVE-2019-18874)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python: Information disclosure via pydoc (CVE-2021-3426)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5
python38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpm
d85f27c4100a37c74577e44e0a1d7691b2320c26c1fe40d981594be3a8287633
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm
54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm
6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029
python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpm
9b3dbb19e62de13d9396994f865fe252d5816356d9321c3cd64fe5775f9d4218
python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae
python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm
49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239
python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm
d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba
python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm
0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b
python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm
7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2
python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm
21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9
python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm
74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5
python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm
5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm
3c6af4f697c00c5adcd95066875ad9822fdc705e974cdea514749be83dd17d52
python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm
b038bdb9b50ede04d3b94fcd7e0f06625a6fee2c99be14ead3a15bc9bcdb5cc2
python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm
693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e
python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm
288302321a47ab51788ad97666b0a258279ad9b0a4dba03818e20f84e517f0dd
python38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm
67c84dd6faadc937503b43a5381fe9fa4aa3db54bb96b83621c2d1a0c4c9f948
python38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm
c50b9253593f355f6e89721a5b6ee9025e5d8c1ea227cbc2d54b0b8fea12cf08
RLBA-2021:4533
ibus bug fix update
The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems.
Bug fix:
* Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems.
Bug fix:
* Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064)
rocky-linux-8-x86-64-appstream-rpms
ibus-1.5.19-14.el8_5.x86_64.rpm
d640b203a5d7f39666096bd8f6431de2754458602329d3ad9e0cdda2149127a3
ibus-gtk2-1.5.19-14.el8_5.x86_64.rpm
17fb91d21b32c0eafce99b60fc54f24908f5296dbf505f5d865cf0c8478f4d2b
ibus-gtk3-1.5.19-14.el8_5.x86_64.rpm
d6616deb0b59c7ffb51448f8970150cc2569882c1a796770734a1f54a4209a22
ibus-libs-1.5.19-14.el8_5.x86_64.rpm
55ec665058ffe34aebd18ce73c6f723a7653a852f4e5f6bf8290a3d1e0048e5d
ibus-setup-1.5.19-14.el8_5.noarch.rpm
3023e6ce9e07f6a6740e46d4414d976759674ea8de02e1601e6e87a8e0795e91
ibus-wayland-1.5.19-14.el8_5.x86_64.rpm
bd1554851ebce67c9961e0d1dfa0a847f8aad00fb24993ef8ba0dc384b5a206a
RLSA-2021:4537
Important: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2021:4585
Moderate: gcc-toolset-10-gcc security update
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)
The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters:
This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters.
There are three levels of warning supported by gcc:
"-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.)
"-Wbidirectional=none", which turns the warning off.
"-Wbidirectional=any", which warns about any use of bidirectional characters.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gcc-toolset-10-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)
The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters:
This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters.
There are three levels of warning supported by gcc:
"-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.)
"-Wbidirectional=none", which turns the warning off.
"-Wbidirectional=any", which warns about any use of bidirectional characters.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-gcc-10.3.1-1.2.el8_5.x86_64.rpm
7540704c3174809261e03b7d7097217feb9f86a4c86140a4652566bcede4fbc3
gcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.x86_64.rpm
f3a6e586abf184a36ae0cebb2e25a7c3fb30b9a7cf66107c7c81939bbee76bc3
gcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.x86_64.rpm
f0f5e192cad7b410e5b12dde407b68fd42cbcb92aee3c4701ecf2eb07db7afd6
gcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.x86_64.rpm
225c5cd4667683d1b04d3a8ddcfc294ec0d4c5c0a16c4f56c4dd2da8b1ed0c8a
gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.x86_64.rpm
78c0a8ba02a1769d00a7fd8467d37b102c6735e83db543ebcc5ff0ac5b89a6be
gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.x86_64.rpm
b4134855699223e24c2653af1eb983a60ba445c1bd565bf84fc6931f46b5b926
gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5.x86_64.rpm
47ff618b2d2a9c2a984c9cc41f39ac203fd42d0f2c9c4ff1d2e1453dde3369f6
gcc-toolset-10-liblsan-devel-10.3.1-1.2.el8_5.x86_64.rpm
bfea9c7e7c421f7bf3dfe32906e4dfffcbc40a1533e3c1ca769e74fcf6031dc6
gcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5.x86_64.rpm
167bf467d120ca7d903ae0b7d452291073cdeb99ac106ca5286ffe60390d797f
gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.x86_64.rpm
2f60776c2c62359175409514403a7159949660820ed10c89c6936b47e319a852
gcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.x86_64.rpm
4986f05abecf7adafb7d3a7eaf2f895bf4832416ea56a008e5dfb231d0f0ca04
gcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.x86_64.rpm
eb951d4a541f5c80632df6ca914cc7f1dcc30b494559f7f1f4e73f52aea5daf2
gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.x86_64.rpm
d4b17d92538129104ce44e190628d899cc1298da157c28ae4304f99ddd1bda94
RLBA-2021:4604
httpd:2.4 bug fix update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Bug Fix(es):
* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Bug Fix(es):
* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856)
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2021:4826
Important: mailman:2.1 security update
Mailman is a program used to help manage e-mail discussion lists.
Security Fix(es):
* mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097)
* mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for mailman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mailman is a program used to help manage e-mail discussion lists.
Security Fix(es):
* mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097)
* mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mailman
mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm
b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3
RLSA-2021:4916
Important: mailman:2.1 security update
Mailman is a program used to help manage e-mail discussion lists.
Security Fix(es):
* mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for mailman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mailman is a program used to help manage e-mail discussion lists.
Security Fix(es):
* mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mailman
mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm
b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3
RLSA-2021:5142
Moderate: idm:DL1 security update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:5171
Moderate: nodejs:16 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm
b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75
RLSA-2021:5235
Moderate: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.9).
Security Fix(es):
* postgresql: memory disclosure in certain queries (CVE-2021-3677)
* postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.9).
Security Fix(es):
* postgresql: memory disclosure in certain queries (CVE-2021-3677)
* postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:5236
Moderate: postgresql:13 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.5).
Security Fix(es):
* postgresql: memory disclosure in certain queries (CVE-2021-3677)
* postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.5).
Security Fix(es):
* postgresql: memory disclosure in certain queries (CVE-2021-3677)
* postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:5238
Low: virt:rhel and virt-devel:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930)
* QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930)
* QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2022:0258
Important: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2022:0290
Important: parfait:0.5 security update
Parfait is a Java performance monitoring library that collects metrics and exposes them through a variety of outputs. It provides APIs for extracting performance metrics from the JVM and other sources. It interfaces to Performance Co-Pilot (PCP) using the Memory Mapped Value (MMV) machinery for extremely lightweight instrumentation.
Security Fix(es):
* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305)
* log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307)
* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104)
* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for uom-parent, parfait, uom-systems, uom-se, si-units, uom-lib, unit-api.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Parfait is a Java performance monitoring library that collects metrics and exposes them through a variety of outputs. It provides APIs for extracting performance metrics from the JVM and other sources. It interfaces to Performance Co-Pilot (PCP) using the Memory Mapped Value (MMV) machinery for extremely lightweight instrumentation.
Security Fix(es):
* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305)
* log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307)
* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104)
* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__parfait
parfait-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm
d74b8a16aaf91c0284612b3cf94d57f00f56a475aebb987a125aff36182d21d4
parfait-examples-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm
e2383b3c6d55bcf6fedc1010dd22919aa39aae946aa32c5afa6cad5659221d86
parfait-javadoc-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm
20039e3c65483231dbd4992913db91bd8c6e63528fa32fd666ada3b424fc4f92
pcp-parfait-agent-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm
0d23958c274471efff4ddbb52719a5664ccdea76b620f09f43d453ac29c7177d
si-units-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm
6d238596ee6d6869db170d90a9e9839e5c028ff1678dc08a7e8378978eb08b0b
si-units-javadoc-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm
a20389dc20459d8e277b084b313764a9171b7a63c2a83066dcf5c7de70f09aa5
unit-api-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm
45f3ea7141aeeab01121669fb9d1c71287d16b63126ead63ee3a0fa485fb6e34
unit-api-javadoc-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm
14e336b8562c8c326f1bf24d01515952681212155fdeee137857ba73261b7b0d
uom-lib-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm
94e383d27797c3563dd284f31e97761f3c859fabd6d43e6e2ddcfe2d66026d59
uom-lib-javadoc-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm
e28c245a0b6063f0cbae3e3dd0f8512c857d581acd0425605e372967df6e2d61
uom-parent-1.0.3-3.module+el8.3.0+214+edf13b3f.noarch.rpm
665b5f7355b65fd698defae938b12f45a0cbd09982662343e43d1e75bd76c628
uom-se-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm
1c5a33c14a4db1f5c1dde1b82c0847034c2b6643969a5d5511dade96439129f9
uom-se-javadoc-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm
bb06bb8d9e6d73cf8ed4d8a4c53289397dff79610badd5740d5e98c5250083f5
uom-systems-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm
ff8729c2bfb1bc8ee1d487882734d0e07fcf552e6eb3223b7d2ddd1686880b14
uom-systems-javadoc-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm
1bcb94fdab29d21ff7974980bb81f9d5165e81eeeaea52f0360905b1a9f8a187
RLSA-2022:0323
Important: nginx:1.20 security update
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030)
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030)
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
8b9098490e0ed579ef134c2c7e9e47fae539d6d5242e50d33138965f578345cc
nginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm
7086e83c8fa422089958552247e2ba103f5dc7c0ced95e75eec92411801fceed
nginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm
fac39bbea57753abe2912b2ba86b7b230c90e2945572328bae797e0f1c95c4ab
nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
22ac42d3d46d47b8a58587447b601e7609f0f66c75346558c7075201e24c1b47
nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
d906cd3b87784901f32f1ad92120afc85c8b21d9dec7f08c1a0f5ce95a217256
nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
38f76d35fd980728308e94451574909e04fc39cecdbcdb9e0db195cfa2101bbc
nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
7e8970264c09a96068a63b604e536a5e9c36636d45352158be17327f1fa8a3f7
nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
7d251e53fa3837429092951a3d2fb89c1439ac9798ae72a0f7ee86dc2548c75f
RLBA-2022:0348
container-tools:3.0 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLSA-2022:0350
Moderate: nodejs:14 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
RLEA-2022:0352
container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLBA-2022:0357
pki-core:10.6 bug fix and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Bug Fix(es) and Enhancement(s):
* Reinstall of the same ipa-replica fails with 'RuntimeError: CA configuration failed.' (BZ#2024676)
* ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2029023)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tomcatjss, jss, pki-core, ldapjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Bug Fix(es) and Enhancement(s):
* Reinstall of the same ipa-replica fails with 'RuntimeError: CA configuration failed.' (BZ#2024676)
* ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2029023)
rocky-linux-8-x86-64-appstream-rpms__pki-core
ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3
ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f
RLBA-2022:0358
virtio-win bug fix and enhancement update
The virtio-win package provides paravirtualized network drivers for most
Microsoft Windows operating systems. Paravirtualized drivers are
virtualization-aware drivers used by fully virtualized guests running on
Rocky Linux. Fully virtualized guests using the
paravirtualized drivers gain significantly better I/O performance than
fully virtualized guests running without the drivers.
Bug Fix(es) and Enhancement(s):
* virtio-win RPM for 8.5.0z (BZ#2033400)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virtio-win.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virtio-win package provides paravirtualized network drivers for most
Microsoft Windows operating systems. Paravirtualized drivers are
virtualization-aware drivers used by fully virtualized guests running on
Rocky Linux. Fully virtualized guests using the
paravirtualized drivers gain significantly better I/O performance than
fully virtualized guests running without the drivers.
Bug Fix(es) and Enhancement(s):
* virtio-win RPM for 8.5.0z (BZ#2033400)
rocky-linux-8-x86-64-appstream-rpms
virtio-win-1.9.24-2.el8_5.noarch.rpm
d8a68c30a4ce25e2ab7ecd7805ad646b12939d374c5bf0d1230e45c06fdb7075
RLBA-2022:0361
virt:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2022:0418
Important: varnish:6 security update
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for varnish, varnish-modules.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__varnish
varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
b9e50c31d639d02ea7ac7dfd44542da1eb99e9e500ff67d94cd101de8939fb2c
varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
a8db537b818eb564f557f5c29fcbae4d49c524380c6dfbd3d863dcafcea915d4
varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
67d172546cc350ba9674f91c3a1cd72149280cddff3ad7851ead00923b1378f6
varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm
9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e
RLSA-2022:0441
Important: aide security update
Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions.
Security Fix(es):
* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for aide.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions.
Security Fix(es):
* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aide-0.16-14.el8_5.1.x86_64.rpm
cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa
RLSA-2022:0543
Important: ruby:2.6 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm
2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a
rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm
338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197
rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm
b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df
rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm
0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372
RLSA-2022:0545
Important: ruby:2.5 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm
35b1eb070daa09c0d94dfb8309d9246462588237b6ad7d097d09c3ff407d096e
rubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm
276974bce2b60db0a7af8e3c22f2ed904de58b105b059402ddb8011f5fde1cc4
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm
43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
RLSA-2022:0643
Important: python-pillow security update
The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817)
* python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python-pillow.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817)
* python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pillow-5.1.1-18.el8_5.x86_64.rpm
c3b196ec79ed44cbba9c193e5da4687349ed47692644581fa5028742c74ff5fc
RLSA-2022:0672
Moderate: ruby:2.5 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm
35b1eb070daa09c0d94dfb8309d9246462588237b6ad7d097d09c3ff407d096e
rubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm
276974bce2b60db0a7af8e3c22f2ed904de58b105b059402ddb8011f5fde1cc4
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm
43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
RLBA-2022:0882
redhat-support-lib-python and redhat-support-tool bug fix and enhancement update
The redhat-support-tool utility facilitates console-based access to Rocky Enterprise Software Foundation's
subscriber services and gives Rocky Enterprise Software Foundation subscribers more venues for accessing the content and services available to them as Rocky Enterprise Software Foundation customers. Further, it enables Rocky Enterprise Software Foundation customers to integrate and automate their helpdesk services with our subscription services.
The redhat-support-lib-python package provides a Python library that developers can use to easily write software solutions that leverage Rocky Enterprise Software Foundation Access subscription services
Bug Fix(es) and Enhancement(s):
* Add support to upload to and download from S3 (BZ#2028540)
* Add support to upload to and download from S3 (BZ#2028543)
* Add support for handling JSON response from API's (BZ#2028546)
* RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028550)
* Add support for handling JSON response from API's (BZ#2028553)
* RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028556)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for redhat-support-tool, redhat-support-lib-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The redhat-support-tool utility facilitates console-based access to Rocky Enterprise Software Foundation's
subscriber services and gives Rocky Enterprise Software Foundation subscribers more venues for accessing the content and services available to them as Rocky Enterprise Software Foundation customers. Further, it enables Rocky Enterprise Software Foundation customers to integrate and automate their helpdesk services with our subscription services.
The redhat-support-lib-python package provides a Python library that developers can use to easily write software solutions that leverage Rocky Enterprise Software Foundation Access subscription services
Bug Fix(es) and Enhancement(s):
* Add support to upload to and download from S3 (BZ#2028540)
* Add support to upload to and download from S3 (BZ#2028543)
* Add support for handling JSON response from API's (BZ#2028546)
* RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028550)
* Add support for handling JSON response from API's (BZ#2028553)
* RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028556)
rocky-linux-8-x86-64-appstream-rpms
redhat-support-lib-python-0.13.0-0.el8_5.noarch.rpm
a3713475fe27990e2a8dc87fbc2deea8afae8e7fffa8ae2cfc144982b1698c06
redhat-support-tool-0.13.0-0.el8_5.noarch.rpm
d08b6effb550f05dc9fe44817af7b6f66c20cab1dc7a1f6f639f046f0e8cd2e4
RLSA-2022:0886
Moderate: virt:rhel and virt-devel:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized
systems.
Security Fix(es):
* QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized
systems.
Security Fix(es):
* QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2022:0891
Moderate: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)
* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)
* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2022:1049
Important: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2022:1556
Moderate: mariadb:10.3 security and bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543)
Security Fix(es):
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514)
* MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532)
* Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533)
* Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543)
Security Fix(es):
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514)
* MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532)
* Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533)
* Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550)
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLSA-2022:1557
Moderate: mariadb:10.5 security, bug fix, and enhancement update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546)
Security Fix(es):
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515)
* mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524)
* Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546)
Security Fix(es):
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515)
* mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524)
* Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542)
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLBA-2022:1560
pki-core:10.6 bug fix update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Bug Fix(es):
* ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2061458)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tomcatjss, jss, pki-core, ldapjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Bug Fix(es):
* ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2061458)
rocky-linux-8-x86-64-appstream-rpms__pki-core
ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3
ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f
RLBA-2022:1561
idm:DL1 bug fix update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Error replacing a replica with CentOS Stream 9 (BZ#2062404)
* reinstalling samba client causes winbindd coredump (BZ#2065719)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Error replacing a replica with CentOS Stream 9 (BZ#2062404)
* reinstalling samba client causes winbindd coredump (BZ#2065719)
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2022:1563
virt:rhel and virt-devel:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized
systems.
Bug Fix(es):
* KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized
systems.
Bug Fix(es):
* KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2022:1565
Moderate: container-tools:3.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961)
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLSA-2022:1566
Moderate: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm
f05e3a5804bc41a2cbe15e7dd640a8b1f466adb07480ac7090f9e125f180d54a
buildah-tests-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm
75c858735e75051b96c44ac94a357625b3459f31c4714ced8fe9b7be74b2e235
cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
podman-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm
2bb6b433aeffad66524fee9505a40bbe68e2caccb3210657ed8c8da6fee1e276
podman-docker-1.6.4-28.module+el8.5.0+770+e2f49861.noarch.rpm
06f24ab416c7a333cca3796d9702eb1adf49c4ccb9595715dda0cfd6e0b64158
podman-remote-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm
bc4b311ff224a47fcbdbb1e270c032aafc2705b1312e96b5dc45b2b45aacc364
podman-tests-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm
f77b5368ea0054f95286a0d27bcd7867bb9e793de93550f8a956403c02c79ea7
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00
runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm
2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm
c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2
udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm
d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146
RLBA-2022:1761
gcc-toolset-11-gcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-libasan-devel-11.2.1-9.1.el8.x86_64.rpm
8c531bddbe5c1e180d660086855220b674d590560b3fe16bdcf5bec6c03565cd
gcc-toolset-11-liblsan-devel-11.2.1-9.1.el8.x86_64.rpm
7ea82f68a26c5141760207388077e010f4588b4f9b70355062d551a7a960a902
gcc-toolset-11-libquadmath-devel-11.2.1-9.1.el8.x86_64.rpm
d55d5364205ac1921cf4aa34f0366fcdbb1af4df4a24cea8bf6ae24776568dcb
gcc-toolset-11-gcc-11.2.1-9.1.el8.x86_64.rpm
55b7a4d78981bdaa96e1714d261c6d0cc5765d33b99601e6dd1910af466ece5e
gcc-toolset-11-gcc-c++-11.2.1-9.1.el8.x86_64.rpm
dab6a4db71182b486a96d0fdd8d00d9f8fb79950de4dd7e3a9fb2a5c550e6c31
gcc-toolset-11-gcc-gdb-plugin-11.2.1-9.1.el8.x86_64.rpm
bbadb1f377705308377525bda83d4670fbfef3aa9349ff8247a73c6858c11cbf
gcc-toolset-11-gcc-gfortran-11.2.1-9.1.el8.x86_64.rpm
50bbacaef62a786cf61e2953a9dd545b43196bd4fe5f85578be6ca2a46ca27a2
gcc-toolset-11-gcc-plugin-devel-11.2.1-9.1.el8.x86_64.rpm
e85a7a32d6fa3bc19b04bb8794efc10deacc41a2e1ecef5d0f46727886b5a743
gcc-toolset-11-libatomic-devel-11.2.1-9.1.el8.x86_64.rpm
0e931bbc87d9727198466655485c6d3a7245ed4b1d17e6d4fb554645c33791c1
gcc-toolset-11-libgccjit-11.2.1-9.1.el8.x86_64.rpm
e13a692af85fafbdd5b6c998a780a99c43ee8d4818b8fa6bc354f25be6d1820f
gcc-toolset-11-libgccjit-devel-11.2.1-9.1.el8.x86_64.rpm
5832a93871a5901f23a9fdb1238e06a5f92d0ba2a065076755af6432aaef904e
gcc-toolset-11-libgccjit-docs-11.2.1-9.1.el8.x86_64.rpm
a55a1e9b527968edae0d9c1837fbd0d8150d2647ee2a43a9e8937628d0665f2d
gcc-toolset-11-libitm-devel-11.2.1-9.1.el8.x86_64.rpm
de730760d63d865954eb6d526717a8d5ca5242905dafaf1cd8b5710e88eb2c1d
gcc-toolset-11-libstdc++-devel-11.2.1-9.1.el8.x86_64.rpm
dacb6447df8255683e9f59207e25eb1d3d0a623d338bf643d30f43827399545d
gcc-toolset-11-libstdc++-docs-11.2.1-9.1.el8.x86_64.rpm
14683e54880445a43df79bb23fc77e5d4b8d5c99c05da399f82a6348f25eb46d
gcc-toolset-11-libtsan-devel-11.2.1-9.1.el8.x86_64.rpm
b66e5ba1f658b4496922a4bc5d5860fc05195a1c8e04d8fff7fcf9640d6125fd
gcc-toolset-11-libubsan-devel-11.2.1-9.1.el8.x86_64.rpm
5b4d8b23fb0a11f41583725ee2c7b3bcbde1eecd19108e38628e2d1b7bf731b0
libasan6-11.2.1-9.1.el8.x86_64.rpm
4d7f7522004e9f9ade90c1bda34985df154802745e64820e8b5ff0fca25b18d7
RLSA-2022:1764
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860)
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860)
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5
python38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpm
d85f27c4100a37c74577e44e0a1d7691b2320c26c1fe40d981594be3a8287633
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm
54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm
6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b
python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpm
7867930af945070f981bdaa8645a2cbabe1c20d36c2afd88a03cec102bfef2cd
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029
python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpm
9b3dbb19e62de13d9396994f865fe252d5816356d9321c3cd64fe5775f9d4218
python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae
python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm
49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239
python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm
d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba
python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm
0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b
python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm
7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2
python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm
21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9
python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm
74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5
python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm
5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm
3c6af4f697c00c5adcd95066875ad9822fdc705e974cdea514749be83dd17d52
python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm
b038bdb9b50ede04d3b94fcd7e0f06625a6fee2c99be14ead3a15bc9bcdb5cc2
python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm
693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e
python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm
288302321a47ab51788ad97666b0a258279ad9b0a4dba03818e20f84e517f0dd
python38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm
67c84dd6faadc937503b43a5381fe9fa4aa3db54bb96b83621c2d1a0c4c9f948
python38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm
c50b9253593f355f6e89721a5b6ee9025e5d8c1ea227cbc2d54b0b8fea12cf08
RLBA-2022:1770
evince bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evince.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evince-libs-3.28.4-16.el8.x86_64.rpm
fb8c9b16a783e917de4cbedd8f687777b790874348c8a818c26e43b9946b1026
evince-3.28.4-16.el8.x86_64.rpm
4b89edf257c0c87227a5dcea0e42852933bc381cabd0b85117f819cc47abd048
evince-browser-plugin-3.28.4-16.el8.x86_64.rpm
d772b8a7820f4606899ae37f2ea1ca79d3a8e6f66c8a18801470b572616a22e0
evince-nautilus-3.28.4-16.el8.x86_64.rpm
4de0dd97df1d0379eeac86c9fd9731bd67b67b0f9c295a9f37d8a2c1f6d2badc
RLBA-2022:1784
js-d3-flame-graph bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for js-d3-flame-graph.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
js-d3-flame-graph-4.0.7-1.el8.noarch.rpm
a10198dd214d7c058c6210e5532acf0092dd08731dc079d8912f46fc89b56699
RLBA-2022:1789
certmonger bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for certmonger.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
certmonger-0.79.13-5.el8.x86_64.rpm
9a594693b16cc0399de587c611d818d10c15fc5321b99c3bec7bc8c725360f3d
RLBA-2022:1790
libpinyin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpinyin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpinyin-2.2.0-2.el8.x86_64.rpm
f7cc05cac86c98616dc9f56207505c2e980f7bd0feba15a5007056e7f8c65478
libpinyin-data-2.2.0-2.el8.x86_64.rpm
e4d105f0edecc9ef1b34463a0ad865cc4ec4a2be853820cfd277f0f1452eeaa4
libzhuyin-2.2.0-2.el8.x86_64.rpm
3bc4c86c897dac5e0aa555966bd9abccf88cb3e8aed5f3d1a9306b47604e1545
RLBA-2022:1794
libmemcached bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmemcached.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libmemcached-1.0.18-17.el8.x86_64.rpm
b01aa0dec0396ea605e5e144b56b26ac5ab6c5f512fe8c26af4e95cc2fe74fd1
libmemcached-libs-1.0.18-17.el8.x86_64.rpm
79f88c46d4fc83d343996e1959c868674ff4542061026f0278702808ee4d4aa9
RLBA-2022:1800
accountsservice bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for accountsservice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
accountsservice-0.6.55-4.el8.x86_64.rpm
111ac52115876ea83896c95c7fc1d4885ef7916bfccc1c67cc9ae5c3ac1f2aad
accountsservice-libs-0.6.55-4.el8.x86_64.rpm
caf042716f9d89983e8d36a58f3d48ed8d0d30e02871e160fdff59e59b17084e
RLSA-2022:1801
Moderate: gfbgraph security update
GLib/GObject wrapper for the Facebook Graph API that integrates with GNOME Online Accounts.
The following packages have been upgraded to a later upstream version: gfbgraph (0.2.4). (BZ#1997941)
Security Fix(es):
* gfbgraph: missing TLS certificate verification (CVE-2021-39358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gfbgraph.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib/GObject wrapper for the Facebook Graph API that integrates with GNOME Online Accounts.
The following packages have been upgraded to a later upstream version: gfbgraph (0.2.4). (BZ#1997941)
Security Fix(es):
* gfbgraph: missing TLS certificate verification (CVE-2021-39358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gfbgraph-0.2.4-1.el8.x86_64.rpm
a87c20bff6e5d12e128387db8895f77c29aecac5b482e7231f2b406409156147
RLBA-2022:1818
libnotify bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnotify.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libnotify-0.7.7-6.el8.x86_64.rpm
b77107b01be0756468f03b12b034843555134ff13043edfc9e0e4ff1a048cd99
libnotify-devel-0.7.7-6.el8.x86_64.rpm
0a3e2b1920bcf1cc6cb537d4365d32e4e11d85b7a484eff139d61156db594de5
RLBA-2022:1822
ibus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ibus-1.5.19-14.el8_5.x86_64.rpm
d640b203a5d7f39666096bd8f6431de2754458602329d3ad9e0cdda2149127a3
ibus-gtk2-1.5.19-14.el8_5.x86_64.rpm
17fb91d21b32c0eafce99b60fc54f24908f5296dbf505f5d865cf0c8478f4d2b
ibus-gtk3-1.5.19-14.el8_5.x86_64.rpm
d6616deb0b59c7ffb51448f8970150cc2569882c1a796770734a1f54a4209a22
ibus-libs-1.5.19-14.el8_5.x86_64.rpm
55ec665058ffe34aebd18ce73c6f723a7653a852f4e5f6bf8290a3d1e0048e5d
ibus-setup-1.5.19-14.el8_5.noarch.rpm
3023e6ce9e07f6a6740e46d4414d976759674ea8de02e1601e6e87a8e0795e91
ibus-wayland-1.5.19-14.el8_5.x86_64.rpm
bd1554851ebce67c9961e0d1dfa0a847f8aad00fb24993ef8ba0dc384b5a206a
RLSA-2022:1823
Moderate: mod_auth_openidc:2.3 security update
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786)
* mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791)
* mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792)
* mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mod_auth_openidc, cjose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786)
* mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791)
* mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792)
* mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc
cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06
cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102
RLBA-2022:1827
librdkafka bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librdkafka.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
librdkafka-0.11.4-3.el8.x86_64.rpm
a4b09561b1efb5a87696b0604671810e62aeca4dcd470ec07b9f0e4c0f677b19
RLBA-2022:1829
virt-viewer bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-viewer.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
virt-viewer-9.0-12.el8.x86_64.rpm
c8ab81e91ad618ba06c071cd61b6445eff11083e644705ae4cbaf2c0738ff7d5
RLBA-2022:1834
pesign bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pesign.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pesign-0.112-26.el8.x86_64.rpm
60dc0388fc7f3541b208ef7084efa30bf0aae086a5874efaf751cab420bd4b8e
RLBA-2022:1836
redhat-support-lib-python bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for redhat-support-tool, redhat-support-lib-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
redhat-support-lib-python-0.13.0-0.el8_5.noarch.rpm
a3713475fe27990e2a8dc87fbc2deea8afae8e7fffa8ae2cfc144982b1698c06
redhat-support-tool-0.13.0-0.el8_5.noarch.rpm
d08b6effb550f05dc9fe44817af7b6f66c20cab1dc7a1f6f639f046f0e8cd2e4
RLBA-2022:1838
nss-pam-ldapd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nss-pam-ldapd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nss-pam-ldapd-0.9.9-5.el8.x86_64.rpm
1c7a0729e994b202a859ea9c573239de2e6f62ff4a20c907d5e7f626e8b3d313
RLSA-2022:1842
Moderate: exiv2 security, bug fix, and enhancement update
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422)
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for exiv2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422)
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
exiv2-0.27.5-2.el8.x86_64.rpm
cfc76de579f2e1df9d8f0a31087465508607573be2a4b0955dae956b542ce538
exiv2-libs-0.27.5-2.el8.x86_64.rpm
6b50be335ac80aa78e50ecd8a69564ea80b5a0cee93e48b74f5061c7d4e390c6
RLBA-2022:1855
mesa and related packages bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdrm, libglvnd, mesa.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libglvnd-glx-1.3.4-1.el8.x86_64.rpm
b01e2356538e6d15e2eb5b21902e6ed0b400186bac257c2d13a2b5cc9d2ad4c6
libglvnd-1.3.4-1.el8.x86_64.rpm
f1163ceb211495b2a91499a2141c16733e43d7c66693e32d22fd820149258df0
libglvnd-core-devel-1.3.4-1.el8.x86_64.rpm
42500c9215dd43b4e96fc7e43647dfa84b9da8733ae83dadbbe261bac9861c63
libglvnd-devel-1.3.4-1.el8.x86_64.rpm
b4ca66f315566cde4f6937b8c22f44326ec74e330807658fd83b0b1aa47ba5af
libglvnd-egl-1.3.4-1.el8.x86_64.rpm
2ef9230943c2926f32bf154b8e658fffcc0d688581c7336501b28b959f21bab6
libglvnd-gles-1.3.4-1.el8.x86_64.rpm
233c89561015a077d8233167b5ae05346ae76c8bc01a8b60cbd21a24c0c44f40
libglvnd-opengl-1.3.4-1.el8.x86_64.rpm
09abf13b00e3ed08ee9c785a6387b55ae1104c93e9d27797d6ace76080bbc4e1
RLBA-2022:1868
freeradius:3.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freeradius.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__freeradius
freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
1e8b3b99d9fc3b5342025649b5896806e159286d54e6904a98791df010bef14f
freeradius-devel-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
70f19035db8bc4a89bc155e860276414d9458861c130acf2c11c13f86b3b91c1
freeradius-doc-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
f3c8b43ec991aa6dc7edc64348c8a23e8bff4adba392b62707d9b44199ba430e
freeradius-krb5-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
27b16326b6c4650e7e0c33027b2fadb02f4a10311f13afc38eab9d5d7cf5b556
freeradius-ldap-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
2ad0a32f55c4eddd09aac0c5185a7e88ef5fe062df601c07925b50ef93a367ec
freeradius-mysql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
a9af343bd4e84800c15760b58c83f2a161756dd1df1b8fe5fa825b02e2ea9089
freeradius-perl-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
8485e5f25b08399e5bd292fb848281c058edfbe9b4b8e5f569cd8f12e8e0ac09
freeradius-postgresql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
02fd34ed5aac035cf2bbe5e520c79be88ff0432b89b7dcdb60fb611c807c1680
freeradius-rest-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
4c341c6244c5fa2d45b62da76cd4dc23c6cbe3b32d0f42722486960f3d767f33
freeradius-sqlite-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
c6a11c1d56dd96e69867d49c91a1bd1ed95d429ebca2e5a63b9f7487a6a4aeb6
freeradius-unixODBC-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
d1c7b7b0d12278c9ac2aa57a4e9a5fa87c49e2840458cf10542f3b0416c3e198
freeradius-utils-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
d72976b00fbf0c97038a8951eea8444e2dd9cdc9e583bd873ec87dfd7cab6977
python3-freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
e3ef89fceddc589a575ade624e50f9da072396c0b860ef217d5b166b1ebbb45b
RLBA-2022:1871
corosync bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for corosync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
corosynclib-3.1.5-2.el8.x86_64.rpm
7849214cea901afad69a3246b2548cf903ba9714faeb24bdbec52342fe78ac48
RLBA-2022:1872
gcc-toolset-10-binutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-binutils-2.35-11.el8.x86_64.rpm
23f870f3c02d15a65fcdbd64c5090f526ca6ddb157ac297e2c914d0d1bc25231
gcc-toolset-10-binutils-devel-2.35-11.el8.x86_64.rpm
5c4e4cb0067ea909a4a0fa13385cc9978afffdc01f2a7c5c55ba42bf5ccc7262
RLBA-2022:1873
gcc-toolset-11-binutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-binutils-2.36.1-2.el8.x86_64.rpm
e4de3c87cb5ed806dbe98810514d659919aa53d371e56ade88f03f412a25cbbb
gcc-toolset-11-binutils-devel-2.36.1-2.el8.x86_64.rpm
3e2ac4ad76bdbe5c9c1f39fd49ee626211d9e58282b188ee2464f9b75324986f
RLSA-2022:1891
Low: libpq security update
The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers.
Security Fix(es):
* postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libpq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers.
Security Fix(es):
* postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpq-13.5-1.el8.x86_64.rpm
871c6b4ca25f1c2d48340cf813ea64a4f100249f6b5826bc2a9b1d1d375831fe
libpq-devel-13.5-1.el8.x86_64.rpm
59f455a4b0422a4618ca16c3e22854c86fd67e80e1c79a0887d678e909e2c677
RLBA-2022:1895
libecpg bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libecpg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libecpg-13.5-3.el8.x86_64.rpm
a4e29a1002f40223c0380a1fd3a6257f4a9f76b97cd17641afe19a564f219a93
libpgtypes-13.5-3.el8.x86_64.rpm
2fdebefb15fc6e9104d0008a93f0e914a853c7a4806e4132395b21cda066d823
RLBA-2022:1899
spamassassin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spamassassin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spamassassin-3.4.6-1.el8.x86_64.rpm
9e5317a0af1ce3815d80fbb4604e16d7ecb8bd9deeff0167ad037ac5ac004e46
RLBA-2022:1905
gcc-toolset-11-gdb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-gdb-10.2-5.el8.x86_64.rpm
507fd1b65448322eb4f7be5b9bc505287e1c57ef187a4547c687f517e70e8968
gcc-toolset-11-gdb-doc-10.2-5.el8.noarch.rpm
69f2d660a0b8bba2d069e2fbb00a66b15087eb0a64b4d0d73bdcb0d59e0affcd
gcc-toolset-11-gdb-gdbserver-10.2-5.el8.x86_64.rpm
4672600d290a3509945c9330e81420f0ad327bd98da8cb23f68d12fd53c83274
RLBA-2022:1922
mdevctl bug fix and enhancement update
The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdevctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel.
rocky-linux-8-x86-64-appstream-rpms
mdevctl-1.1.0-2.el8.x86_64.rpm
c9b7910936d7fabc88c66452df359e90494a2d3ebc7f0ba8bb07ecc66c7cd9a5
RLBA-2022:1927
mozilla-filesystem bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mozilla-filesystem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mozilla-filesystem-1.9-19.el8.x86_64.rpm
dd82ce2bc279b2c69a478f85b58431ffa2c4b152f9a2751c6553b8ac3532fc05
RLSA-2022:1935
Moderate: php:7.4 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Local privilege escalation via PHP-FPM (CVE-2021-21703)
* php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Local privilege escalation via PHP-FPM (CVE-2021-21703)
* php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLBA-2022:1937
gcc-toolset-11 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-11.1-1.el8.x86_64.rpm
e09d7949c64eebf62003d85a59868b567fbde7b2237bcceaa14a3149b303d2d5
gcc-toolset-11-build-11.1-1.el8.x86_64.rpm
1025dd8704d707157905fed44971dc96e2893698b993b94db993ee2ec971b761
gcc-toolset-11-perftools-11.1-1.el8.x86_64.rpm
d32231d4a47739e03ce4fc39394d26413e5844554c7e93b37c5c8eb434826c61
gcc-toolset-11-runtime-11.1-1.el8.x86_64.rpm
d57f1b8ca87240cd4dbd58f549e85673c39be4ae19c5890ac297c2235c96f9d8
gcc-toolset-11-toolchain-11.1-1.el8.x86_64.rpm
20b579e339bc9e8eecaaa22cf1e75b1beb722b0cdecfb97587642614409e3647
RLSA-2022:1939
Moderate: squid:4 security and bug fix update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm
7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a
RLSA-2022:1964
Moderate: fetchmail security update
Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client.
Security Fix(es):
* fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386)
* fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fetchmail.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client.
Security Fix(es):
* fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386)
* fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fetchmail-6.4.24-1.el8.x86_64.rpm
684c206b13c58381b25384d7b4b66507cc796811c738a4356b5b91904f4e9210
RLBA-2022:1965
plymouth bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for plymouth.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
plymouth-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
00b086a9069c7f5eb967de8f56e31c1560bb0e49d5c28cbc95b7f921d713f0a8
plymouth-core-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
76ae32a05325b0c1bb3907f4a90cc8f8468fd8c81815eac54d5fe9242c1d10dd
plymouth-graphics-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
bb4826aa5ede058a2253013b199fd6531e53e96786b40e33b8057617c9ca24d9
plymouth-plugin-fade-throbber-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
ba76ac771f037ca36c4619df4be0b37c46cf4cee9bf512ec6d07d6bce6a4b102
plymouth-plugin-label-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
181eddf9e8a7b96fa5d7150a703f7d603d7ddd43ce1736943c17c2400c29c114
plymouth-plugin-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
82b113585a40bd7677a0ee48df618096dc991987ab52a49b72809714134bfb4a
plymouth-plugin-space-flares-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
2ffb9c0ebf8bfe32100d18ebbbbc106f5cf96d7b69f36a341c63ca1bcc578d22
plymouth-plugin-throbgress-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
d0fbc8b21f3a8fdb6c2504d276f47eab45e99dcaa2fbd3bdb528cdd9019c1762
plymouth-plugin-two-step-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
4d7d08bdf934fc99bde6c8ccbad38fe8daa2447c52b5868a002c7c8420757aa2
plymouth-scripts-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
2477fb861b4aa2cf66a64457d3785549ae4c72f6da4dde2ac6c13763c84ce2ba
plymouth-system-theme-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
d8dc8eb03f4b4a505124e7eada3974a8b912e5b14840738854575203e175691f
plymouth-theme-charge-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
b47cc533faf9caee9a6c824572f08774b47281973a986d5f9f59e61aee973a1e
plymouth-theme-fade-in-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
b7e8e98d969700edd6ecea353ccb9f5cc1ed4d16535bf0bc31185f84ad1bc49c
plymouth-theme-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
b51b3692c1c547df089297070953537cacb7eecf0ff4134698e3201183c6d184
plymouth-theme-solar-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
a0db572c9a96cd00d6e678bebfacff850925ecc06928601bdd395e536e7c3694
plymouth-theme-spinfinity-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
6c5560e1521809493b6baab6ae08adc77b574538721dc2f9601a3676c554604d
plymouth-theme-spinner-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
ac40b96199a4f11778bbeb3bb774babad457275d85feffb3931d4768d234b5de
RLBA-2022:1967
python-suds bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-suds.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-suds-0.7-0.11.94664ddd46a6.el8.noarch.rpm
25c5d401b6029f3e08e127a4ccbfb43d002b577f5240833c3f2a311cdc451e3a
RLSA-2022:1759
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355)
Security Fix(es):
* QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748)
* ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286)
* ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266)
* ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267)
* ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268)
* ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269)
* ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251)
* ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252)
* ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253)
* ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254)
* ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255)
* ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256)
* ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257)
* ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258)
* ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259)
* ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260)
* ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261)
* ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262)
* ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263)
* libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485)
* hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622)
* nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716)
* libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975)
* QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145)
* QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)
* QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355)
Security Fix(es):
* QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748)
* ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286)
* ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266)
* ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267)
* ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268)
* ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269)
* ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251)
* ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252)
* ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253)
* ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254)
* ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255)
* ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256)
* ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257)
* ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258)
* ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259)
* ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260)
* ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261)
* ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262)
* ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263)
* libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485)
* hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622)
* nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716)
* libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975)
* QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145)
* QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)
* QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm
b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm
eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
RLSA-2022:1762
Important: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* psgo: Privilege escalation in 'podman top' (CVE-2022-1227)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* psgo: Privilege escalation in 'podman top' (CVE-2022-1227)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm
0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
RLSA-2022:1763
Moderate: python39:3.9 and python39-devel:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm
5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4
python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17
python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57
python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm
c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4
python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12
python39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm
5204c287450cf1579ca958d4b8e807cb70b5b7f55903604f6e8c64b9da8df019
python39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm
eb25c5ade496b7c9d8ac56a635c29813f9e7b57f108e146e4be32678bea3874d
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm
4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm
1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm
12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm
2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55
python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm
fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e
python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm
a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9
python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm
e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94
python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm
58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa
python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm
b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190
python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm
c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0
RLEA-2022:1767
nginx:1.20 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
8b9098490e0ed579ef134c2c7e9e47fae539d6d5242e50d33138965f578345cc
nginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm
7086e83c8fa422089958552247e2ba103f5dc7c0ced95e75eec92411801fceed
nginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm
fac39bbea57753abe2912b2ba86b7b230c90e2945572328bae797e0f1c95c4ab
nginx-mod-devel-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
1bef73d9ec96e3ea6dbc20bea0dab1a592f5fc5afc14aafe4179ac9ddc81dc79
nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
22ac42d3d46d47b8a58587447b601e7609f0f66c75346558c7075201e24c1b47
nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
d906cd3b87784901f32f1ad92120afc85c8b21d9dec7f08c1a0f5ce95a217256
nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
38f76d35fd980728308e94451574909e04fc39cecdbcdb9e0db195cfa2101bbc
nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
7e8970264c09a96068a63b604e536a5e9c36636d45352158be17327f1fa8a3f7
nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
7d251e53fa3837429092951a3d2fb89c1439ac9798ae72a0f7ee86dc2548c75f
RLBA-2022:1769
libgit2-glib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgit2-glib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgit2-glib-0.26.4-3.el8.x86_64.rpm
d1edcdc02b09b6d0bbea2ea82193f142fcd5a46d65f23b033c9a73ecfad6006d
RLBA-2022:1779
usbguard bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for usbguard.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
usbguard-1.0.0-8.el8.x86_64.rpm
d0744bfbb307d7373e66581992f59b65d2bc6eeab255998e4381db97daf9b32e
usbguard-dbus-1.0.0-8.el8.x86_64.rpm
70124d46923db66036b4cc4124524754b889bd02fe7d1ce90a767ca7ba245126
usbguard-notifier-1.0.0-8.el8.x86_64.rpm
c4fb2066028324a13f65fb5413819cc016084822aa6d808b81da0a1829face57
usbguard-selinux-1.0.0-8.el8.noarch.rpm
529f010cb3eaff7413b133380a7f0e22e35ffd099e62dbc13b78c77df37d0bd2
usbguard-tools-1.0.0-8.el8.x86_64.rpm
1968b7e0ed6e8504071df5dacfb780cfaa42667009563a9256ab2ca245b09742
RLBA-2022:1788
jq bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jq-1.6-3.el8.x86_64.rpm
2195fdec718ee82c3274825465f936cd3b2457323da254f681e77f9883e0e5ef
RLSA-2022:1793
Moderate: container-tools:3.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLSA-2022:1797
Moderate: compat-exiv2-026 security update
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for compat-exiv2-026.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
compat-exiv2-026-0.26-7.el8.x86_64.rpm
78164a9e0f93342ed57af835a136e2d845c635b614a5c9464778a78d4cfcab43
RLBA-2022:1802
gcc-toolset-11-elfutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-elfutils-0.185-5.el8.x86_64.rpm
945d9ae78b45022525fa7d11189f3745e1b7d071d13ca2923f9ebfdff7b0c979
gcc-toolset-11-elfutils-debuginfod-client-0.185-5.el8.x86_64.rpm
70192dfdca07e1c592b29582ce1be8c30ff08b0f302551f8a3ffe7dbcdf2993a
gcc-toolset-11-elfutils-debuginfod-client-devel-0.185-5.el8.x86_64.rpm
ca7b65fcf980bc7d5e81a50ca4b99f380458289c580093cc7afff2b339763e8c
gcc-toolset-11-elfutils-devel-0.185-5.el8.x86_64.rpm
beba053cc78152742b044218e4c2e5cc23de10ded7746bfda094d93694392c92
gcc-toolset-11-elfutils-libelf-0.185-5.el8.x86_64.rpm
49a8d44581c79eaaa4677a61a41e43542085da9aceca8544d0d882294f151ec0
gcc-toolset-11-elfutils-libelf-devel-0.185-5.el8.x86_64.rpm
edbde0836414eeb7484506c342e1ba1b991aa3e0edc3b1796718aa9d8a1a4d86
gcc-toolset-11-elfutils-libs-0.185-5.el8.x86_64.rpm
796dd175cba886d5a8de41243bf75e1dbf212801fcdd4a64361f6f5e4bd344c4
RLBA-2022:1803
fence-virt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fence-virt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fence-virt-1.0.0-2.el8.x86_64.rpm
76c7d89484468bf87ddaebe27482659d8034dff50f29182fbda8edcf2ba2ecf1
fence-virtd-1.0.0-2.el8.x86_64.rpm
f4aa67de39a9ce7c6fa45fdd7f8210c8f3b93cefc300a1600aee9ddd61cc4182
fence-virtd-cpg-1.0.0-2.el8.x86_64.rpm
3b3dfc81f909a2e420d6cb5c0362e467634306b3933cd9c659571aa34fd9c231
fence-virtd-libvirt-1.0.0-2.el8.x86_64.rpm
5c5678b035ddd27c35cc0fb2fc3c1ffb7a47d39e34e96ce51cec9d09980efe64
fence-virtd-multicast-1.0.0-2.el8.x86_64.rpm
66e6ba450474fb77e5a22d22de79c20ce3207bf768db31776ad7667519e17378
fence-virtd-serial-1.0.0-2.el8.x86_64.rpm
8edc8ef1d257d76b4bdc3694b7077724c21a7138fa92252294dcf6ca70fc31ba
fence-virtd-tcp-1.0.0-2.el8.x86_64.rpm
c67ee2384ba6ca843e8d988552f624c92ca4e2050e54ee64208082c35b736546
RLSA-2022:1808
Moderate: aspell security update
GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker.
Security Fix(es):
* aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for aspell.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker.
Security Fix(es):
* aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
aspell-0.60.6.1-22.el8.x86_64.rpm
35a21a9a576b4ce6f4b34851a880ece09a2baaf51d16df49edbcd76b8e19f243
RLBA-2022:1809
tcsh bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tcsh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tcsh-6.20.00-15.el8.x86_64.rpm
c23f4421eb59f2a1f06c6956a2972b13f3341529d1557d5e2ef2d204ef4cf5e5
RLBA-2022:1811
ypserv bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ypserv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ypserv-4.1-1.el8.x86_64.rpm
077ca96ec9ba1f447a80706d068c4f84284b4a8f982961f0e229f316d64a31c1
RLBA-2022:1816
new module: container-tools:4.0
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8.
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8.
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm
0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
RLSA-2022:1820
Low: udisks2 security and bug fix update
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for udisks2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libudisks2-2.9.0-9.el8.x86_64.rpm
13a2d984b5d4a21f35ab57ddd95914c27ccc916993620b4dab9bbd697ee2911a
udisks2-2.9.0-9.el8.x86_64.rpm
5d4821126edacaebbe000dd9896ebb8dc63993f6f5da7e689e9968f946738a22
udisks2-iscsi-2.9.0-9.el8.x86_64.rpm
56eaaef8707e7c62a15fb4ce052a398cca4de48677e8ef3b7b9d10e96184cce2
udisks2-lsm-2.9.0-9.el8.x86_64.rpm
375eeb6adab3d131e8d96cbc816da721444799bcbf8f60c6b45d7b0f23016578
udisks2-lvm2-2.9.0-9.el8.x86_64.rpm
b9ad578c257ddfc2788078ef33be243cde33c0a9f6793529b334c2ebaa860412
RLSA-2022:1821
Moderate: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python: ftplib should not use the host from the PASV response (CVE-2021-4189)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python: ftplib should not use the host from the PASV response (CVE-2021-4189)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm
4af53602814c4e6074f48e25713ef6f8384bf956bdcefb1d33abd3c1071671ad
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm
9de14f945b487d8dc1f04035a229c98f3f2cc7ec0522d921c10217b302ef997b
python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm
6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91
python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm
b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm
6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc
python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568
python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-jinja2-2.10-9.module+el8.7.0+1062+663ba31c.noarch.rpm
d273ecf02c532bb6e73c45d77e576f1b36560f9b9d913ac3f82f031b3503292e
python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.x86_64.rpm
1257203382679fe9daa7dee565a99b8ffdbcefd743bda938d3facb7c15e9a571
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9
python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm
a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc
python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c
python2-pip-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm
424e634426f8d83d229c9960f37b448d1c68e8e656c8d820294ea9cf7262f368
python2-pip-wheel-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm
edfdfe37a85d18af2192a371b7949e9dbb34e31f1acb4fde35483074d0e61e75
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm
cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm
7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm
7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326
python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm
5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm
a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509
python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm
d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b
rocky-linux-8-x86-64-appstream-rpms__python36
python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm
65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960
RLBA-2022:1824
gcc-toolset-11-annobin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-annobin-annocheck-10.23-1.el8.x86_64.rpm
ddf7846e76fa48303cdd2029f4206cef963671e30f1e375d4dd02d8441df3243
gcc-toolset-11-annobin-docs-10.23-1.el8.noarch.rpm
90db9c3ab986d12c8d5548d35741638e00d68e51b0c19fda613f4e44ab22b8ae
gcc-toolset-11-annobin-plugin-gcc-10.23-1.el8.x86_64.rpm
07d28a08396431cbb871eae01a77fb6b37528d86320a1aa7b8ae3589e113e3c3
RLBA-2022:1825
python-resolvelib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-resolvelib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python38-resolvelib-0.5.4-5.el8.noarch.rpm
4df9a9ad94a685368c3a54f945f5b64477f08a45b1e83718cd66fa092e527750
RLBA-2022:1826
sshpass bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sshpass.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sshpass-1.09-4.el8.x86_64.rpm
52ad1cf18599607e0a1a6010acd13d3f6ebb97f89523896db7b5758a207e41e5
RLBA-2022:1831
postgresql:12 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLBA-2022:1832
postgresql:13 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLBA-2022:1833
inkscape:0.92.3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-scour, inkscape.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__inkscape
inkscape-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm
99fbc2bc4c7cb4c339ab096f89359ea28bbc9324b584a62cd23d89c2fc7fcd51
inkscape-docs-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm
903c394461f3f339c0c1881d384ad702f33e682dc2bd7b118641dae07702bb75
inkscape-view-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm
e021d3d754d7b16da3852a2d0ee69b05cf3e06d5354f8fb6050c72a7c2af475b
python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm
2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1
RLBA-2022:1840
gcc-toolset-10-annobin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-annobin-9.29-2.el8.3.x86_64.rpm
78d18254087a9645cd5c3ab866058af10025caf2192a6fc77e1aa94ff1af9a8e
RLSA-2022:1851
Moderate: pki-core:10.6 security and bug fix update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for tomcatjss, jss, pki-core, ldapjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-core
ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3
ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f
tomcatjss-7.7.1-1.module+el8.6.0+788+76246f77.noarch.rpm
086e5c953de53c42f6ae4abcd32e4c9126ba1dd9a028a7a2624a7d8bff1fa27b
RLBA-2022:1852
fido-device-onboard bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fido-device-onboard.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fdo-admin-cli-0.4.5-1.el8.x86_64.rpm
0b4d42006f2771bf69064e0f5c0760ccb4a501707ebdb8109b690623f9c13287
fdo-client-0.4.5-1.el8.x86_64.rpm
771890a1d457afd6b520fc64f6eb22395791ff9aa648741ebd4639e1ae5ce237
fdo-init-0.4.5-1.el8.x86_64.rpm
f3a2ca65e4946f41048b2e57277e8101b597e61a0ea22ac7ee891bc08eac6189
fdo-manufacturing-server-0.4.5-1.el8.x86_64.rpm
79ec5f43b0adceefe49d81473ff9e1a67e83cc84bfc4c6d5caa392246535336f
fdo-owner-cli-0.4.5-1.el8.x86_64.rpm
3975e1444499f5da7d4c92f7b5a76b75a0aa4e0f5a7c000ef2f9bdc9fef63553
fdo-owner-onboarding-server-0.4.5-1.el8.x86_64.rpm
5064445c720560843ac32fa04dbfca0bb4adfeb36a8117d1cf90b7a292aaae01
fdo-rendezvous-server-0.4.5-1.el8.x86_64.rpm
45d55ff49176c1387639103a20d31fdb1d7acc3b0aa682c733ebbf520e6d5dbc
RLSA-2022:1860
Moderate: maven:3.6 security and enhancement update
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Security Fix(es):
* apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Security Fix(es):
* apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm
7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091
apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm
d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8
apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm
aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6
apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm
c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb
apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm
5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8
atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm
38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04
cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2
geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm
9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb
google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm
afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e
guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb
httpcomponents-client-4.5.10-4.module+el8.6.0+844+4401f2ed.noarch.rpm
2a57d054836c857182ff749dc7be558ee1a5f07b00522cae3cf3f3d87c914217
httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm
0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8
jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm
72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393
jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb
jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8
jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm
f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff
maven-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
02dcbeb9256307b3d4e05b330cc1b19315500c03a4309b032db1a7ee3f4b5407
maven-lib-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
ece3ed809322707652d98d21a587efcda7cd2dd195adc5eac9000510ad645087
maven-openjdk11-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
312291f926d1ff4969ce01835823bbe596fa6eeb2f9d678e4855fdb051961d30
maven-openjdk17-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
41a59d80aa9b8b60c4c5e2daba8b2ebcc4ae6d33583379342ff21d924a0cfd88
maven-openjdk8-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
93eeecde30df6567f71618ed96f9bda171f5a55ef954dd6506b467615e462913
maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf
maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91
plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm
163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68
plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm
01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0
plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm
fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08
plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm
b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e
plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm
93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de
plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm
7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5
sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf
slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a
RLSA-2022:1861
Moderate: maven:3.5 security update
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Security Fix(es):
* apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Security Fix(es):
* apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
aopalliance-1.0-17.module+el8.6.0+843+5a13dac3.noarch.rpm
645e5fcc65f5ce6a5e7c644af9aab686e5168eb67dfd41299b949b73980385fe
apache-commons-cli-1.4-4.module+el8.6.0+843+5a13dac3.noarch.rpm
9cf097d54e58ae1b8fd93d9b45f21f4af852b93f03e628386bcd0c88fc09745b
apache-commons-codec-1.11-3.module+el8.6.0+843+5a13dac3.noarch.rpm
605d7fd276cc1605f057689518327458da2d3e3bbc9ca913a6c22523af7e05f7
apache-commons-io-2.6-3.module+el8.6.0+843+5a13dac3.noarch.rpm
c150457c26d08f11ab2742a26b5603ac0421309db274d1fb9291609513952291
apache-commons-lang3-3.7-3.module+el8.6.0+843+5a13dac3.noarch.rpm
0bec3fe86916400b445c090e2ac59fa15e67b85634d5d19db6be1bcfa35f53cc
apache-commons-logging-1.2-13.module+el8.3.0+133+b8b54b58.noarch.rpm
d1ce83ba6cb3e4a97216feb51b8f37d3bbd6d163343165ff58cc15cb5340f14a
atinject-1-28.20100611svn86.module+el8.6.0+843+5a13dac3.noarch.rpm
860817f72225f53de2c34d05aec257a5d30619b2a66ac51d3e72c64b362a950b
cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm
e8d491fba0eb58a0c39d874c349f74791897d4081e994974882c75018a06fdb3
geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm
2816206b8a4525c74be3dd28945359d43c37633863851e98787e4c7785c009fc
glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpm
17afe1f510bcc20dd864bd1d4ce9ef4ba137175ba3c1741f9006e00dbd48ec24
google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpm
c8b1e0ebe1f806d22ee98e61211e3765171361d54c8aa43d237c47756d4413f3
guava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm
e3dbd918aa5734109e5025fcff46aa6cd3a7d681c15b47b3839ccd014318b579
hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpm
f9013313a092e35684dbfa9b11557e1603fe59feaa126da2cf2915c103413541
httpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm
7c7e53a1beada7fd2cfdae8f50acedd99d62bb3f92ee4cce8c7e8bd8e1e9f520
httpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm
6254441dd7d139fca7bf71c3efd602ae15c8d4ca4c448d26de3807a94f2250cd
jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpm
86a01e3eab084e992222cf94a07c1591b41cf818904e7472d549b3d9f4fd2efa
jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm
493532237bdca6b7839c897c1a96cdbe6f954348baf86f9e61abaab5b1ce1b07
jcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm
ec223715ffea5512ef05f8360522ec30d7052669260bb9c86ae92f6710aa4168
jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm
d53adb7c5604a6c4b463fd8356426c62a0e287bbc2cfbae244eb30eb68ed108c
maven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm
8d0715634168a0feead5c2200b92f87700932e0482c656fd6d46804779e1cbf3
maven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm
53d03a2e69c1418fda008f86abe12366522fc7db4a6460e02364f332f8aa78d5
maven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
15ca161ef8ce0b64553cc1e9a6c08c7c52233756722ab7b02b71443b22d76bb5
maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
183df0d4f71c063a2120049da9cf587068a3c4afd57f31edbdab23d2cd42f87b
maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
72909fd412a649f39c80a3aeac0785ba97622f59d0c490f5784bea61d6f9f22e
maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
890e312f32d987ad806ead574436896a3fdb69cc4c701d10a8a5cdeed4f335f0
maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
d62eccdd6992ca5b358305ab16e27b68f98b9cf3b8b3d31b860dc1afe772d4c0
maven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
fe818f18b5bbfea7d1d477e35e8207ec850c4303dc4bdfd97f1c4fd5a788107c
maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm
0348dc46c7235cbdb54e577a5c7e3bf67bf3990c5b5224da5a8dd810581b0aa9
maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm
4c51162d25acfb25c357e2b78536d0439b499a894e89bd888970ae2ae7952e6b
maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm
7c235cf78744f6520a54c1ec8eea4e9f8adeb990d58958f07f1ffa16951fed0e
maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm
97503c4b45752870defade5f80b65af78a64e63bdb7ec31c7131f9478aaedb0e
plexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm
92f2c95dd389e6f28bdb5336069b9843e2d77e93561cd94114e795b648669963
plexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm
86ef908e4b8b5f6b75d79fb71c9e941d77070240f9f520da09a8f02f76d68c55
plexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm
4df6c9152b37c8c6f3242626c80b8138dbc2dcc2c16e362e6b7f9bd5fc011e1d
plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpm
ea5b1b2a881c5ae1c82442c1642dbd21de75bf72f84186f1a04e06af74491791
plexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpm
3b64df7a26462444ef46b693adf0d9d4aa4022a17cacc936d2a76fed0c9466b4
plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpm
bd6542f8ea1aa47b0b5b280828f4828dada693a8ecfe1e9eb55a1ebc300f75ad
sisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm
a417c7920d1c835b4342cf7f278800e79764ca5337c6d42e25e06f4484e6c98a
sisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm
a3be327bd921aab3011f3e1aa3639e45ef82c9fe97e29416851ef69300d9f4c4
rocky-linux-8-x86-64-appstream-rpms__scala
jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpm
71f32b6fe08073c78cb2584b57563d05c063c8dfc6a71be37f424c67daf95938
rocky-linux-8-x86-64-appstream-rpms__pki-deps
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
RLBA-2022:1862
virt-manager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
virt-install-3.2.0-4.el8.noarch.rpm
f13631961b3c5f73652822b4766f9a1a61269dde8dbcfd304d6eec53282e32d5
virt-manager-3.2.0-4.el8.noarch.rpm
3c45b10c17c93a29e393d7849163945f71fa32d43d91fbacfbb8b509eba94b56
virt-manager-common-3.2.0-4.el8.noarch.rpm
fe1626498e6043d89d32a967eb9edeadc6211a8ca1104b74b6d7044b7ba276f1
RLBA-2022:1875
adwaita-icon-theme bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for adwaita-icon-theme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
adwaita-cursor-theme-3.28.0-3.el8.noarch.rpm
3b35985ea1acf4036276f55b8831b41875279082a9c57232a1c028a5399bb65b
adwaita-icon-theme-3.28.0-3.el8.noarch.rpm
2407bf478cec673be1f78f6b7ac92e18b8e5929992534578ffde85cff251c0d1
RLBA-2022:1878
git bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for git.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
git-daemon-2.31.1-2.el8.x86_64.rpm
1172b644c3b23ffeae9a503dca48a343f697f371a77479522ce92c5a63ba4d87
git-2.31.1-2.el8.x86_64.rpm
0539d1de6615e832592ac547a7ccc3a7a7cd8a134d4ba4fbc7be791a0c61ed6e
git-all-2.31.1-2.el8.noarch.rpm
36e84d25fa924b9d8e897cf4926c20698f1324425ac5c9f93a4290bffd915509
git-core-2.31.1-2.el8.x86_64.rpm
17b04d086666e514b8f7bc9c81a0e3c97d924b8ad1c5171dfaa12e12286f7701
git-core-doc-2.31.1-2.el8.noarch.rpm
024495aaaac25b8159877171d753e6ac24bd41677249cfc065792e76bc615b3a
git-credential-libsecret-2.31.1-2.el8.x86_64.rpm
8867bbe1b88d44b70ae0ca8059b138885627b416874044732797a0288eafd500
git-email-2.31.1-2.el8.noarch.rpm
dc4c21ad86d01eaba0813ab4eab28183006b7bd1a7666deae56f472075bb564a
git-gui-2.31.1-2.el8.noarch.rpm
9fbac33ada979bb1086a94c50e98c060aadd9f598d5c1318585c0986ca657722
git-instaweb-2.31.1-2.el8.noarch.rpm
9f2fd320848f12dc5632030eb9336d6ac25f17578ca7d1146e858f1ab53c2e44
gitk-2.31.1-2.el8.noarch.rpm
003c3d1dc4c018b3784a5b55a3f3d23d29aff2b3812829e221bc04c6b1187423
git-subtree-2.31.1-2.el8.x86_64.rpm
69b10ce2ae22f6ce41c4bb3b1d379d21f46685b42440c9c540351653e78174f2
git-svn-2.31.1-2.el8.noarch.rpm
1897ac4e96bfbd05d750f8e4a0eaeec8b390d60afa193a7f6796168e55f55925
gitweb-2.31.1-2.el8.noarch.rpm
ea8caa52549a785a1773f3f4ee8666a8e12bfc8aecef4880870b2a5c74f35ae8
perl-Git-2.31.1-2.el8.noarch.rpm
d02463730699f65617a1c3fe4a29b8d955c9f337547fd79410b59de2096573da
perl-Git-SVN-2.31.1-2.el8.noarch.rpm
88cb54d628e7da095c2deb6e20c955c04760f5c4686d29013d3481590c9f69ae
RLEA-2022:1884
idm:client and idm:DL1 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2022:1889
texlive bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for texlive.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
texlive-euler-20180414-25.el8.noarch.rpm
7debf8882af04eaa062a640c26431715c3402afa6cd2a3696741566cb92833bd
texlive-filehook-20180414-25.el8.noarch.rpm
f763b1e0291ecd5f46b924540a3a013677b1fb1e0ef7d36a0b84c98b26145235
texlive-fontspec-20180414-25.el8.noarch.rpm
f1082b86789497fcdf53485e887248b340eb719806736c3fdde83cdbc815c6ef
texlive-environ-20180414-25.el8.noarch.rpm
1164632e4d523dab808654e313fb853a6bd4cc22eabe3c147fe1f7e8483f7c78
texlive-20180414-25.el8.x86_64.rpm
fca0165b3f00ccbee923dff753995b6b6ceedf08fb38d88f524ef4da2d4112e9
texlive-adjustbox-20180414-25.el8.noarch.rpm
ae011dbe779b1df6055cdab83865e184cc8089e032644328b9175639dc59bb06
texlive-ae-20180414-25.el8.noarch.rpm
6e905e809230887b6e8a386d236cefd199954b85130b67df7e29624c6bf4cd3f
texlive-algorithms-20180414-25.el8.noarch.rpm
c81d5a614e695afd20dce5f749a93a160af06df2d20bcabe526d94922aec4eeb
texlive-amscls-20180414-25.el8.noarch.rpm
459892f2e8fcae0bbb0c38dacb89fb6a50997b2f1abe759b38176ed06874e8bb
texlive-amsfonts-20180414-25.el8.noarch.rpm
4b4b2242dca9f44a353f737d2f8bb69356b61636fb55d953f1353b1d89a354b0
texlive-amsmath-20180414-25.el8.noarch.rpm
a0dfe125feb0bdbb737be04b7305f3a6d877b833bbcfd73616499bc4811d5c0d
texlive-anyfontsize-20180414-25.el8.noarch.rpm
efb7ad5e995bf24e6ffacc959b368b02105a6bf1e1645bbd2111a7764420e59c
texlive-anysize-20180414-25.el8.noarch.rpm
e61521fa3902da550dcf3ca9da3616540ed70e67164417aea3df39683faf7041
texlive-appendix-20180414-25.el8.noarch.rpm
3b375df089e9b2d69c6a758f40dc823c708fefd421c34f11bacf942d2b3d7c26
texlive-arabxetex-20180414-25.el8.noarch.rpm
cae22672b1f4b213a96ae7f1cf2c5a90d87b236a5968fe7de44efce761ab833a
texlive-arphic-20180414-25.el8.noarch.rpm
5f822437b7c934964f4f8caa1946ad8a9cab7181883dfaa295ad5268215bc994
texlive-attachfile-20180414-25.el8.noarch.rpm
e3b88649b6fced18a214ddff57cca1c233065f73459c672ae1d49497cf045293
texlive-avantgar-20180414-25.el8.noarch.rpm
0e8432d82862698c0b4691e52bbdcc4322f8872755f498c7936c8e7a6bdd5ffb
texlive-awesomebox-20180414-25.el8.noarch.rpm
da55567dd39f004d50c1e9db3c8dd3e22b51930fce30a69b8711e3ef9c79999f
texlive-babel-20180414-25.el8.noarch.rpm
ff9bb0ff7b5a44b45b1c885545007f9cab5b740e1a3917c36ad5c899300afda1
texlive-babelbib-20180414-25.el8.noarch.rpm
55a073dcfd46e532abf6ee7d19e258c3b90a4250b7c1fd30d6370c87099e16e0
texlive-babel-english-20180414-25.el8.noarch.rpm
e4e11539cfc94f7a0ca43889aa742f00ba377a868595fcdc8e9e79d321132e1a
texlive-base-20180414-25.el8.noarch.rpm
e90446c9541d26677b9cab779a760936bc145bb329a5d790ae04ada98ed7c108
texlive-beamer-20180414-25.el8.noarch.rpm
86d6b74d07086b52218478525d8c2a8ff4283ce7bf44f1cb2c0daa0e0fc855c0
texlive-bera-20180414-25.el8.noarch.rpm
f6b4920563d8b27c1019e09b81702d6671f6d87fcdd35c6bab46b192b3ab7cf4
texlive-beton-20180414-25.el8.noarch.rpm
3c3a701e1c7ba76a69230862aa4dd4f1b157993470f0306bfdb226308b98abe2
texlive-bibtex-20180414-25.el8.x86_64.rpm
f64cbef8d54f64fed525e64ba5211cb613417aa9111b22f1efa7d5fda84e1085
texlive-bibtopic-20180414-25.el8.noarch.rpm
3194ab38bb507f8f0f83fd0c4d9c8457b079ff66d125e646bf15ea8008184d39
texlive-bidi-20180414-25.el8.noarch.rpm
1f4406f8737ecd3736e263ed6a97f86614bee54b2af4c9b97840a5a62000b5a7
texlive-bigfoot-20180414-25.el8.noarch.rpm
82d718d89b8c87d52ae9ed5b7705ff8e6bef10c0704b065a0e7b6967cd0af0dd
texlive-bookman-20180414-25.el8.noarch.rpm
a6cb6fc191d4a31d2c9a0b1ced169213285be962da174452bea381e761b2ac8d
texlive-booktabs-20180414-25.el8.noarch.rpm
900f16491c97dd2e51c12b81a5d51191cf9d9825f97caea3c2566ed16bdfd681
texlive-breakurl-20180414-25.el8.noarch.rpm
3a251185fefb2b2bf51091af53c906d2eabecbfcd4eea089ac4459f39417db71
texlive-breqn-20180414-25.el8.noarch.rpm
dae4180acf480d03ef60d1269e082ae5f69273c2fba1640bb0f94f51b98c3aa1
texlive-caption-20180414-25.el8.noarch.rpm
7bf93d6bda158f65fe084932de344e9c3433f2a020ded7f7f7acd209c3144550
texlive-capt-of-20180414-25.el8.noarch.rpm
24361f4b10f87d6c8267db8bcb9446278b5bb2c5277ddc542e0fae50cf9358f2
texlive-carlisle-20180414-25.el8.noarch.rpm
266b87404829d306207eb9386329de828ef9dfc9af16969c2d159103a1f87e88
texlive-changebar-20180414-25.el8.noarch.rpm
87b878b073a441e6722a43bf193690b8eb1c510a37a4d37b1063287bc7fb6e08
texlive-changepage-20180414-25.el8.noarch.rpm
2e997c9da065f25ce03ce67c73046c6a16c90dff6d8c350e782418adae92edc1
texlive-charter-20180414-25.el8.noarch.rpm
93266dfa283a03bf209f11f507120e04164e438ab4277da31ca1ffab8b1c76c2
texlive-chngcntr-20180414-25.el8.noarch.rpm
c4e2f54d1789524f4dc8b272fe1898a779f476b1cd91146cddbc237ab0b2dd57
texlive-cite-20180414-25.el8.noarch.rpm
3db3c0889178adcf8a4ddc6546d8bd07251107da16dc9bc9886b87b848a9a369
texlive-cjk-20180414-25.el8.noarch.rpm
b054038461079165797e8f3dcb6cf1b17dc2443a157f203dd0c244f7186d3910
texlive-classpack-20180414-25.el8.noarch.rpm
cb6380339c7ca5da8393bee14d5e4b7b62155028894540dde1c493f3382b250b
texlive-cm-20180414-25.el8.noarch.rpm
4b712b128fcc2acdd7168f06e6c492374130d4292969181bf3b2475ebfc4a5c2
texlive-cmap-20180414-25.el8.noarch.rpm
12e3a3b8b6285826d8887c1c8e315560bb309f9e73e75eab5d327938c1734b3f
texlive-cmextra-20180414-25.el8.noarch.rpm
dc9ac4bb7f56d8aad81cd70a3b362ab8d37106ecc43c4ce34718b0e9daabc4a5
texlive-cm-lgc-20180414-25.el8.noarch.rpm
b0af107974000979206fce50893ffb061f1ad1f41babead50f6ff3e347138e37
texlive-cm-super-20180414-25.el8.noarch.rpm
bc6f15eea9a0ec65807187f86350ad449af5867267b72863d30311ba791c6235
texlive-cns-20180414-25.el8.noarch.rpm
4fc21e45aa490b5a0015ed16999f53cbb46bcc6729e0541426899ff749e8a5a2
texlive-collectbox-20180414-25.el8.noarch.rpm
993fc97131f9865611062c7535e7beb09a82a2eb07010abc2f27891c2bbc18a4
texlive-collection-basic-20180414-25.el8.noarch.rpm
e08e24cf5584c7da4a94225b86e30a3f2aaa64d58d2478c712d4358ccf54eba7
texlive-collection-fontsrecommended-20180414-25.el8.noarch.rpm
ef06315141a8efb0b705e2cc421b0afed7d55c16ad6c48839392902914516b0d
texlive-collection-htmlxml-20180414-25.el8.noarch.rpm
f0479643b7c0e4c288896bd0f278236ee02c05254b3340c4f86faf6ec3a37201
texlive-collection-latex-20180414-25.el8.noarch.rpm
8493c67d76b032bc3b47ab0313ac460b5fb562724c086be76c6d118796af8cf9
texlive-collection-latexrecommended-20180414-25.el8.noarch.rpm
43a8048769f9a6d4c1c48571a3b0e75e9171725a63c01c1ecdd7f2b462731ce6
texlive-collection-xetex-20180414-25.el8.noarch.rpm
b59b51113f2410358f99ecb36bba67cbf3bca777040d5649271a5189d4a03fe6
texlive-colortbl-20180414-25.el8.noarch.rpm
4b5e74f283d3c7e9df6d372370615cd50422b4103a446b5fcf85dcbe22112563
texlive-context-20180414-25.el8.noarch.rpm
74d2591b8fcd7ae0f541b37b7c607e848e474b3bb656410ebced1b9874272c63
texlive-courier-20180414-25.el8.noarch.rpm
4074f2a3b7af9e49d32f073e73c87d7291e82ba81fef5e471e7f4d1305416a5c
texlive-crop-20180414-25.el8.noarch.rpm
2227ff46fd6e8c789105c31ac9c5fd8074d88a90c4fc6f9b9c5daf2203dadefe
texlive-csquotes-20180414-25.el8.noarch.rpm
5072af2122eca21cff7b669d07d2fdb349ebb63a3f17ceb73da526699284c51a
texlive-ctable-20180414-25.el8.noarch.rpm
d6fd80302edb02073fc18038a36271238ef379a413ac263f6f53ac9e13cff978
texlive-ctablestack-20180414-25.el8.noarch.rpm
6d0e40dcdb9e44e75e414277dd97b341b675520ec04aeec9baeb5a7f113dcd9f
texlive-currfile-20180414-25.el8.noarch.rpm
60814c1dd8bb5fa40a1854e98459f309197b9941ab0cae6d1f2abf23217e171e
texlive-datetime-20180414-25.el8.noarch.rpm
167bb4b0dc2f6789ed2a002fa0119c6f2565d7aa059eaf3df48095c311e2ae31
texlive-dvipdfmx-20180414-25.el8.x86_64.rpm
e0e256a8933512a4538f08a24c98eb7cecde65159d6557cbfdc20c5d7d64d2cc
texlive-dvipng-20180414-25.el8.x86_64.rpm
ba9da0905b5eb35c2132251e289b4a678b4fe64cf63a20334cce10b4377e03f1
texlive-dvips-20180414-25.el8.x86_64.rpm
ae5ef7c07d69ca9468b9277d2920ab38a1ca9a7a16944a6cb61fff708010229c
texlive-dvisvgm-20180414-25.el8.x86_64.rpm
bd712ec77ae18d3ba1e1e5acadd71c603c5f0859d96ff46524f287578406628a
texlive-ec-20180414-25.el8.noarch.rpm
1fc6a8529a3d44c4431f170912594a0fb18f960310a9f2ef0167aeabe4c90d73
texlive-eepic-20180414-25.el8.noarch.rpm
3f0a81a13f4a525849d444ac3cddcb42ad4b2fc16703be7dc34262c1559c0259
texlive-enctex-20180414-25.el8.noarch.rpm
5f961e5f85fddcdba82eef0d582c0caf0df50205f75c341862668a82bb231538
texlive-enumitem-20180414-25.el8.noarch.rpm
fa0af899af69457ebcee4541f9646ffc239f30d764731e6774c343a08a9e3c77
texlive-epsf-20180414-25.el8.noarch.rpm
39d0a343cebb1ccdae1af654e3cd356b1731e11760a621b27c5573d62f4640f7
texlive-epstopdf-20180414-25.el8.noarch.rpm
59822cee9df3a444922eccd1b88eae4d487097eb1da976a94d5aeff93bb1213f
texlive-eqparbox-20180414-25.el8.noarch.rpm
30397f4d32e42a90b029d495274efef400961e7e8a6cd2b8a9efb38dc9934214
texlive-eso-pic-20180414-25.el8.noarch.rpm
886c72b65ac519271f61210102bfb6c0b05e4110e12a24204016de4bd6e90ca4
texlive-etex-20180414-25.el8.noarch.rpm
fe6f963e4799e0efc8452e0f26ac3222ce49785cab6a55d201b6279737f7bd84
texlive-etex-pkg-20180414-25.el8.noarch.rpm
9ce0887cf15faa6571b99bd6e99af573f208087aa8f669cc670a28b513398142
texlive-etoolbox-20180414-25.el8.noarch.rpm
d078d77a5cf5f14a3f4bc0a9bf13bcbc7403087753ebfb1730dbfcb59c41c309
texlive-euenc-20180414-25.el8.noarch.rpm
3268a48e7348838de68bc37fa2cab0225da3739f1591d3044cbfb55f6e2dcc8a
texlive-euro-20180414-25.el8.noarch.rpm
7a32ca4e50a81cfb339c4e49c47e2dd056fef71ae8198ab74e4d554511e5d7dc
texlive-eurosym-20180414-25.el8.noarch.rpm
1ea6df9016691a1668b2959cfc887597158c0c5c26943780a8f8abd3f35ec498
texlive-extsizes-20180414-25.el8.noarch.rpm
25165ace726d47f37be296fa366602ed45a8a04aae4aa73f3bf7a2e2b8d09545
texlive-fancybox-20180414-25.el8.noarch.rpm
db00055abda0a1ae077985d08482bc80f820b1f001da99a1d5363e038adce7af
texlive-fancyhdr-20180414-25.el8.noarch.rpm
38f5bd06ba84baeb43fa5fc325cb452f438850be0dd8eb773149a41c07994d09
texlive-fancyref-20180414-25.el8.noarch.rpm
9d074e5f81a09540131b3420e58ed15f8a4ce330d9942e4bc17bbb743f671257
texlive-fancyvrb-20180414-25.el8.noarch.rpm
3915a5acfebaf64925d0ea7dbd8e14a45ab89e323d0dbd573eb49523c2e2363a
texlive-filecontents-20180414-25.el8.noarch.rpm
7a16731f199bc304ea78f32b034e7bc05d6dd8e21f7861a95deab957d3373ac6
texlive-finstrut-20180414-25.el8.noarch.rpm
2b18cbe5906e25e0820e3b819c23995e16419bba767098f8672bf58d03421a09
texlive-fix2col-20180414-25.el8.noarch.rpm
3daf468c40068993e8886fe55b8ee21ef7dd9250085d967555e53cc5f49fcdc7
texlive-fixlatvian-20180414-25.el8.noarch.rpm
4ecbefaaab8a9eca42750a092273a873a4989f84ab67f9eae2e4ea1eb9989dc2
texlive-float-20180414-25.el8.noarch.rpm
49610b8dfbfafe0d87697dcfc1e88b430e78c60d4581fb7f9568d2cd2ed451e1
texlive-fmtcount-20180414-25.el8.noarch.rpm
df8c2b157228d6b918c3ee7624cbcb78550702f73f20b04ba0444983e540d5aa
texlive-fncychap-20180414-25.el8.noarch.rpm
d4cd132c053cbace5917d0a9107f7977c4878462da62bebe8fa8cd8e4a881c6d
texlive-fontawesome-20180414-25.el8.noarch.rpm
878f40541575a61af8429165e2ba391625089149bd4bd737ee0801c4b86f1657
texlive-fontbook-20180414-25.el8.noarch.rpm
e09f9b8cd44049009e717e6e47f58cddca43e695ec428879ff408fdea38ff89a
texlive-fonts-tlwg-20180414-25.el8.noarch.rpm
cb91e013b0a462a59a9ecea7d7a76aaf333619930e8981b47d1788d8b193a987
texlive-fontware-20180414-25.el8.x86_64.rpm
3ec4004806a8b3d3af8f4d98e282998837882393dae947be60e49d863a0fc479
texlive-fontwrap-20180414-25.el8.noarch.rpm
642fe8615e66507fc0126d985e15adab7673130f6cdc8a927db39dcd23ede3ef
texlive-footmisc-20180414-25.el8.noarch.rpm
60613537d74909dbbc964a420e2537fb07e59cb06fe414087180d3976f6e35bc
texlive-fp-20180414-25.el8.noarch.rpm
d82ce702a5229c56f009896944066a0552d99b452b8b46046511dac2b6f0251e
texlive-fpl-20180414-25.el8.noarch.rpm
7102affb1c85762dc6280bdcdc662ae6745d5db2714c33db3b27982e29faeb49
texlive-framed-20180414-25.el8.noarch.rpm
b79dec5f59d7f096916642b2bc079e860911350e75b8700169f578cae59ea298
texlive-garuda-c90-20180414-25.el8.noarch.rpm
8efb8844b4b4ec2d0cfd873bae2d6aac64d828a14ddca1efd899c911408170ae
texlive-geometry-20180414-25.el8.noarch.rpm
f798179b77880d4550b3db5e80bcec0086cad1f6ce6512946dee62fb88aa62df
texlive-glyphlist-20180414-25.el8.noarch.rpm
2b043f1d6d903eab9212a25e3852c19161bf418e6a5b646d2a1474d73644400b
texlive-graphics-20180414-25.el8.noarch.rpm
743f0bf90a63e1ae922b0994e44105738cbef59f718710efb0a4d607fc5cd98c
texlive-graphics-cfg-20180414-25.el8.noarch.rpm
a3ab6698567ff1db3db332367f5f4e780e216cab72460f77525c98095eb0a58a
texlive-graphics-def-20180414-25.el8.noarch.rpm
1ad672b18c80324c6aaf8ffb0d747dc998192157a36d7c31780ed39a2507808a
texlive-gsftopk-20180414-25.el8.x86_64.rpm
0774bd23840df0f8b8741c7aa4ad47fae98db9ef4ee089a6e4bf60022f261862
texlive-helvetic-20180414-25.el8.noarch.rpm
00cedc721b33f6a2cafbd6a9eb4d027d07bd4789c8ff12e6973657761fa5d400
texlive-hyperref-20180414-25.el8.noarch.rpm
44128eaa6d5687f7df3b95a6566d8cc4356cd4fb0ca5ec7f0dcc6c32ec219f35
texlive-hyphenat-20180414-25.el8.noarch.rpm
0f4da6a18bbffe186329b71d51d0fcdcd1438536e415668e8f3c34156ae06e53
texlive-hyphen-base-20180414-25.el8.noarch.rpm
621258b17f1fb7fb747a9512c434bbb1acf54b4dca8936c89beeec1b42ffea9f
texlive-hyph-utf8-20180414-25.el8.noarch.rpm
2dc38e1131fd329015d453e3d3833c94ac9eaf9b627c68eb19ea337963ccb334
texlive-ifetex-20180414-25.el8.noarch.rpm
c0ff6d5dd4e66b3c740e6473b4509af77042180a855268beaa5535c2e2a557b2
texlive-ifluatex-20180414-25.el8.noarch.rpm
3c9555dd232f77eea0643e7a485050ee8eca04469ad313803a4b30bd3a735a0e
texlive-ifmtarg-20180414-25.el8.noarch.rpm
6292141c20ace8f90a49d199a35d9a7936bedf8df2fa1209f3d16b0f4f8a063e
texlive-ifoddpage-20180414-25.el8.noarch.rpm
8b918dfbbb271bcfdef1f24b53c431cfb407fd84c756afac622ef3572fe235c3
texlive-iftex-20180414-25.el8.noarch.rpm
2a18f6eb33816a826fef8e524f2c38470c796e18329ce9cc8cf6b62b2554d7df
texlive-ifxetex-20180414-25.el8.noarch.rpm
de25e4ef32f789e48e79697ae7382fb64905abddb37b3b29b1d7d4973fc952eb
texlive-import-20180414-25.el8.noarch.rpm
a7b0e363a79aa8d3df466f9231f082c0a316e622c9994ec91741f2cb2d7fae16
texlive-index-20180414-25.el8.noarch.rpm
e47a93db86acf644e7362e1fe17cd74f50b19788699db29d2fc73f29940e19a6
texlive-jadetex-20180414-25.el8.noarch.rpm
881f96fc1c0095fa5ad9741906ccd1f92772a594e129d89126e0b733e6083aea
texlive-jknapltx-20180414-25.el8.noarch.rpm
9c4877ea7334a875f599e8207a03e05777246fecd2044abb436159c4c1acbe46
texlive-kastrup-20180414-25.el8.noarch.rpm
4b93c2acbd83bab1e66a3adb683f268158b0c43f6a602a2ba93d2c61c3318247
texlive-kerkis-20180414-25.el8.noarch.rpm
9ef7cf3bc6b2c3b8271a7df9b5868edb31e54bd2ac2c48ac67636a9512e56e48
texlive-knuth-lib-20180414-25.el8.noarch.rpm
e69d83493a3da333753165398c2e6ba681095441315110f452cf7109b63d8ed8
texlive-knuth-local-20180414-25.el8.noarch.rpm
406722c988dc743597782e5632690ca0ed2c5cc5b602ce93bf983ef4eb83dae7
texlive-koma-script-20180414-25.el8.noarch.rpm
e918c4fe6aee479325e200711a357ffdc37ae2bd1ff7851b6fcec01e95538a6f
texlive-kpathsea-20180414-25.el8.x86_64.rpm
76516edd4f5c824824220b8b1da6741ad6ea0942d2716bfc7e88080cb2d5dbbd
texlive-l3experimental-20180414-25.el8.noarch.rpm
02628a3e06ec9d780fe419eb50a227dc9103de88b3c040ca79eca15dc05b06a5
texlive-l3kernel-20180414-25.el8.noarch.rpm
63f5f3c3823e15bb2e67d26456c4c067dfc6f37449269fc8997bfcca597a19cc
texlive-l3packages-20180414-25.el8.noarch.rpm
203456b816a7a7b836f5f556090c7b465568d7c208e954eb4a419a40b57b2b30
texlive-lastpage-20180414-25.el8.noarch.rpm
20c6981bfa9f31088ada533b2f8852b7c43bd807b819cae469503b5b425c9a2d
texlive-latex-20180414-25.el8.noarch.rpm
bfcf8d50ba4036104454a5f7d306168f3175135db7ede24c985a875367565a9f
texlive-latex2man-20180414-25.el8.noarch.rpm
4c24c4fa7ba221fd71debc326b91948d8d3442143dde349cf2266c05fbcd6a0d
texlive-latexconfig-20180414-25.el8.noarch.rpm
f6350887bd843aae014e05be4dd1b68c3d8a1bb979f0c3854874e60fc85d75d1
texlive-latex-fonts-20180414-25.el8.noarch.rpm
99d49a2058669b6cea75c838f8dc60377a97968da4c0adc4a2b7d1c62105ad18
texlive-lettrine-20180414-25.el8.noarch.rpm
18ac14610862174055193fcfc8f92c4896b6e072fc6b7d93846509d7806919cb
texlive-lib-20180414-25.el8.x86_64.rpm
2522f9d127bdbf59caf4ba91384c3e0320e943b9fa208c9cd5c24d48a0dc7fab
texlive-linegoal-20180414-25.el8.noarch.rpm
17a540d30b87179e82f04f95044016a8a3196e3bd2d9c7c983838cb0bd6aff23
texlive-lineno-20180414-25.el8.noarch.rpm
cd88664332fe8c95af24764d2aa5d70d4c5687b0ad51d26f02a29d50a7911dfa
texlive-listings-20180414-25.el8.noarch.rpm
df817cbc6437c1b330e04ff0ee637f020379db5f26be036710db38d926ebe0fc
texlive-lm-20180414-25.el8.noarch.rpm
a43a83b56974831f16c56e1b458b4616bb5215cb38a21216ee5ecf853477f71f
texlive-lm-math-20180414-25.el8.noarch.rpm
9675429d5a1e86c365d6d30e6b24c62333854663fd877f4ab0b800013793e905
texlive-ltabptch-20180414-25.el8.noarch.rpm
e872d9ee5fa8f51674dfaec52e67e20ce36c45c2b3c8d215ddfdd82658c2cb3f
texlive-ltxmisc-20180414-25.el8.noarch.rpm
d51b41cb80f149bad6bfcb7f4337324c9f2063ba2b3ef1f2c3dce228f9738614
texlive-lua-alt-getopt-20180414-25.el8.noarch.rpm
18f40d591be91254609786eef831c3a8e5266b64f619eea6c4f01111b96b22b3
texlive-lualatex-math-20180414-25.el8.noarch.rpm
45c6f362f69c2167db6ab9be39373b553c399c236f3743a56a24e80fa9841a47
texlive-lualibs-20180414-25.el8.noarch.rpm
a202f5e225ebfe8d6340bafcd895689d053fe11535cc97d5520c1e738f130c98
texlive-luaotfload-20180414-25.el8.noarch.rpm
5628b1e7218de322325c733135a47a99a9e206eeda19002b450cd7fa6785cdcf
texlive-luatex-20180414-25.el8.x86_64.rpm
86575844bd8ce4a907bc232527ceb5db896ff9038c8e85e5f83d0b2c16014387
texlive-luatex85-20180414-25.el8.noarch.rpm
c1a2c397e0aeff46fba1fc4664cc470d28cd739f6f2afe8170e3c4fb8fcb8839
texlive-luatexbase-20180414-25.el8.noarch.rpm
50ec4283fee306496c035ac524b5470804014285bd4bf89a6500cd088d7c2853
texlive-makecmds-20180414-25.el8.noarch.rpm
774f6d3153733bb4d24ecaaa327e16c8d4e2a7915c8b0fe8cf8bf5fce114e26e
texlive-makeindex-20180414-25.el8.x86_64.rpm
f9778abcdc837430ccb9061d9852f09ee58759c56c0a57231dde5dc73ba98e8e
texlive-manfnt-font-20180414-25.el8.noarch.rpm
e32a787b9eadf4b4412ba547526cc6c1d9c973dfd6ac44ee3d2c23ec9a8c4fdd
texlive-marginnote-20180414-25.el8.noarch.rpm
534a303cf09733b0d350e7486f5a528da2182057c5f7063b71b294b1f4f67e62
texlive-marvosym-20180414-25.el8.noarch.rpm
dd234505323dbebd91af7d1331c58b2f35c052b11b832b071b7e2fc4ca8b5080
texlive-mathpazo-20180414-25.el8.noarch.rpm
35eb507c030a39f41b3c2a5b8f4749062e0def1e2e7b6ca5006a1d7caafbde78
texlive-mathspec-20180414-25.el8.noarch.rpm
22a79e4b6f7dd83062a1605417effe13146f8db020d84ace36c1684e879eceee
texlive-mathtools-20180414-25.el8.noarch.rpm
82bfd658f342d619a74788f5add542481f515d5e5e81b3832bf871378031a5e7
texlive-mdwtools-20180414-25.el8.noarch.rpm
a0d99143abf8213c7a52ff3fe35163b0f1524cab1fbf44d5bd266e2d88dbf5ce
texlive-memoir-20180414-25.el8.noarch.rpm
48ecbefa52ad833e2d581ae2d3a1ebfaab53903769c1c88e62988bfc02e546ea
texlive-metafont-20180414-25.el8.x86_64.rpm
97c7ab08597695d91071bb5985161fb06df6ce46e97ced54da5240706cf19e75
texlive-metalogo-20180414-25.el8.noarch.rpm
c73ca4002a6322ba6217d277a9cba5b5341393575ddbab683769114c07492285
texlive-metapost-20180414-25.el8.x86_64.rpm
5cae1b2f3337ad06119dbc9343ab651ecf9e0daea063633b8fb4ba22516511d3
texlive-mflogo-20180414-25.el8.noarch.rpm
d5e09ee5e57418a0f5db2d6835e5c78154f3af207a2924928c04f593a2e434e2
texlive-mflogo-font-20180414-25.el8.noarch.rpm
c30b3ee3a199cfd9db95af15ab1852e72b47e0dfaffa3179fe814b81b0633472
texlive-mfnfss-20180414-25.el8.noarch.rpm
e4d3390b08d13940d40d8aeeb5f60fa448475d4e796b0c5616abd1c57a838589
texlive-mfware-20180414-25.el8.x86_64.rpm
d0c5b0857db638d86cf7ba0ef35b997f1519cff0eea56791caaa66b57f29a90a
texlive-microtype-20180414-25.el8.noarch.rpm
4de0d5b9a16759f013e58e2e0c11270c361368ac241f07b6d30fc2e63fe4e890
texlive-mnsymbol-20180414-25.el8.noarch.rpm
f41f869c0ed1c9ea995dbdcb64d1527967507c76e7d2d68be2f53212d74be7f0
texlive-mparhack-20180414-25.el8.noarch.rpm
dcaa60499e96de0f2e93cc3e6bc7e678083ccc83debd1f026d552cec26ffddd7
texlive-mptopdf-20180414-25.el8.noarch.rpm
2c25f2ae32ce0457c8e67fa50795879016b0bcb0cb26818001b5915f5dbce6e6
texlive-ms-20180414-25.el8.noarch.rpm
88feaee2b09fba1b903a125b7b0ab341f430a2ca1423442e2a181049e51e49fa
texlive-multido-20180414-25.el8.noarch.rpm
d96dbdb72bbf4e356297840c068f7d9f72f8371f60a884e83446621be0f46afe
texlive-multirow-20180414-25.el8.noarch.rpm
0a4bc9a20e80838fec4a9a4b73d1542ca45f194cad976ec289e479d00228b32e
texlive-natbib-20180414-25.el8.noarch.rpm
adc41d4c74b9259c6c3ece655bd794e90b6158460292d24bffc093779c67b711
texlive-ncctools-20180414-25.el8.noarch.rpm
6fe54ab452e8929cbcea2859141d8c5101f2bc672f14f3dde651b4fa621bfee6
texlive-ncntrsbk-20180414-25.el8.noarch.rpm
8ce1f2250d99fca85c54d882fe34d5a03705987f54a9fec0e5ba34638fc62e28
texlive-needspace-20180414-25.el8.noarch.rpm
fd01f1502e7b12c8c134de9d3c21dc7130eacac6b208bf091ea36104e7d80d31
texlive-norasi-c90-20180414-25.el8.noarch.rpm
d356098a3f8e4139a61293a9b2017eb385ed4fe03e45ef7a6a5a38d1779d474c
texlive-ntgclass-20180414-25.el8.noarch.rpm
47e6563a34553c27336b26f231813a934fbf0b133797c094db0b8a92b8bc45f4
texlive-oberdiek-20180414-25.el8.noarch.rpm
c4f78115f5941f30b4cec73c333bbe9f28e05e6dd15378620c280cf2cbeb74ba
texlive-overpic-20180414-25.el8.noarch.rpm
0bd77cfad3d486ef5eccc6bd76db6595c227d06f64af84d6f3ddb551761d41fd
texlive-palatino-20180414-25.el8.noarch.rpm
fbab36b6eb3d0e5830dc2c9f5528f4ed9680ee7b6ba9bbbe4e844e31a64d55ce
texlive-paralist-20180414-25.el8.noarch.rpm
65cbad2a2bd3d02142bce2a3328555427de1e1e4c759c1bad5448a39a62c9634
texlive-parallel-20180414-25.el8.noarch.rpm
a31f6791e6e655b0b66a812c9ffd2ca2dffa1dbfefb6b071df9bbceaf72817ac
texlive-parskip-20180414-25.el8.noarch.rpm
219145f10bef96d44dfe335fd5c24c416b0f8c43eede287c3e5b7029c23e7736
texlive-passivetex-20180414-25.el8.noarch.rpm
92fbb08b208144eda7b4a464fd5c4efbb97fd82eb405813084ad04bb0f96f2fd
texlive-pdfpages-20180414-25.el8.noarch.rpm
0986d7b17250c3fb1c82fc79a054d6ecb9b6fdc4e2bf29fe04a5e754f8cb0676
texlive-pdftex-20180414-25.el8.x86_64.rpm
a46d20c3a65f36dfc65761712b979997bcc89891b775fbca457f969101c23503
texlive-pgf-20180414-25.el8.noarch.rpm
0bf2cbee865bcd8a11b66d3d3debf7b23d5c709d889e123204643e7c789ac6a7
texlive-philokalia-20180414-25.el8.noarch.rpm
5c2a31f59b06b209ced2e80ad748ae93a37a6b0766328318a9d1c7de949323e0
texlive-placeins-20180414-25.el8.noarch.rpm
bb335518be3f6cf58a647e8459a6def0c45414d358c97e0f6e63935b02bcac39
texlive-plain-20180414-25.el8.noarch.rpm
a353307674babae0fef5a8dac276ddd24865411090a07d2d25db65d199a552e9
texlive-polyglossia-20180414-25.el8.noarch.rpm
1f51009f6544e02913d10d2858c47864e1331b2b454fecd95bd24433513b4dd2
texlive-powerdot-20180414-25.el8.noarch.rpm
70af03e6053f314d9efae179aac1d51f92322ad5eba646c84483a57e286d78a5
texlive-preprint-20180414-25.el8.noarch.rpm
7afff60b06f4d111df798968bb474346b27ffd73fc2b3ad9b85d4b7a6096cf21
texlive-psfrag-20180414-25.el8.noarch.rpm
05f0ced6fd71a472aed639bab8f342b90e805cc560fd91639f8517c036443d42
texlive-pslatex-20180414-25.el8.noarch.rpm
272991b52d494c7292bbb8334a62ae2c5488686896995789faa1cddcc602b3ee
texlive-psnfss-20180414-25.el8.noarch.rpm
ab0a95d0382c3a04081e35ad454f9c8b6c88e39decd5c7b9db35f68a9817b9de
texlive-pspicture-20180414-25.el8.noarch.rpm
cf6635958123cec7334afabd5571e20cd6d314af93aa0489145c27a32378214a
texlive-pst-3d-20180414-25.el8.noarch.rpm
11f1f35cb58803a14abe85ccddc5d32ee1232e722893828fcddfcc6d706bf470
texlive-pst-arrow-20180414-25.el8.noarch.rpm
02121d865d6d5689c916fce5034f4c2010d2f00a57f20ddcafdb02a50b629104
texlive-pst-blur-20180414-25.el8.noarch.rpm
9bcb9490e950b77bad3062e02bd395048f291894ee2eab09eb68edb7f6c600e4
texlive-pst-coil-20180414-25.el8.noarch.rpm
588e80c601dd58aeb0d192aa3ca368cb24aa4476f71ad9f9622977addd31aed0
texlive-pst-eps-20180414-25.el8.noarch.rpm
b6c76a89bae25dc541c94a0772a9e6485b80b9ce2d12fe3cfa44926716dc4a97
texlive-pst-fill-20180414-25.el8.noarch.rpm
375a3b10789c41e1dbe6c96a8ef987cab63b4b3c32101fc4e54205cc61e9cf76
texlive-pst-grad-20180414-25.el8.noarch.rpm
1088f90608ceea2e38839c8f72d8a5a71213e0f8105a59e0491b15edd413ff74
texlive-pst-math-20180414-25.el8.noarch.rpm
0e06b4a02bcd8fd2931da4ae6ed99dbce79a7cff6ab7712c47a4a6a1236b3e7f
texlive-pst-node-20180414-25.el8.noarch.rpm
bdeaa5b94bf2d293df988ce49c13ba87abe22f6aa296fecdc8b8851ae9ade40d
texlive-pst-plot-20180414-25.el8.noarch.rpm
967a715fb7176081efa0aa708877e8b19663fe760e135f78b4366ffb8a1874a9
texlive-pstricks-20180414-25.el8.noarch.rpm
350d5a6b13675349800183883c8b88c5455da7b6d73c3a4558f1e1b503cc69b3
texlive-pstricks-add-20180414-25.el8.noarch.rpm
c312c0baec64e2af4fb550e7de79904aede52e7ca3d27e8dd9e5f64789fd8d24
texlive-pst-slpe-20180414-25.el8.noarch.rpm
bdef81872dc1d9a8928916628ded266b1d3adcd203b2a21bc2c4bb9da821d982
texlive-pst-text-20180414-25.el8.noarch.rpm
cb490a8033b1d8ee9a0a31021cd96c5ba2b8d21b8ca71cb459a085f4a0f43f25
texlive-pst-tools-20180414-25.el8.noarch.rpm
877d31ae68ec45b838935059d10bd09a249c615227fe5b6276c3956ec7f71259
texlive-pst-tree-20180414-25.el8.noarch.rpm
36792c67326e69f07a9aaa803ab65c972c3996b12d4fc3fa0571167a679153f1
texlive-ptext-20180414-25.el8.noarch.rpm
14a6ce72f4d61766c2f46f5866ec5e24fd429768732cffe4baadf9f028086e6e
texlive-pxfonts-20180414-25.el8.noarch.rpm
600cc954569ef159eaf9f82daeecc817082bdf1e5861f38d553b6786db4641c5
texlive-qstest-20180414-25.el8.noarch.rpm
81feb479ac5f235eed04cd3b1f81ea0c1ac4b00b4fbf209f0a4820f00ec7289f
texlive-rcs-20180414-25.el8.noarch.rpm
b183bac2702ef64acd4c71c048d54a4b0855fc34dff00d216c4432c9b3f5f40b
texlive-realscripts-20180414-25.el8.noarch.rpm
d7571451e6ee87a7a0cacec53222391f2a13120ac3eb4dbeacc54927e2651309
texlive-rsfs-20180414-25.el8.noarch.rpm
afe0c0d8c8c14f1c8a87c4c3782e8b72a61a529a060e735f1184cb6942d7837a
texlive-sansmath-20180414-25.el8.noarch.rpm
74a6f3e2b7f427381fe302351c0ecc71b9de04fbb7b8abcd49a293bf294b63fb
texlive-sauerj-20180414-25.el8.noarch.rpm
05865812ae0fd775d087c248df99b21b0b13035b6bf041622492c866e29dedce
texlive-scheme-basic-20180414-25.el8.noarch.rpm
ad82a5c66a559a3ca89c8dd34b298b90c2450bc47f72736a4bb1303a5e6c0174
texlive-section-20180414-25.el8.noarch.rpm
d412cc0b4acc79976189331ba7cbeabd0f8086daa3e0c0f3e462e346a96f86e3
texlive-sectsty-20180414-25.el8.noarch.rpm
7d8e65b6af455c15fffe03cd53935941e0f0966ce93d6db8ac4ecd0bd8b999a7
texlive-seminar-20180414-25.el8.noarch.rpm
bec8e7f734861c4d1fd6961e261aa41f63d4bf335775c60ef01806d937fcd921
texlive-sepnum-20180414-25.el8.noarch.rpm
08589b08f704af9d6b3960555ee5595706e8f6e55e49b706376d302d3c5c4c55
texlive-setspace-20180414-25.el8.noarch.rpm
5d1d45047e7feeabef98c2cd75289d35807ad80c37a0624cb3089c80f1f44dff
texlive-showexpl-20180414-25.el8.noarch.rpm
82a67a944b3108b82ab58a93d51d9f7231a3a323689a44967fa4e8a89e351537
texlive-soul-20180414-25.el8.noarch.rpm
07541f907438b8d1741b4f6481241b886ecfac4a24656b4452ee6f4cbf189792
texlive-stmaryrd-20180414-25.el8.noarch.rpm
30ebfef7fa0e3733cb142762b6a316adc3d213dacabd7306a2754be6db5f421a
texlive-subfig-20180414-25.el8.noarch.rpm
cd94656b9ec84434f024eae054cf96600b38d9dcf66a1b43c5fdf69ca5695db8
texlive-subfigure-20180414-25.el8.noarch.rpm
2b7e3d38f128bcc34365ff2c685956e29b38e16b80febbe16abc7a41eaeac06a
texlive-svn-prov-20180414-25.el8.noarch.rpm
b4de9215e7fedcfd6c87c976ce54fc096dcb12b1f6dba4710ff775092ff13c4f
texlive-symbol-20180414-25.el8.noarch.rpm
a83714592e9fc0d2a3905f6f656e3e4c65043a7bcfe59105436ce3eed1580d25
texlive-t2-20180414-25.el8.noarch.rpm
2b0673fc72a9b98feaf4ebbeac0c50aafbfae84cfd4cabd8629a0a5d498c1e35
texlive-tabu-20180414-25.el8.noarch.rpm
953e85f3d77553697a9fcec9d9f072e35cb1f2dab217d8d1883adccec0bb5adc
texlive-tabulary-20180414-25.el8.noarch.rpm
dc0fbcf1551b693860890758a2122dea684d650bca657bab6ff888ec6c17f212
texlive-tetex-20180414-25.el8.noarch.rpm
dc497274a99ee79d02febbf97280d48b7c2067d527f682043c47b2a6b50bf62a
texlive-tex-20180414-25.el8.x86_64.rpm
7f7d031f477f4a95aa1a88b4f88ca0d06026ec6a3920afef1c5e6f063df0b8f1
texlive-tex4ht-20180414-25.el8.x86_64.rpm
3fc0fddcbf11aa8933f47502decef9800ae973cc7673fd23b7084fdd450cc020
texlive-texconfig-20180414-25.el8.noarch.rpm
b9fa8f9f1be36d80c4a43a4a59a2944da6996cb07a7e966f24087640ba000150
texlive-tex-gyre-20180414-25.el8.noarch.rpm
6267176d8af8daf75f79ffb1523f7acce018d3e494e43d5f678225fbc749cbdf
texlive-tex-gyre-math-20180414-25.el8.noarch.rpm
f02fcee0961a55dd7d0ec6635ecbf59e48eec79ab37cb0035ecb2cd04c1a02ef
texlive-tex-ini-files-20180414-25.el8.noarch.rpm
a7e69cd3d53f2875756562dedc8b8646c61d9d035522555d34f85359d449f34a
texlive-texlive-common-doc-20180414-25.el8.noarch.rpm
e2fd4f12c34ff93782e4dd7d9da12bd3f371b37edc8f5a5cc808dbec7855c711
texlive-texlive-docindex-20180414-25.el8.noarch.rpm
c5d5af7a9b8d3052e5fb6b17b79d1b26ccbdfdd128bff0e7e7eea7d90b3348b1
texlive-texlive-en-20180414-25.el8.noarch.rpm
d389c653f60ffe65c97062dcf1be0cc9b8450bf210bd3758cae9fab226d4da83
texlive-texlive.infra-20180414-25.el8.noarch.rpm
fbbf3ea1e691f40964556f0976050962e0c0f0ee9cf2c59fd7c054c19b26c807
texlive-texlive-msg-translations-20180414-25.el8.noarch.rpm
c7a47e0cbfd0e9efca1f920d58496c3185a966b30ce2ac37d70230044eaf90b4
texlive-texlive-scripts-20180414-25.el8.noarch.rpm
f5e8607ea1c58414fae42b5324e37909020f0b814b3785105681849a794f0c21
texlive-textcase-20180414-25.el8.noarch.rpm
104a4089ebb2151b1cc04bc788ce542d6eea029d659e901d9a48cda981ec35cb
texlive-textpos-20180414-25.el8.noarch.rpm
20d44db43a3ae1fd285bb459da40d86090aab9ca5c92bcdbf69286879c9af478
texlive-threeparttable-20180414-25.el8.noarch.rpm
d35abc2b7c31a863117bd84c0142458251e8df5538b23144100e01cec7ae433c
texlive-thumbpdf-20180414-25.el8.noarch.rpm
f2c65a773c9b4ecb993dacbe9f50f79f54bd1e496ab3aed9cd37ed778bda3846
texlive-times-20180414-25.el8.noarch.rpm
2a28c27625325022e853bf6529d337f1dddbb339457e7e5546788dc1025248cb
texlive-tipa-20180414-25.el8.noarch.rpm
0c49aae89d6b86cae3743bb2c0a34614d05b15c7299f1c54c8bfaae10686187b
texlive-titlesec-20180414-25.el8.noarch.rpm
d52f34e34e3fb42909d3c2d1a6802cd801e856af8e7a102a73b9ff2c5fa25b93
texlive-titling-20180414-25.el8.noarch.rpm
912b1dc794180ba10b6c4029c89aef8b04cb46d95846fd8374b31810760eb88e
texlive-tocloft-20180414-25.el8.noarch.rpm
7dd0625f7b434efa408f54b389baf7a535ecefbfabf69fb2b56ded1734928d20
texlive-tools-20180414-25.el8.noarch.rpm
9b747ea9bf5d545c90927f07416d5e2ed2ad1f88a4e2bcafc5b7863ef692b03a
texlive-trimspaces-20180414-25.el8.noarch.rpm
15a26867bc705b19b949201fdc753ed5260d55b662a39493042069b03307d484
texlive-txfonts-20180414-25.el8.noarch.rpm
9abe447a5b9f43516bc6707100a37c90a09a47faff6dbc88ae8ece8b5092d892
texlive-type1cm-20180414-25.el8.noarch.rpm
53e9e8d5e24bab93317baf13ca4fb751c32794850c15439df41256b15fd8e876
texlive-typehtml-20180414-25.el8.noarch.rpm
6d69c4730e5b935accf6a65be8743488293d2a55f39beda698f5804b779cbd79
texlive-ucharclasses-20180414-25.el8.noarch.rpm
c269d8eb7f8fd28d22cf8de8e8f7e71c86f5604dac61187d9c87def684f0cfa9
texlive-ucs-20180414-25.el8.noarch.rpm
c3b331878f149cf7b2ba3e239bc3e28808f68873f7f8eb9eef2c48620a837120
texlive-uhc-20180414-25.el8.noarch.rpm
286ac130a0d6b5163eb04b5a61ff1c9dc059fb648a1cec93dc24aab728feab92
texlive-ulem-20180414-25.el8.noarch.rpm
02321a09505fedeaf342564f9ea842871d56a5f11a41bc8d483fecb01f5f124b
texlive-underscore-20180414-25.el8.noarch.rpm
cc60599bde0aaaae03130de033d9f5247b60ca2db3fce343f2e40f22e5897b23
texlive-unicode-data-20180414-25.el8.noarch.rpm
6ba01e3a12043d988418fd722dcbe35ff27db55da051631531ae6cec7e548be2
texlive-unicode-math-20180414-25.el8.noarch.rpm
9b0e96ab993a164ab8dc5860d7d541e942b394a03d83da9c2c47f1a88993f74b
texlive-unisugar-20180414-25.el8.noarch.rpm
c249b8b049c232637ccd9aa067f1730133da0e1d9d24d945ba7bc7a64a38a69e
texlive-updmap-map-20180414-25.el8.noarch.rpm
bfb2b0eefa387a9b82412c6adc95eab799ec148f87586820867f31088f3f363d
texlive-upquote-20180414-25.el8.noarch.rpm
bebbe238254bf2b2ba67ef05b6ef58c1a4800f621facdd7dce14c34aa7dd11df
texlive-url-20180414-25.el8.noarch.rpm
c2f8aa3df0e581f7dfc952def1d613bd5561e768cbbb53e487fcf3712c66122f
texlive-utopia-20180414-25.el8.noarch.rpm
a562b2f297800da4f65a2cb5f4bdd95929499ae9d956940323c6a831f5305af2
texlive-varwidth-20180414-25.el8.noarch.rpm
1abb88c659a224bf9c30a14389785cd6e952429dc1007121e01865765cb7a33d
texlive-wadalab-20180414-25.el8.noarch.rpm
c6be2bf4f1abbbc548a2963a376d50f8d4197e1e937350fdd2c34eea485004a3
texlive-was-20180414-25.el8.noarch.rpm
33b9b27340002619548d4defb2bd172a597c4b7db59379663ccfb3ef64b03840
texlive-wasy-20180414-25.el8.noarch.rpm
8c9c07704e7042f3eb8eb21cbee67da44dc45c83095c44af6b9b092bcbd5c706
texlive-wasy2-ps-20180414-25.el8.noarch.rpm
7f4a1104098779f6e50799b61f2ec282725da567b3b702f6c4e03f1e52620672
texlive-wasysym-20180414-25.el8.noarch.rpm
6267c122a0d713e10ccbd05405bdb1a91acf4502063de9a10894bb0411990d37
texlive-wrapfig-20180414-25.el8.noarch.rpm
d48b2af8a2e89add3efa2d8aaeffcd07f17d58925c8ec14cdbff22d9eb9461c9
texlive-xcolor-20180414-25.el8.noarch.rpm
1e465a883df073586356d7fa7971af219cb86aa0ff5ee99647cd0a711070d62b
texlive-xdvi-20180414-25.el8.x86_64.rpm
6e413c15fc26329f8eafeeeed53cb6b0d4f4a9e6629210c7d4f66c6adf9d2905
texlive-xecjk-20180414-25.el8.noarch.rpm
2881b95baad014b507af066f1a63af9cee781a1853a802f5830e6d3c82c8be52
texlive-xecolor-20180414-25.el8.noarch.rpm
e93e06b8b0666dc24439d1d710ba2fbc4961e395e371df86cfc9a1136f1b8324
texlive-xecyr-20180414-25.el8.noarch.rpm
509ab80d239ba3117657c531301cf375f48e23f0747e9451a9a3699ad88d9bff
texlive-xeindex-20180414-25.el8.noarch.rpm
c23448e339a26848e66687faf56a3eaecb91bc7c26d1a20c2af16cb8b5cefb98
texlive-xepersian-20180414-25.el8.noarch.rpm
6064d741e9d670b84ea1268c2dc07f1e05742b8480b0dccb39e1ec50239a5876
texlive-xesearch-20180414-25.el8.noarch.rpm
c3846e7f8543ecc09ba3705d06c4cafcd36bf9c6e8fc9c9747a0df620c2a9101
texlive-xetex-20180414-25.el8.x86_64.rpm
80cc7e19c1c545758bd2879b21c8fe0f4f96555481ba1c8d265ec064bc0a2bfd
texlive-xetexconfig-20180414-25.el8.noarch.rpm
14adc8d26d29de3280dae6bec4944e7f6b107f251a65e13e0c0cbb4cc8d218b4
texlive-xetexfontinfo-20180414-25.el8.noarch.rpm
b3f8eaea4701216a1a911b4cda144f0c5357f9d71a8566f1b1d4491a02a808f0
texlive-xetex-itrans-20180414-25.el8.noarch.rpm
9ead8f4f0e698479a0a30ac2972bdc0aa0c36a3073458ff0cd7decf723498a60
texlive-xetex-pstricks-20180414-25.el8.noarch.rpm
1a3ec47824bfb71c08f48dc9e14cedeb1361aacdde77c3980937d2dcae43da7f
texlive-xetex-tibetan-20180414-25.el8.noarch.rpm
7cbe5fcede6edfeaf6eee9d7da0f385f6d40d8d3412a278ada5794f75f39317f
texlive-xifthen-20180414-25.el8.noarch.rpm
eb2cae8a1c6924a49608b396ad1783b9cb97068d4cbf23a4515ecef1007e1be8
texlive-xkeyval-20180414-25.el8.noarch.rpm
42781c9ff19986c35e9d946809d8b8bffb7a93a00eb70598aef9213e7c1edd2f
texlive-xltxtra-20180414-25.el8.noarch.rpm
26c45537cb2def83be67ab6d67aab7d713d7197f2d77099eb14dd9832d0258bd
texlive-xmltex-20180414-25.el8.noarch.rpm
f853df1e34b90586308a6eef776677f90f9b6e6e4e63a8d60d036e2aac58f807
texlive-xmltexconfig-20180414-25.el8.noarch.rpm
e75afa7cb9209710b5f8f4d61b673ac1b570e73341c78a69401e4aa174848148
texlive-xstring-20180414-25.el8.noarch.rpm
1f483cd72604909d8f2a7a1b59e3d10d31cc6d31d652ba10c4a7463e5c926df1
texlive-xtab-20180414-25.el8.noarch.rpm
fb06b9814d301d7d9f40ca73f233b6b645dc8f7259c277b9fa0e9993d53321b2
texlive-xunicode-20180414-25.el8.noarch.rpm
24419ed5a08458703c8e194c1a54ea9a13cd96256dc92f2b3eab1cbb6c82f057
texlive-zapfchan-20180414-25.el8.noarch.rpm
f41cb46d0c5aaff3f9e45c0659527d4ef7713ddaa1ce35dfc29181c0303e87c0
texlive-zapfding-20180414-25.el8.noarch.rpm
eff7eaa41dc39ba23b87ee895773c7b4e256a48ac830736aaae6622367001393
RLBA-2022:1892
sysstat bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sysstat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sysstat-11.7.3-7.el8.x86_64.rpm
18ebf39527982354ecd4e9f241cb0ca214e9c626ff13d63897a0ea0b2ad595d7
RLBA-2022:1897
gcc-toolset-11-systemtap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-systemtap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-systemtap-4.5-6.el8.x86_64.rpm
44a368e9fc0ad89c1cab208712d6edd8b070b3dd41e9ca9a059e8a6028334499
gcc-toolset-11-systemtap-client-4.5-6.el8.x86_64.rpm
2a2aae7b383978ea9e1854f2ab4f842f2d2476dc07a580c70411b51f7afbcab9
gcc-toolset-11-systemtap-devel-4.5-6.el8.x86_64.rpm
1e2851383fbd0b0a3aaf1ce1c36ed3c4a89b5ed4289207308b5224bbc94c8b22
gcc-toolset-11-systemtap-initscript-4.5-6.el8.x86_64.rpm
21b8c938af2bbdc4d410e32fd36feb852293565b1e22069a62562cc385b627c0
gcc-toolset-11-systemtap-runtime-4.5-6.el8.x86_64.rpm
63f6d86581cf4d3949da19fd4033ae6df34a327a1e116bac053c8c09847f0a78
gcc-toolset-11-systemtap-sdt-devel-4.5-6.el8.x86_64.rpm
3933f9ea0548a4cd585056f115026c3aed083178106b846ea77475121e94ea3c
gcc-toolset-11-systemtap-server-4.5-6.el8.x86_64.rpm
e6a168197e3cda466086095cb04a170d69b909d9f19c813dde906c9f48f3c51c
RLEA-2022:1904
new module: php:8.0
This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm
0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm
0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
RLBA-2022:1909
spice-vdagent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-vdagent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-vdagent-0.20.0-4.el8.x86_64.rpm
b3605bc678dc36fdc5ced1b865e1fa1437222171da80645ff01e2d9cb88205ea
RLBA-2022:1913
tcpdump bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tcpdump.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tcpdump-4.9.3-3.el8.x86_64.rpm
606612b501e49ca1d1656e14f9a5309f36f6d181532e4d20df341fc04df4f6ce
RLBA-2022:1914
libosinfo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libosinfo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libosinfo-1.9.0-3.el8.x86_64.rpm
f5860ea3eae997c4028830f13a0d0f78333d9ad5a20953ed3455586af8c2b197
RLSA-2022:1915
Moderate: httpd:2.4 security and bug fix update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)
* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)
* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)
* httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)
* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)
* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)
* httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLBA-2022:1918
webrtc-audio-processing bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for webrtc-audio-processing.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
webrtc-audio-processing-0.3-10.el8.x86_64.rpm
2842620f64a4b5acf00d61cb3ae4d86a42605d5e9084b7bbdbcb125cf3b2d594
RLBA-2022:1923
gnome-session bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-session.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-session-3.28.1-14.el8.x86_64.rpm
f581f6dc06c1c8738281641dacd0d9f0e19f1d534da0d2faaada8f5cc892e39b
gnome-session-kiosk-session-3.28.1-14.el8.x86_64.rpm
b818bf62e55ce8a88a3ada3af7f3c33a5fe47848814cc0651137b9727edad179
gnome-session-wayland-session-3.28.1-14.el8.x86_64.rpm
dea48ea5a779795ba234e782bde1bda745f23e91d796e38c950c7d575c617e32
gnome-session-xsession-3.28.1-14.el8.x86_64.rpm
92930d1b2a3373ee484493ba6f32dd8323c3a5ae3d237a4a2a58cadccb5eea85
RLEA-2022:1926
libreswan bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libreswan.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libreswan-4.5-1.el8.x86_64.rpm
28ccbf755030a96bbc1a660229ee3796060f067345edd60000b459afb72bba24
RLBA-2022:1929
gcc-toolset-11-strace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-strace-5.13-7.el8.x86_64.rpm
8340fd0cefab9e5f9104cbba5427b8a30afc390ea304d84589004a961a5273ae
RLSA-2022:1932
Moderate: python-lxml security update
lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-lxml.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-lxml-4.2.3-4.el8.x86_64.rpm
10e104ac88f0773f495df99f033e9fc933362a6371329d9c392d96d43c766b5b
RLSA-2022:1934
Moderate: mod_auth_mellon security update
The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server.
Security Fix(es):
* mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mod_auth_mellon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server.
Security Fix(es):
* mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpm
4e2af6902d8948be02387c6a9ce5db3423f38ce4f60913a06e463b6ce72e7b87
mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpm
7b1ffed1c79ced0755d2f174d7e67f5d933ad0cc601c2c11f0010cadb54fdc3a
RLBA-2022:1936
vsftpd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for vsftpd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
vsftpd-3.0.3-35.el8.x86_64.rpm
a1e5698fa330881ab4899757f583b2712629ee295d2eda043d1bb37fee955838
RLBA-2022:1938
hostapd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hostapd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
hostapd-2.10-1.el8.x86_64.rpm
b9ac29f6c6ff5e0efe5bf53898c16c3d104f59445268e4f10f39b2efec8322e5
RLBA-2022:1940
egl-wayland bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for egl-wayland.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
egl-wayland-1.1.9-3.el8.x86_64.rpm
5863f1d68d29762f4265851a4583037e8ff0d6cd00962e7dfbc96c9d941e3c0e
RLEA-2022:1943
pmdk:1_fileformat_v6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pmdk, libpmemobj-cpp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pmdk
daxio-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
963751bfb649f95591c1808f358a112d41536259e0323cf9f86d2e69a8c05db4
libpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
19f3938519fdd148bd78ef3ec13c2e1b604a901b5fe1f82d99cb6673aff0a0be
libpmemblk-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
465a9e4c0f257f572f3bd0379bb9d6cad2692a87617268e36f47ce9960fb9e3c
libpmemblk-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
b7a4ff7a843998c42d1a2a8d531ca2ec845b9d6fd6e0149d63d352c0db731b59
libpmemblk-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
eb818cfc5f415610acbfe575931a53b9b26335b6b8f948da35b6593a94cabfef
libpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
d269a75f3c76f836a86ac7ddaeb69b1371e6aa82706c34718968b3675f5a6e41
libpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
68ca3f7c0c3379900aedc8162d5ebf8322d73c61c7463f5643ab498329376731
libpmemlog-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
2095a586118d758554389b640f9429064c1c17f895833837765197c32f57fd3b
libpmemlog-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
e5e45f30eeac5359ee8c456839d01f3cd536af8530e8ac6a131cb7748c009bb2
libpmemlog-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
d18d39c058d5c8a4c1cc15bc82c845a50c967ca59d9f8ce5e0ead104fa77ec8a
libpmemobj-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
764fa3f5c3ac2e3773ff03d951d1c61ce679d612aa330bf946916c4fb802282a
libpmemobj-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
a7f4fc10d017785d12c618eca0227a703b11e7e2d89f3f4c8fc16188afa26bd0
libpmemobj-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
b9883c286082e87a4f9d48953ad92d5d074158a71a1d4699be165d044b6fb600
libpmemobj++-devel-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpm
534a08c1946cafdceb3afd81823bc2fc23c78f7cbe75be848ae4c480a1b44993
libpmemobj++-doc-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpm
d39e51c9f69e29b7119cc33b7c9a0096cf56f79af085c9e582ddb96354b44184
libpmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
173613ad2dc1a6366d24019f1dcf276ab1810942f7fdf3220b68cc33866e9e3f
libpmempool-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
70be05cc99ef64babf20fa1fcc0980ea20d28339ef02a93e78af182121dd4897
libpmempool-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
32bbfdf69bc4823362c256cdf4b395326d1239ca05bbaeb5c40de0729c6b8c4e
librpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
089e2693ebe7733f5effa2d7420443ff28ab4829cbcb872a5b92315b238d04a8
librpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
cc4326c2ab389c18c9756da388baf4aa335e2924fc3ac88fa941f02c76271d16
librpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
7660ae7f67e41540e0421fbfc959f65821e588e8348e1039a183fbc3f80eeb20
pmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
894f1afb6e937152a6980a230fae9210cd06c9d91e1a38eb23c89d9a498f3165
pmreorder-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
2fec02e2edf426bd5479c35d56b3e17b339d9173390e6e3be1b5576640102160
rpmemd-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
22a93397c519e9e66e037bb007698dbc706a4a25aa6cb7ed79dfd18e2e6bdf99
RLBA-2022:1944
netpbm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for netpbm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
netpbm-10.82.00-7.el8.x86_64.rpm
8720cb93f3bd6269e53e9f53aee095bd9c658891536e3a4c27e64eeee41b1322
netpbm-progs-10.82.00-7.el8.x86_64.rpm
a19db72d87f18fa35ed3217c757ef60b46df7d80449c61645ed6ed8bef2a9d96
RLBA-2022:1949
python-pillow update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pillow.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pillow-5.1.1-18.el8_5.x86_64.rpm
c3b196ec79ed44cbba9c193e5da4687349ed47692644581fa5028742c74ff5fc
RLBA-2022:1951
man-pages-overrides bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for man-pages-overrides.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
man-pages-overrides-8.6.0.0-1.el8.noarch.rpm
438eea287fbef077194471c4ee49641f682af62a0691c6fd1d8b0ab298c21f91
RLEA-2022:1957
perl:5.32 metadata for the Rocky Linux 8 module matrix (4/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
RLBA-2022:1959
scl-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for scl-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
scl-utils-2.0.2-15.el8.x86_64.rpm
f4811fcdee1d82ecef667fcb852ee1d16d2c7113b01f106e09d0657e12dd4f34
scl-utils-build-2.0.2-15.el8.x86_64.rpm
ac75a2dc62e0263cea333b700d9129a14875da4e5bc77bea3a1107d6ebfee9e7
RLBA-2022:1960
gegl04 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gegl04.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gegl04-0.4.4-7.el8.x86_64.rpm
48ae7950b7af2b4fa21076f8f1d60551a931a3a27d0260736501d8d46b0b5cfa
RLSA-2022:1961
Moderate: cairo and pixman security and bug fix update
Cairo is a 2D graphics library designed to provide high-quality display and print output.
Pixman is a pixel manipulation library for the X Window System and Cairo.
Security Fix(es):
* cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pixman, cairo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cairo is a 2D graphics library designed to provide high-quality display and print output.
Pixman is a pixel manipulation library for the X Window System and Cairo.
Security Fix(es):
* cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cairo-1.15.12-6.el8.x86_64.rpm
7fd42a923afbaebcff03073c443235685e4094ef7eab8ca48c8043d198b92673
cairo-devel-1.15.12-6.el8.x86_64.rpm
438d6899db8d75f02ae86797acdf9e157a38814214b60a8c8a43a2174100fec1
cairo-gobject-1.15.12-6.el8.x86_64.rpm
6828a209878746c228c9902843e0519407eb9cb8a3d204346a68833e9321ce8a
cairo-gobject-devel-1.15.12-6.el8.x86_64.rpm
9fa96b78a8a7f6114db6763d6f1f83d3a435ea0b2175914e79ec4fb70ae55414
pixman-0.38.4-2.el8.x86_64.rpm
fba43060573303c7e5d8bf3f65997ab720d2935be48a2910b778ee8e84f5fcc0
pixman-devel-0.38.4-2.el8.x86_64.rpm
07460cc1404bd085931f245340cebd640b41c1fe8596e9683a1167745a18bfc5
RLEA-2022:1963
new module: log4j:2
This enhancement update adds the log4j:2 module to Rocky Linux 8.
(BZ#1937468)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jctools, log4j, disruptor.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the log4j:2 module to Rocky Linux 8.
(BZ#1937468)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__log4j
disruptor-3.4.4-2.module+el8.6.0+895+381d2531.noarch.rpm
6809ec19964e8ee53bf70611ff4096cd7e87c5728f84e9d179219188077d3366
jctools-3.3.0-3.module+el8.6.0+895+381d2531.noarch.rpm
4bea6a0d79011efd19bb2d988bcccb04d5701625eadf5f29d0ce32bc3861f3e7
log4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpm
b1620800770b3aeaff9e53cc7a4fb9041956028dbe2d3efae1157b87b162448c
log4j-jcl-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpm
f6205522d8453908ed1ae3e2f046942626abe705531f0b7c2d67783c6502f794
log4j-slf4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpm
4c36fcf064876fc64b9f5ae9faee4474b2e30e6031af1f6bbd0f37a4da306284
RLSA-2022:1968
Moderate: libsndfile security update
libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV.
Security Fix(es):
* libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libsndfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV.
Security Fix(es):
* libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libsndfile-1.0.28-12.el8.x86_64.rpm
5e58b32e9b028c3abd837883fbe4ba64dafdd491153e5bcf9c347029a44e3be6
RLBA-2022:1969
dpdk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dpdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dpdk-21.11-1.el8.x86_64.rpm
e9f76a1c2e6181c3b851cf29ac60c18b6fbecca07a5708e86d2634bc847f5d94
dpdk-devel-21.11-1.el8.x86_64.rpm
d4bc8c11993f1481b73bc15807a1cddcec1ab21c93d13697aaf4a4121d8c166a
dpdk-doc-21.11-1.el8.noarch.rpm
eaf9c1a9cf87af38ac1c355969c6f845cfcb83a6e7abdd92962afb5cc41762d7
dpdk-tools-21.11-1.el8.x86_64.rpm
ad3014357acdc36548f17ef3005719bb4f7dba1d64b2acdf7a3543c142ee7630
RLBA-2022:2141
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* Udica crashes when processing inspect file without capabilities (BZ#2077472)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* Udica crashes when processing inspect file without capabilities (BZ#2077472)
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm
0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm
c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b
RLSA-2022:2143
Important: container-tools:3.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* psgo: Privilege escalation in 'podman top' (CVE-2022-1227)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* psgo: Privilege escalation in 'podman top' (CVE-2022-1227)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLBA-2022:2144
container-tools:4.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Udica crashes when processing inspect file without capabilities (BZ#2077474)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Udica crashes when processing inspect file without capabilities (BZ#2077474)
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm
0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm
c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b
RLSA-2022:2200
Important: .NET 5.0 security, bug fix, and enhancement update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17.
Security Fix(es):
* dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267)
* dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117)
* dotnet: parsing HTML causes Denial of Service (CVE-2022-29145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dotnet5.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17.
Security Fix(es):
* dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267)
* dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117)
* dotnet: parsing HTML causes Denial of Service (CVE-2022-29145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a
aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5
dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7
dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm
7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b
dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85
dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm
b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420
dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325
dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm
2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969
RLSA-2022:2234
Important: subversion:1.10 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
dc6f52adf8b10fd6b240c72b5ea1d62e0bbbe3d5bcc47380339117fc1953eb3f
subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
802bbeaf38639b1e42096fab308cf1bf8efe3df3a1b3c3720b7a5ac3939b7265
subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
e5c5a44c338f73bb0445575d27aef6a4b1a7d1ae1f7246b7bce10b6fe5782f47
subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
152d3eccdd9928c4d97f5a47117cbd0d224ae5b7c9886e3cb0414f645ad85d82
subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm
173765bd35da01cbad3cba259410b0fe81e32cfe2efb3795e435403fdf4029e5
subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
1837382796e426c99566575486d20468e5e08d54a9feec23a37f37664c105dd1
subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
c019433f83ba3f54fb215c6f1a57e182c582f2f7b5aba6659278fb65bf8216cd
subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
a181eeabc6eb2ac08c26cea039b8776703ecd01ee9af67eeddeef97c3765418d
RLSA-2022:4796
Important: nodejs:16 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* npm: npm ci succeeds when package-lock.json doesn't match package.json (CVE-2021-43616)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* npm: npm ci succeeds when package-lock.json doesn't match package.json (CVE-2021-43616)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm
b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75
RLSA-2022:4798
Important: maven:3.5 security update
The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven.
Security Fix(es):
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven.
Security Fix(es):
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
aopalliance-1.0-17.module+el8.6.0+843+5a13dac3.noarch.rpm
645e5fcc65f5ce6a5e7c644af9aab686e5168eb67dfd41299b949b73980385fe
apache-commons-cli-1.4-4.module+el8.6.0+843+5a13dac3.noarch.rpm
9cf097d54e58ae1b8fd93d9b45f21f4af852b93f03e628386bcd0c88fc09745b
apache-commons-codec-1.11-3.module+el8.6.0+843+5a13dac3.noarch.rpm
605d7fd276cc1605f057689518327458da2d3e3bbc9ca913a6c22523af7e05f7
apache-commons-io-2.6-3.module+el8.6.0+843+5a13dac3.noarch.rpm
c150457c26d08f11ab2742a26b5603ac0421309db274d1fb9291609513952291
apache-commons-lang3-3.7-3.module+el8.6.0+843+5a13dac3.noarch.rpm
0bec3fe86916400b445c090e2ac59fa15e67b85634d5d19db6be1bcfa35f53cc
apache-commons-logging-1.2-13.module+el8.3.0+133+b8b54b58.noarch.rpm
d1ce83ba6cb3e4a97216feb51b8f37d3bbd6d163343165ff58cc15cb5340f14a
atinject-1-28.20100611svn86.module+el8.6.0+843+5a13dac3.noarch.rpm
860817f72225f53de2c34d05aec257a5d30619b2a66ac51d3e72c64b362a950b
cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm
e8d491fba0eb58a0c39d874c349f74791897d4081e994974882c75018a06fdb3
geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm
2816206b8a4525c74be3dd28945359d43c37633863851e98787e4c7785c009fc
glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpm
17afe1f510bcc20dd864bd1d4ce9ef4ba137175ba3c1741f9006e00dbd48ec24
google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpm
c8b1e0ebe1f806d22ee98e61211e3765171361d54c8aa43d237c47756d4413f3
guava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm
e3dbd918aa5734109e5025fcff46aa6cd3a7d681c15b47b3839ccd014318b579
hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpm
f9013313a092e35684dbfa9b11557e1603fe59feaa126da2cf2915c103413541
httpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm
7c7e53a1beada7fd2cfdae8f50acedd99d62bb3f92ee4cce8c7e8bd8e1e9f520
httpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm
6254441dd7d139fca7bf71c3efd602ae15c8d4ca4c448d26de3807a94f2250cd
jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpm
86a01e3eab084e992222cf94a07c1591b41cf818904e7472d549b3d9f4fd2efa
jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm
493532237bdca6b7839c897c1a96cdbe6f954348baf86f9e61abaab5b1ce1b07
jcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm
ec223715ffea5512ef05f8360522ec30d7052669260bb9c86ae92f6710aa4168
jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm
d53adb7c5604a6c4b463fd8356426c62a0e287bbc2cfbae244eb30eb68ed108c
maven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm
8d0715634168a0feead5c2200b92f87700932e0482c656fd6d46804779e1cbf3
maven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm
53d03a2e69c1418fda008f86abe12366522fc7db4a6460e02364f332f8aa78d5
maven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
15ca161ef8ce0b64553cc1e9a6c08c7c52233756722ab7b02b71443b22d76bb5
maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
183df0d4f71c063a2120049da9cf587068a3c4afd57f31edbdab23d2cd42f87b
maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
72909fd412a649f39c80a3aeac0785ba97622f59d0c490f5784bea61d6f9f22e
maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
890e312f32d987ad806ead574436896a3fdb69cc4c701d10a8a5cdeed4f335f0
maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
d62eccdd6992ca5b358305ab16e27b68f98b9cf3b8b3d31b860dc1afe772d4c0
maven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm
fe818f18b5bbfea7d1d477e35e8207ec850c4303dc4bdfd97f1c4fd5a788107c
maven-shared-utils-3.2.1-0.2.module+el8.6.0+975+c0ed2db8.noarch.rpm
bf6863b80c9ca556ea586da41e97507d8060bbcb55e29d709197c473079ceb7e
maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm
0348dc46c7235cbdb54e577a5c7e3bf67bf3990c5b5224da5a8dd810581b0aa9
maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm
4c51162d25acfb25c357e2b78536d0439b499a894e89bd888970ae2ae7952e6b
maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm
7c235cf78744f6520a54c1ec8eea4e9f8adeb990d58958f07f1ffa16951fed0e
maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm
97503c4b45752870defade5f80b65af78a64e63bdb7ec31c7131f9478aaedb0e
plexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm
92f2c95dd389e6f28bdb5336069b9843e2d77e93561cd94114e795b648669963
plexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm
86ef908e4b8b5f6b75d79fb71c9e941d77070240f9f520da09a8f02f76d68c55
plexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm
4df6c9152b37c8c6f3242626c80b8138dbc2dcc2c16e362e6b7f9bd5fc011e1d
plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpm
ea5b1b2a881c5ae1c82442c1642dbd21de75bf72f84186f1a04e06af74491791
plexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpm
3b64df7a26462444ef46b693adf0d9d4aa4022a17cacc936d2a76fed0c9466b4
plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpm
bd6542f8ea1aa47b0b5b280828f4828dada693a8ecfe1e9eb55a1ebc300f75ad
sisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm
a417c7920d1c835b4342cf7f278800e79764ca5337c6d42e25e06f4484e6c98a
sisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm
a3be327bd921aab3011f3e1aa3639e45ef82c9fe97e29416851ef69300d9f4c4
rocky-linux-8-x86-64-appstream-rpms__scala
jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpm
71f32b6fe08073c78cb2584b57563d05c063c8dfc6a71be37f424c67daf95938
rocky-linux-8-x86-64-appstream-rpms__pki-deps
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
RLSA-2022:4797
Important: maven:3.6 security update
The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven.
Security Fix(es):
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven.
Security Fix(es):
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm
7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091
apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm
d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8
apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm
c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb
apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm
aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6
apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm
5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8
atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm
38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04
cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2
geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm
9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb
google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm
afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e
guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb
httpcomponents-client-4.5.10-4.module+el8.6.0+844+4401f2ed.noarch.rpm
2a57d054836c857182ff749dc7be558ee1a5f07b00522cae3cf3f3d87c914217
httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm
0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8
jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm
72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393
jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb
jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8
jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm
f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff
maven-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
02dcbeb9256307b3d4e05b330cc1b19315500c03a4309b032db1a7ee3f4b5407
maven-lib-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
ece3ed809322707652d98d21a587efcda7cd2dd195adc5eac9000510ad645087
maven-openjdk11-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
312291f926d1ff4969ce01835823bbe596fa6eeb2f9d678e4855fdb051961d30
maven-openjdk17-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
41a59d80aa9b8b60c4c5e2daba8b2ebcc4ae6d33583379342ff21d924a0cfd88
maven-openjdk8-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm
93eeecde30df6567f71618ed96f9bda171f5a55ef954dd6506b467615e462913
maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm
6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf
maven-shared-utils-3.2.1-0.5.module+el8.6.0+976+839b99e9.noarch.rpm
ae89b917cc31af01690d60f23c069ed38738288b8301fedcea65ee53e9a4211c
maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91
plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm
163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68
plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm
01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0
plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm
fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08
plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm
b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e
plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm
93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de
plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm
7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5
sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm
bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf
slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm
c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a
RLSA-2022:4805
Important: postgresql:10 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (10.21).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for postgresql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (10.21).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgresql-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
a6556d962b8a4f21a234401b79b04dfaa0d5b61827325a20c8ea65f8067db498
postgresql-contrib-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
f279a2e053d7188bae25db22cd9a791bd25f458a03d74cb0628dcaa85c4db232
postgresql-docs-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
87df4cba162d789d39a9523d06ee5feb42b3c481362ca95e556b445e6e29f15e
postgresql-plperl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
cfa2703ebbe6afb8a1c428bacc45d8f2f18f153acda6fb288bc2b80bf1df5777
postgresql-plpython3-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
ddb003a769bcc194ab0b637b07ccbc91da7c739cd73fedf9ce4b73c41fc0b611
postgresql-pltcl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
d9a82d23a49cd4b229471121e55d4ff5433b91f06bda8638ba6f8354bcd366e7
postgresql-server-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
bcadbd1180ecfa672f9200bc1ff29e259e40b3b4a1fdf1a049a5fba65f51a631
postgresql-server-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
4e8fb48abd7db1afa17213b156d0e7bb3564cca215f8ae476e45b3d8114a32fb
postgresql-static-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
39857f6bcea51fd8cb8377b16ee7b095b2cc7b8b9100c16cde17f540facd1f26
postgresql-test-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
3037b8880b67dd06af7e2984029602733a3143700865544c0615bedd5cc22333
postgresql-test-rpm-macros-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
8dda3e9fef1d774bae73bf59cbf3b1c564dfe692ca7fc7cb60f0a13b7a1b6403
postgresql-upgrade-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
b72c8a51074d3e368fb33e0b20e256a73799d7cb689c40c43a6afcdcadf476a2
postgresql-upgrade-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
745351bb1da0240458daa4c71cc28bbf516c3b1067e5b344afb80c1553952c42
RLSA-2022:4807
Important: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.11).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.11).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2022:4855
Important: postgresql:13 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.7).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.7).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
postgresql-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
5f8b0f083a1c9317df2506cef87ffce359943e65029a35861574bee6915195f7
postgresql-contrib-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
bdb8007dd69d049f90a135191cec910719dbcccb2f71cda1f1ecb4cd646acbc6
postgresql-docs-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
4e69a20363fb0f37eb5d284f8d396a644c8a05b9f0f11586da2e5a95bcdf5232
postgresql-plperl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
e42432f9031923fedfe56d3931c1ad2bd0d6803b95e7514bc922f4f3a8a9e676
postgresql-plpython3-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
4e9e7590fdf7f3e7754a306ab37cc6353c94662a025f95f2121148a9e816806e
postgresql-pltcl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
93599fd463b0958889f0a13fa32d36c2541db19d0d1e894fbb8f9bf792a801a1
postgresql-server-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
491ee6cb770d191dff89adb471c3b64810e6ba80e36989a0783ec2a4717f16d5
postgresql-server-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
fb598803af7755dec0375e23b391345d57d70616fac19f6afd6bc6e70bea42a8
postgresql-static-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
ea3065316ff5a9e71a63d1d3c8f3b2fec8096d24492e157c537e2a3d28f4bcb4
postgresql-test-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
730791c8791203248f3a1f0de1f71f9d4c3af466c3cd115bbcc538b33617c8f4
postgresql-test-rpm-macros-13.7-2.module+el8.6.0+980+9caa008a.noarch.rpm
13c1e52a8405f67103c08fecaecc5aa3e3929a055ddc44f4478cf2066c51b6cb
postgresql-upgrade-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
0c989ec06bfbb47761b85d6631d13fa3150be693ec2c8e34536e7b2acf9b9a75
postgresql-upgrade-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
fc5a01ddfaf607fdf9268ab430711210612faaa36589eb71c23e6b62950c1b2b
RLSA-2022:4941
Important: subversion:1.14 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
731bbe79595f494e581798261d3910616e1bcdbae2ef7f981b215453cf5af705
python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
b9453a4cc7f514c6b5d4fc9635d55f1cf4c75dc38cb5f774719646b8d4e57001
subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
117b77bc021f04f14594b64923ba7fc5d339150c0c18bcaac03c2830da8dc238
subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
2089246938eb318f05ba38eeeb5cbba0cf766f9b1d2add194ed624c6123087f5
subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
7a0b71de12a9a00fa90c466b489c01106b0efb79cb41ff2eba7559ae09236461
subversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm
911dd1adbc2b2cac43e6114aadfc7a825121a1e4211043c26c97549ab1495e75
subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
e08caf8753168202fcb5ed6b9c38e8bb3897bfa19054afb1746cd7ea65d6fd4b
subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
2f746f1042536d1ba89f58dfb7530418fc05f4c86af692b53a40239cb12a83a2
subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
af4c11a20b867799fde5ed6bf4dfb553c6904e4e9c46a1824273bb52354920a0
RLEA-2022:5139
nodejs:12 bug fix and enhancement update
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm
40c2bd9fc581b3e1911cff31c4448efb063ee0501c11a65ac2d28f1382c54edd
nodejs-devel-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm
0dbea4843e50404baf084e6e5e5e92f5b880df36cd1f7fa26a530601ddb6ff96
nodejs-docs-12.22.12-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
6198e9169a86decacad936f3ceb4c2450717591622367d9718028aa44e938064
nodejs-full-i18n-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm
dcb7739c0ed9048c9568bfb84a0d3411b019eef17458a5129d54b71ca7e69587
nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm
69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
npm-6.14.16-1.12.22.12.1.module+el8.6.0+982+9fdca2d4.x86_64.rpm
144156798b2195a01a827128f54a3e69a1162fbf8a6a56255c8fe4f115ecf1d2
RLSA-2022:5163
Low: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy NULL pointer dereference (CVE-2020-13950)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy NULL pointer dereference (CVE-2020-13950)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLBA-2022:5325
postgresql-odbc bug fix and enhancement update
The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity).
Bug Fix(es) and Enhancement(s):
* postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for postgresql-odbc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity).
Bug Fix(es) and Enhancement(s):
* postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179)
rocky-linux-8-x86-64-appstream-rpms
postgresql-odbc-10.03.0000-3.el8_6.x86_64.rpm
f32a46807101023fc6d8f5287a3bf75409ee0a2ed2e0107399dbf2f0247fd6ec
postgresql-odbc-tests-10.03.0000-3.el8_6.x86_64.rpm
42395c2c9708007d6b9e4a81d12e39675d5001010f672d60bcb2c7a116f2684e
RLSA-2022:5326
Low: compat-openssl10 security update
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries.
Security Fix(es):
* compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for compat-openssl10.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries.
Security Fix(es):
* compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
compat-openssl10-1.0.2o-4.el8_6.x86_64.rpm
598a90725474db12773498e0622b9370467f94e418f0fbbeed19788c425cff30
RLBA-2022:5329
cheese bug fix and enhancement update
Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects.
Bug Fix(es) and Enhancement(s):
* [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cheese.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects.
Bug Fix(es) and Enhancement(s):
* [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028)
rocky-linux-8-x86-64-appstream-rpms
cheese-3.28.0-4.el8_6.x86_64.rpm
1cd8f7b5f5f9888477b2bcefcb93b5be066a6590b2c641568c3f6181b6285412
cheese-libs-3.28.0-4.el8_6.x86_64.rpm
dd228cd48876d9151169a9ea0a1a7038423436c278231b7f41c1acc0fd374499
RLSA-2022:5331
Moderate: libinput security update
libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices.
Security Fix(es):
* libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libinput.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices.
Security Fix(es):
* libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libinput-1.16.3-3.el8_6.x86_64.rpm
5448d678b4816353fcde30f677f369b1ac64b98b4f38f70bb834a02c47a65a3f
libinput-utils-1.16.3-3.el8_6.x86_64.rpm
d8bca0d5137448050cde5c77f9b5ab2ce245d586df2c2d05b7eb74710f9cf7a2
RLSA-2022:5338
Moderate: ruby:2.6 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374)
Security Fix(es):
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374)
Security Fix(es):
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm
487b8c46d410303fb33e9b4e4e4ca513c93dd6c1e32fff807b4264b4d58096a4
ruby-devel-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm
87986e65d2b0c62bd3a83a510c2d0449c400d26115a2ceac1032d7d47e4fba94
ruby-doc-2.6.10-109.module+el8.6.0+988+8031c193.noarch.rpm
9d8843b155706338029b8ff3ac04785aac8213b5a79e2ed4ee003a95909a2a62
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bigdecimal-1.4.1-109.module+el8.6.0+988+8031c193.x86_64.rpm
10b9574c4f8bca0abe496a931b0aa5dd387139008278ad0a5da143a5682b57d2
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-bundler-1.17.2-109.module+el8.6.0+988+8031c193.noarch.rpm
314a44f0c44c7f8727ccd9fc45316c26e072302e5671e2dc845b25cc5b5d9fbd
rubygem-did_you_mean-1.3.0-109.module+el8.6.0+988+8031c193.noarch.rpm
ca729aa54be83479c4df5caeeda25008e6e80daed2ed60d7b410977fa2feb64d
rubygem-io-console-0.4.7-109.module+el8.6.0+988+8031c193.x86_64.rpm
f7c851c71db19724876afe804f48dc7a658bd9614199e0bf7db956cbd0b55210
rubygem-irb-1.0.0-109.module+el8.6.0+988+8031c193.noarch.rpm
c9fc4170a5f613c975fef2607fa077aa227b8c417ba257e1ec09900fba95b757
rubygem-json-2.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm
5287ad497584609c9389f3b61868ce2e0d6352585cf05a9225349665664832c1
rubygem-minitest-5.11.3-109.module+el8.6.0+988+8031c193.noarch.rpm
ed7fb2fc02330152e66a71076b3a24d830b27cbcd0b792d9fd4b7960cd882d1c
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm
2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a
rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm
338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197
rubygem-net-telnet-0.2.0-109.module+el8.6.0+988+8031c193.noarch.rpm
79a6b421c0f9cb9e060bb6e40e12edd46bb52a312f9921cd368989c28561a7a6
rubygem-openssl-2.1.2-109.module+el8.6.0+988+8031c193.x86_64.rpm
130c794fe5120151946cab09649d7a4741893b0bcf07050479ebe6b2e76fc189
rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm
b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df
rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm
0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372
rubygem-power_assert-1.1.3-109.module+el8.6.0+988+8031c193.noarch.rpm
c84165bf53d6cd0bdba047786b91217c2f6ca8639566ed99a0a6bc37627ae4a3
rubygem-psych-3.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm
36de3362ddb04310b4ea3913105ac2819751c9e4eb68e5ac0056416f32ed78e4
rubygem-rake-12.3.3-109.module+el8.6.0+988+8031c193.noarch.rpm
4a45ad59ca4bd913c1e61aa1e9a8a9fc6fd239c162efbece0726593d270e0911
rubygem-rdoc-6.1.2.1-109.module+el8.6.0+988+8031c193.noarch.rpm
8d36041ac05e9f0cbe18cd425903a12368746681fcf6cc04146e04aad08dbff4
rubygems-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm
317ed3b2c5073ce0716025f4c43d611aaf0061c555f3bf701a531b0c6a10e893
rubygems-devel-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm
45b6e38e8e4165a994441054a1ce6223a9106dd561b97e2e09164bc5ee9188e5
rubygem-test-unit-3.2.9-109.module+el8.6.0+988+8031c193.noarch.rpm
65d84c800f67dfd01786d08e5734268cc8bf2688a0d4eef2846175b5185d7968
rubygem-xmlrpc-0.3.0-109.module+el8.6.0+988+8031c193.noarch.rpm
0114f18dc8974397c880851b63e25738ba31dbace6c3cf2fcc0a0ecc7bd83c5c
ruby-libs-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm
69cf057803c2bfec15ce1a6c6916bd5dc1323dc64de13345603d5c061df8a1ef
RLSA-2022:5467
Important: php:7.4 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLSA-2022:5468
Important: php:8.0 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm
0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm
0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
RLSA-2022:5526
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: DoS when processing gopher server responses (CVE-2021-46784)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: DoS when processing gopher server responses (CVE-2021-46784)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm
7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a
RLSA-2022:5779
Moderate: ruby:2.5 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm
2dadb763214aaa0e2d5a932d0b2be42279f97080c8a066588d9f8a4438284ba9
ruby-devel-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm
63ad7a877a816b1ee0942047dbcbd71f9b52a383c9c7b5085700a830aea59c97
ruby-doc-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpm
596396ef464cb584fbcfbcfedce7fb181a7edf989a25279d6605766a4defca8b
rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587
rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm
83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57
rubygem-bigdecimal-1.3.4-110.module+el8.6.0+992+fc951c18.x86_64.rpm
fbdd558fceda95c75edc0fb5bb1d7ddf9e063c30d5bbdc1f6e2e41182ee85924
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm
35b1eb070daa09c0d94dfb8309d9246462588237b6ad7d097d09c3ff407d096e
rubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm
276974bce2b60db0a7af8e3c22f2ed904de58b105b059402ddb8011f5fde1cc4
rubygem-did_you_mean-1.2.0-110.module+el8.6.0+992+fc951c18.noarch.rpm
491c636d4f51e31158330ad61ceb6276fd981c445cb89c2f4d62c5553e27a61e
rubygem-io-console-0.4.6-110.module+el8.6.0+992+fc951c18.x86_64.rpm
721026e35dc187724f15d31f30af92dfcf50f54eb6e1bd189642fa138bf073db
rubygem-json-2.1.0-110.module+el8.6.0+992+fc951c18.x86_64.rpm
c2c099d75145af293c83fa67f3467ed5c4473f5704c0db36b61b139d90a9981a
rubygem-minitest-5.10.3-110.module+el8.6.0+992+fc951c18.noarch.rpm
cae51d28a8aecd4d0367f6c9d4f150cced88a506b9c9e514a74ad6bce0399211
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm
43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92
rubygem-net-telnet-0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm
777398eda3736f19fd3f0dc05974980a2e181f5724125b572205c7a157b4e459
rubygem-openssl-2.1.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm
cf100363a6bc1926d83ac74ce8a36935a4bfe376e0fb27a1d65f24add669b9ca
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
rubygem-power_assert-1.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm
82029ec23ba40ce9858ae97a06b22f1f119c4940f9a9af1505881a9bb5ad6d7d
rubygem-psych-3.0.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm
6c5c3b67723e03a280fde12f40f093877a67a8938e46f1f33ee3267006e5a57f
rubygem-rake-12.3.3-110.module+el8.6.0+992+fc951c18.noarch.rpm
74c6e849df46135467e721faa7b1e77e2d8ea5665fc131700cb7ce3d51110dc0
rubygem-rdoc-6.0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm
6129045ecc2262ad1810376a02c3494b6a4a9a8d5c36277dba39c23f0ba04e4a
rubygems-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm
1ed8de448e553d450c50b9b9d925349bacdd708c4840fa08be7af91d9e5f8f5d
rubygems-devel-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm
f19cf189dbb4d398d270ce6b7540cb3ece994eaacdd900be79a35e53865999de
rubygem-test-unit-3.2.7-110.module+el8.6.0+992+fc951c18.noarch.rpm
da1841c378881a90a4ea4c7ec8d19491a7ebfd49335e704e92c22724f5e426d4
rubygem-xmlrpc-0.3.0-110.module+el8.6.0+992+fc951c18.noarch.rpm
17dd4fdfa39afd9488c3620550b12ece5e1823503e4aad9a1e4ec19bbf592bed
ruby-irb-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpm
2a82dc891c1e41d6c9b8a02cae648259d2a140d3a33be70a3ba91eb916287f4a
ruby-libs-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm
1bca30a5e33cc4d59446068b15c4a6938c44057312cdb0b531f6c100309d523f
RLSA-2022:5821
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206)
* QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207)
* QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353)
* QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103)
* Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242)
* Remove upstream-only devices from the qemu-kvm binary (BZ#2077928)
* When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030)
* Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415)
Enhancement(s):
* Allow memory prealloc from multiple threads (BZ#2075569)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206)
* QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207)
* QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353)
* QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103)
* Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242)
* Remove upstream-only devices from the qemu-kvm binary (BZ#2077928)
* When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030)
* Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415)
Enhancement(s):
* Allow memory prealloc from multiple threads (BZ#2075569)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm
b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm
eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
RLBA-2022:5824
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fixes:
* error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594)
* Work on container-tools for Rocky Linux8.7.0 (BZ#2087742)
* Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968)
* podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352)
* ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049)
* catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143)
* symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627)
* Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fixes:
* error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594)
* Work on container-tools for Rocky Linux8.7.0 (BZ#2087742)
* Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968)
* podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352)
* ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049)
* catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143)
* symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627)
* Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295)
rocky-linux-8-x86-64-appstream-rpms__container-tools
aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
8fb2669180d717578f5407e383babf56b298d037148cf7d9c0bd7f819a707601
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
a0a9eb3a59768b77fa3790a555c1fb3f3b221258a5703418c0cd05b65245b4c9
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
5053642b22732a14803ee43bcb11874bb3771e7bc9a4ddac6f46ffdd3543a154
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm
0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm
0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b
RLSA-2022:5826
Moderate: mariadb:10.5 security, bug fix, and enhancement update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Don't use less parallelism if not necessary (BZ#2096934)
* Links in galera package description are bad (BZ#2096935)
* [Tracker] Rebase to Galera 26.4.11 (BZ#2096936)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Don't use less parallelism if not necessary (BZ#2096934)
* Links in galera package description are bad (BZ#2096935)
* [Tracker] Rebase to Galera 26.4.11 (BZ#2096936)
rocky-linux-8-x86-64-appstream-rpms__mariadb
galera-26.4.11-1.module+el8.6.0+995+5ac2a483.x86_64.rpm
6c1369187a1133e19dec341e7099ea8bf32bc734100484c6741278676af0e239
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
mariadb-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
47eb162bd890e447dd3d4a0fb8ec38beeb0a1781fa625e38a13f0d45b9b816cb
mariadb-backup-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
520a147d559446a5bc70a2c80a2b68d22152d14832d174a9173c497ffd1569a5
mariadb-common-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
f017c78532673f9532d2d7838729fc79d2abd947f2fbbd4b975426a2bc8c341f
mariadb-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
556af926669474ea364941ba9011038a164ae7deba794a86d56700e37ae043a7
mariadb-embedded-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
88e2d30bef155c2ecee7a54fb42b172720fa505c53a671e011156277c224f9e0
mariadb-embedded-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
c33d67dca5240eabd8d936108e70067cbb8256d9c1cc16e698592ee0e2477b97
mariadb-errmsg-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
47efc58763cfa51e38884334ba62d8229f0d0665b478e3931782504aa5f3bc68
mariadb-gssapi-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
9cfc25a45a1ddd76a297284051b1c1190de192e49320a82af5e97ca7db0e211f
mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
cb1e34b23abf93b073d095feaf75dbdda7b39bb843df2695eda6a10c94402df8
mariadb-pam-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
6f8686a5ea55e7ae295cb251db7970900c8bfceb3bf4c9eae7594d74d20f5cdf
mariadb-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
b4aa22b0c0013875dc2bcb7102839c2bd62e6339028c069f8d8a51257d6024f0
mariadb-server-galera-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
98432d1dd9dac2557f64f2b412cec759d9e8d984fbfce194525a6efcb88babbf
mariadb-server-utils-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
7a6fb0550f77340846dc5043895c5f0943607aa3da61662222adbf5b14d8a25a
mariadb-test-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
00f705e37e4b2ee57e7bb0e4ee164bf02c0284c2037aafb112f075fdd34439b8
RLSA-2022:6158
Moderate: php:7.4 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLEA-2022:6440
nss and nspr bug fix and enhancement update
Network Security Services (NSS) is a set of libraries designed to support the
cross-platform development of security-enabled client and server applications.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI
operating system facilities.
Bug Fix(es) and Enhancement(s):
* Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062)
* Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470)
* certmonger startup very slow using default NSS sqlite database backend (BZ#2097900)
* selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641)
* allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642)
* Need to be able to run self-tests at will programmatically (BZ#2099759)
* NSS segfaults still in client auth path. (BZ#2105007)
* ipsec --initnss timeouts probably due to entropy. (BZ#2121486)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nspr, nss.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the
cross-platform development of security-enabled client and server applications.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI
operating system facilities.
Bug Fix(es) and Enhancement(s):
* Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062)
* Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470)
* certmonger startup very slow using default NSS sqlite database backend (BZ#2097900)
* selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641)
* allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642)
* Need to be able to run self-tests at will programmatically (BZ#2099759)
* NSS segfaults still in client auth path. (BZ#2105007)
* ipsec --initnss timeouts probably due to entropy. (BZ#2121486)
rocky-linux-8-x86-64-appstream-rpms
nss-3.79.0-10.el8_6.x86_64.rpm
684862bc5ffd7c2f1fb4e3d80f02a05807655af5f218eb8a71f0ae541f1f38d0
nspr-devel-4.34.0-3.el8_6.x86_64.rpm
e5bfe96520798c594dbdd7506e57c5298e213e3a061559880feb30badacb0118
nspr-4.34.0-3.el8_6.x86_64.rpm
1543f75ee941cc74ec0e291eeb19eb2ecfa34491efa46059d78874418e9aae9e
nss-devel-3.79.0-10.el8_6.x86_64.rpm
ab6571733b23403211aa240ed384de6657911e94144ce724b3625f9e2eafe5cd
nss-softokn-3.79.0-10.el8_6.x86_64.rpm
8f4702dc979720438b3ca338b5215f0ec7b017443c3a2229aa71f84ce6cfe734
nss-softokn-devel-3.79.0-10.el8_6.x86_64.rpm
312d074dd3bfe576a38f02743248b050e86211e4d82dd5e0c5a7e73a6cab28a9
nss-softokn-freebl-3.79.0-10.el8_6.x86_64.rpm
93e78d2bfa30aaa30402f15bb1a29c067a6bc628353eca60453d33fff73527fa
nss-softokn-freebl-devel-3.79.0-10.el8_6.x86_64.rpm
4dcb1e4c0c555438b8b104b27e868ab458ee12bbd29f886d362eb9fecc56e4a5
nss-sysinit-3.79.0-10.el8_6.x86_64.rpm
f81f9bedbc71db1b05c23f436b16a20bb898e02f4afbb4ae30142becfda270a3
nss-tools-3.79.0-10.el8_6.x86_64.rpm
de6441d276507c10bb16f1cd2d3bd0cefffecfe0afb883037da27967a9f02c78
nss-util-3.79.0-10.el8_6.x86_64.rpm
4ed196ef6fa5a607f63430ec3e0822565f8a9dc8206ed99142b405eeba898adc
nss-util-devel-3.79.0-10.el8_6.x86_64.rpm
87c06a950c7c6e78c9eec58822d246a793e52615e9db229244efc53b66eeeb3e
RLBA-2022:6441
mysql-selinux bug fix and enhancement update
mysql-selinux package holds SELinux rules for the mariadb and mysql modules.
Bug Fix(es) and Enhancement(s):
* SELinux is preventing wsrep_sst_rsync getattr of /usr/bin/hostname (BZ#2096279)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mysql-selinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
mysql-selinux package holds SELinux rules for the mariadb and mysql modules.
Bug Fix(es) and Enhancement(s):
* SELinux is preventing wsrep_sst_rsync getattr of /usr/bin/hostname (BZ#2096279)
rocky-linux-8-x86-64-appstream-rpms
mysql-selinux-1.0.5-1.el8_6.noarch.rpm
59f929c5d0c2e7f3f7e230d6eb9b0c9b13acf9642e4480b4337af56cf8b336fe
RLSA-2022:6443
Moderate: mariadb:10.3 security and bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083)
* mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085)
* mariadb: server crash in Item_args::walk_args (CVE-2022-32087)
* mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083)
* mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085)
* mariadb: server crash in Item_args::walk_args (CVE-2022-32087)
* mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075)
rocky-linux-8-x86-64-appstream-rpms__mariadb
galera-25.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
2be577e24b7e4146b38502688892f31ba8155f3d438f5a92f5a85f0fa7851036
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
mariadb-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
197703483ce3f21c79732f53810f03df7c0c66092e2b3f6ebac1f8162fe5dd28
mariadb-backup-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
2d03c5141c3070e4bd6ec2a8f4700628b1748db93fe5672f80b8ab153eb0658b
mariadb-common-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
8b149e91c59d3b25245dd670c5b194725e74926ccc3a20291d5266593075463a
mariadb-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
f0db442d7effcc5c6cbfa80aa872c9c5be209461ff14eac63656d37c62428034
mariadb-embedded-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
69a13127d202418e1d44b7a86a3e2e6aba855ef254f5cfae2fb0f1cf37ef3832
mariadb-embedded-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
b607add53a12bab242b8c6d4e202ba0f4cd913e1b9c9910e9d3bac353d992dee
mariadb-errmsg-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
add7dbf8fffba3d45af1ac1b1dbdc871c8816cfa0ce05643b7d4e2d9bb6d50b0
mariadb-gssapi-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
e21b0e182700d9b999634937b53ae7528d72c2b4f02b16e8b37c466110ac81a4
mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
6ad4255e0c08e2a3bc03e37fc3edbf0fe41a06ce6bc93c6938c3426ad9c246f9
mariadb-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
fd385abfac5bd7e60ed92808d09ab95f7a04533852a81faec7cb79d938c9d941
mariadb-server-galera-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
ae9a8c3f42acda894da8c5db9e83658028e99fa19473522291c49ee085bfd4e1
mariadb-server-utils-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
2f9999145d8b2fd0ce3150e61c6bebc0055b8c0c56e7165907fcc43a926b7a10
mariadb-test-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
58886712c7b405e6e25f6f5f3aec2f63464bfce745b87ebf3a893fd0886267d5
RLBA-2022:6446
virt:rhel and virt-devel:rhel bug fix and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fixes:
* swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568)
* swtpm_localca: Test for available issuercert before creating CA (BZ#2109987)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fixes:
* swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568)
* swtpm_localca: Test for available issuercert before creating CA (BZ#2109987)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm
b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm
eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
RLSA-2022:6447
Moderate: ruby:2.7 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424)
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424)
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm
f2f45642bf7f06a97f1837a99723bdf345f8cf0d42a86ba4c2abebf283e5359a
ruby-default-gems-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpm
946f3f97abe1043baeb20c0a8ec924bc61b0e49291b0268f1ad9ebb63a1109dd
ruby-devel-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm
d7f1677bef739a83801cb34b8cb531783273bffa871791c486245c24c80d4d69
ruby-doc-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpm
579c36711696058bd856ded4f64cb5fcf503f3ae8644ba42de9ddfa48ac5ba7f
rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f
rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939
rubygem-bigdecimal-2.0.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm
27064fe03f90f11b184ddd4d4f1d6ce9d8e51646562bd5e3a90c85d2df102dd8
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-bundler-2.2.24-138.module+el8.6.0+1001+b5678180.noarch.rpm
3fc4e371da55358a09ea6f0e5b6ed0dfcc5b60eea88257064740becf88e85887
rubygem-io-console-0.5.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm
2522f826d07e50f4573151caee2cba099b4a72ebc045ec4d268c1b25bbb64c66
rubygem-irb-1.2.6-138.module+el8.6.0+1001+b5678180.noarch.rpm
f5de4c68458146f77746b2c54f1d3511db9649247a0509b93fc405c90043e94e
rubygem-json-2.3.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm
4500a55dd4c62c954660301397d40e6f25634754290fa760657345fc6e212961
rubygem-minitest-5.13.0-138.module+el8.6.0+1001+b5678180.noarch.rpm
07ea22986bb44e59e068d3072dff2c0e00283df3c9200797e73bf0b79bf25c0b
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm
5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62
rubygem-net-telnet-0.2.0-138.module+el8.6.0+1001+b5678180.noarch.rpm
c822b6dc4af76f61345acd67c7fef17fe33f713721e4777066455b87987488a3
rubygem-openssl-2.1.3-138.module+el8.6.0+1001+b5678180.x86_64.rpm
5427c2eed2ff85bb70f1c49c40faba028ec65a893e3aac7fa9debd97a5b7dee6
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm
a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822
rubygem-power_assert-1.1.7-138.module+el8.6.0+1001+b5678180.noarch.rpm
b209c9c0c9b782f49af94fa2235e2cd1c3cb29cbcac5feaf2cbd59f2abcf7488
rubygem-psych-3.1.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm
30f5559c86ab32c6316a499f02118c9ecb437389a2040c323891fc60761c85fd
rubygem-rake-13.0.1-138.module+el8.6.0+1001+b5678180.noarch.rpm
0ac0cb168c5a0622b166259c5f0fdf19d0fe017d5f582db1dfb5925972eca0f2
rubygem-rdoc-6.2.1.1-138.module+el8.6.0+1001+b5678180.noarch.rpm
c65ba40b347f7a15e64b79f71b1f1c8835be2c743e236142ac990d0682b06d35
rubygems-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm
388bdcba6820a3d09cda706b4296a1126cbbd464f7c8097390bc9b2675ded729
rubygems-devel-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm
7abd21c3882e5a577f6ebeef3c69598734c4b87c35e19b5bb7177383dec65f36
rubygem-test-unit-3.3.4-138.module+el8.6.0+1001+b5678180.noarch.rpm
913327e6b26f845a37ce3de81c1f00bd3141cba563c1bc82dc2ec347121b1595
rubygem-xmlrpc-0.3.0-138.module+el8.6.0+1001+b5678180.noarch.rpm
3fa5f6aaa2d8e47f2c6a76037399c71a2f53bbbed10f29c15c0adaddbc186bc2
ruby-libs-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm
ca8a92b98fb7f6fe89556d2c3e76e9e146118a0b9bcd622d6a938d3feb34ba5d
RLSA-2022:6448
Moderate: nodejs:14 security and bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
* nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)
* nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)
* nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)
* got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:14/nodejs: rebase to latest upstream release (BZ#2106367)
* nodejs:14/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111417)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
* nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)
* nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)
* nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)
* got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:14/nodejs: rebase to latest upstream release (BZ#2106367)
* nodejs:14/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111417)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm
55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
RLSA-2022:6449
Moderate: nodejs:16 security and bug fix update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
* nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)
* nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)
* nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)
* got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:16/nodejs: rebase to latest upstream release (BZ#2106369)
* nodejs:16/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111416)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
* nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)
* nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)
* nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)
* got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:16/nodejs: rebase to latest upstream release (BZ#2106369)
* nodejs:16/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111416)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm
55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642
nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm
b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75
RLSA-2022:6450
Moderate: ruby:3.0 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431)
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
* Ruby: Double free in Regexp compilation (CVE-2022-28738)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431)
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
* Ruby: Double free in Regexp compilation (CVE-2022-28738)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981)
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
f15e2cb62f5089241b7c0d15d302850e6d62b29fd2baf95e4969d68291fe69a4
ruby-default-gems-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
dc9d3a0c9c2b36bc932f04775c2f0f8c0ef8e75d59a1203cddc700a70ce0f8dd
ruby-devel-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
471d39a317b19900d1aa0894ba19e3334bfffb9e35b77d317559b050cd2b54b8
ruby-doc-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
43540d116659edddd917d22fa0468970468178d21c225cbce37ccb207fd9f1fb
rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f
rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939
rubygem-bigdecimal-3.0.0-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
304acf98fe6a7d8169d60426eb8c2474115406be0db98efc8873779344064cf0
rubygem-bundler-2.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
8eb2699d7f285d95fe6620e522faa03e3bccdd4f34f81a091294612c26fcc9bb
rubygem-io-console-0.5.7-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
65acd752a8d7657a82e2b000ac67ca306118effa7180d5930ef2e1919738b0d6
rubygem-irb-1.3.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
334a45559b587fe68d4eb23511b62e0ad19ada521550c50448dede37a502b858
rubygem-json-2.5.1-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
3cbd6958d0bdb8827db2c5a50b0d46611c87a04cd05c2c18e804e86a3682d87b
rubygem-minitest-5.14.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
7acb747859c30449778b99e104991d63a9270383936d6613bf32be8837924930
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm
5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm
a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822
rubygem-power_assert-1.2.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
b2e4a37abf7b0ec0df7a6315db2dca68a6382c3e63049a66bb04c14f92330c63
rubygem-psych-3.3.2-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
bec3c333cbe8353699a14dc66883da2acca1cc0ce0237b7251e126593d51668d
rubygem-rake-13.0.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
d9c7648331983866cc292dccd017cb1fca53c7a4974e94a51f83de2b96cd18ab
rubygem-rbs-1.4.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
9f6486e3d4a1d97f6059efda9f9fd5f04a82c4a141419f317cd6874aebbd083e
rubygem-rdoc-6.3.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
16b71eaa43c10307c0c031c45538e10453b6f3fc2bf21445fd969eb6f60510a3
rubygem-rexml-3.2.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
b75400368159fdfc472506e2349144e2dd835ccce2b4a5c7daa49a64107f62be
rubygem-rss-0.2.9-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
8f8cd7c715414e63daf97a96c85d5d4dba978d2c9974ecd97d84c237bf53b3fe
rubygems-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
195c1695785aaf28fb450939123d768c9065fa86a85e3565c113f7ea7911b947
rubygems-devel-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
1af10623a7e05ff1b31948e1db26e2dfc864a368f6a8d6db8a5ed34919beca44
rubygem-test-unit-3.3.7-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
999ea750ec5c45ca913edc583a4b89d9f648e9773099466358204994a51df7fb
rubygem-typeprof-0.15.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm
ce4fd4cf9bd56646a479b69a6c98f95c5f3a402639b33b0766464d830a080373
ruby-libs-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
9f405c6e54de0216ab746e5621b5eb0bad162e0a4403672cbdf2630e8a2c39e5
RLEA-2022:6453
container-tools:3.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Module meta data is wrong (BZ#2120558)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Module meta data is wrong (BZ#2120558)
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLEA-2022:6454
container-tools:4.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Module meta data is wrong (BZ#2120561)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Module meta data is wrong (BZ#2120561)
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm
0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm
c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b
RLEA-2022:6456
gnome-settings-daemon bug fix and enhancement update
The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings.
Bug Fix(es) and Enhancement(s):
* Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-settings-daemon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings.
Bug Fix(es) and Enhancement(s):
* Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964)
rocky-linux-8-x86-64-appstream-rpms
gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm
12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94
RLSA-2022:6540
Moderate: webkit2gtk3 security update
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7).
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for webkit2gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7).
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el8_6.x86_64.rpm
6f9d418c7ea1f1201d9fce9c29a452dd5ff1e50186607bac1d8d5c36e9d0b081
webkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm
f264c4563e2b6ed207ecba5bad82bc211e855fcabe1756b92db6001872f5118c
webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm
857df66bf8107734cf442e7e59feab3e0d62c626e8738c46f676b57c99fa221a
webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpm
022a74acac9929975cd817c2e8820af36362c80ba18c35525aa3143c238e2845
RLSA-2022:6542
Moderate: php:7.4 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948)
* Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949)
* Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948)
* Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949)
* Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm
0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLSA-2022:6775
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm
7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a
RLSA-2022:6820
Moderate: prometheus-jmx-exporter security update
Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target.
Security Fix(es):
* snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for prometheus-jmx-exporter.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target.
Security Fix(es):
* snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpm
85d52b6eb723113b6ba471b2ca26afae713997a89616d57739e7498226fdac71
prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpm
764abbe69bd693ff8794e3c9fa5fd5b609be9ba1e896ba02ed4476d2efb61dcc
prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpm
b252c5787fa070f1cad64f473a492dbbc981882ac49570b9a1b5b5bb9596a7a8
prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpm
e747522630dfee8d219dbd8794386cd774564f4cdd5b688d3e4ee255c217d91f
RLSA-2022:6911
Moderate: .NET 6.0 security and bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm
6e650cfac34c121a272d9c483ca5059026ec06f0d34d4bcae5d31b3e4f777725
aspnetcore-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm
70e339246f8d0c94ab2a07b9f993079005f3c20b862576c20a1a6772764c0cd5
dotnet-apphost-pack-6.0-6.0.10-1.el8_6.x86_64.rpm
0a657dbccaa3525914806ebdea52bcdaca2a936399b214dd30eecc378e94b2e9
dotnet-hostfxr-6.0-6.0.10-1.el8_6.x86_64.rpm
6982ed81d032f7ab444f935f35adff3f6d50b3d4f01c1139cd066e4fa3f57dbf
dotnet-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm
2df8853bf9d61bb52c0ada2a5eeddbf56ff1e69c8952d150d32702468268fb58
dotnet-sdk-6.0-6.0.110-1.el8_6.x86_64.rpm
583e8250ae7739698fcaf5c6b46c9f7ab5c02ce69bbd9c7c19ba1c8bfd938b09
dotnet-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm
0551f8c631a8895d3b971c3437f3723e4b2d5e3a67bdfb2f29304721a587a4c9
dotnet-templates-6.0-6.0.110-1.el8_6.x86_64.rpm
386c99913b24868fb58baba273ba69eda871b35805173bd4dc874b4076803d5a
RLSA-2022:6912
Moderate: .NET Core 3.1 security and bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dotnet3.1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm
b036a76fc87c4c0ebefdd5a48b039c099e59e631a937a3dbb25f7332e7eab6f2
aspnetcore-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpm
284b6c759438ba789f5b0dc9e68990cd9a483be7c21b3135af56a3937e7ae5ff
dotnet-apphost-pack-3.1-3.1.30-1.el8_6.x86_64.rpm
efe82ef762462f11c2e04d4aa5938f4940c02a20a22e781b7d9b292781b6ace3
dotnet-hostfxr-3.1-3.1.30-1.el8_6.x86_64.rpm
0a3e9d8b334a8ca057be0a61d2f495c0b0d6b880e64cc95a52518d8f2e258d32
dotnet-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm
eafd53eb66c10643f865ea529e46fca0c1a8375558efa5bc9a0f04d132658aca
dotnet-sdk-3.1-3.1.424-1.el8_6.x86_64.rpm
df33cdd9170652a91cb911118d2b44af28c5421bd1fd156eabfdbe796b2adf96
dotnet-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpm
6919d822bdd894fbd11352a528676772e043a81e957b956028e587586980d836
dotnet-templates-3.1-3.1.424-1.el8_6.x86_64.rpm
520fc0ea3849a0b1111c494897dfb53b2f9f48cf0e03242e82758ac941bdb3d8
RLSA-2022:6964
Important: nodejs:16 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs 16.
Security Fix(es):
* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs 16.
Security Fix(es):
* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm
440c4c7f7e759eeddb3269e62891497e5de3a79e0eafdc6edaae51f3b618d252
nodejs-devel-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm
57ecbfc42d4054167b5b62fb2cf50eb11a77b09e97f6920fdc61a0b06fdb9434
nodejs-docs-16.17.1-1.module+el8.6.0+1046+80feca58.noarch.rpm
fb53065a9e4d209cf205a7183c933faefa9e67f22581cc3ad291c2fd93edd5d5
nodejs-full-i18n-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm
251fc16560f4fb5ef3ad009b28df12aeed5328b04733a5b52b9e1e31feaddbe4
nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm
55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642
nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm
b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75
npm-8.15.0-1.16.17.1.1.module+el8.6.0+1046+80feca58.x86_64.rpm
3d401a2f8fe06114ada7bba63cc62a443d33a2462d6c6e96a6335539b821aa53
RLSA-2022:7006
Moderate: java-1.8.0-openjdk security update
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm
745a98184ac9a5515249b7cd168a5790d2b07407b3eca941cbb9bf9400d2f689
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm
10be3aa175d2b7be220ed364679366f5b90ce479d11d65443fabba8fb5e23aa9
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm
a64f5fe29ba875659ccd0a3d6af6f3a1f5e87b0c4e5e93cbabe16cf8ed68ae68
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm
6facf44a3ef195fb6c7f66ffce323acf6eccf4f331d5b9059e0c03865fdcd5ac
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm
01819f766f0cfdf6b035db3ead2f50c9539d65fb760d89728a34771c4b44a31a
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_7.noarch.rpm
f17b77d4203cf1a819eb288008fd2080959d7dbfd894ecef89d69f0e0d023e4e
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_7.noarch.rpm
762991fd798dc9d95f9e2257ebde37ffd259e56d3bffb2c9c1a89fd16d523079
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpm
f0b9eb21a54ba79a63a963b57f7a2372954a3c88686a340713fa88332ab3ce4a
RLSA-2022:7000
Moderate: java-17-openjdk security and bug fix update
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503)
rocky-linux-8-x86-64-appstream-rpms
java-17-openjdk-17.0.5.0.8-2.el8_6.x86_64.rpm
838a430c12dc052feeab8968cead619fec7d76bb97abf592f861d0292706b130
java-17-openjdk-demo-17.0.5.0.8-2.el8_6.x86_64.rpm
0ad8e5c322536ec6dbc5798c48da6f97f0cb7ae2734f26350555b6aee748fd32
java-17-openjdk-devel-17.0.5.0.8-2.el8_6.x86_64.rpm
0197ddb74fb8a530c5972e9768ca5163284b1343ea3bd89baa46b62c13e8ef8d
java-17-openjdk-headless-17.0.5.0.8-2.el8_6.x86_64.rpm
63c857bda2ac036200ab1200c75d790ccbeb6e2188c06a888ae6f3989e4093f7
java-17-openjdk-javadoc-17.0.5.0.8-2.el8_6.x86_64.rpm
0704d2feac8d566e51e651cfa698732b1b90af3ba10e89d61df4a0e04401f6c8
java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el8_6.x86_64.rpm
61d2770cc684c0cee9537520ec7b7c1766c7b81ff1a5a01367d9f5fe0eefe809
java-17-openjdk-jmods-17.0.5.0.8-2.el8_6.x86_64.rpm
72cfedb194fb81bc92c44995237de168454da9f1ca92e4982839c94d5117954a
java-17-openjdk-src-17.0.5.0.8-2.el8_6.x86_64.rpm
f572d7bc2035a81698cd38ef656827cd5e790575a81d88a96b20271965971683
java-17-openjdk-static-libs-17.0.5.0.8-2.el8_6.x86_64.rpm
616d88fa04d8c7ab45e631db0cf0fdf6e6352968ab569145c5c4581bcaea023b
RLSA-2022:7012
Moderate: java-11-openjdk security and bug fix update
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863)
rocky-linux-8-x86-64-appstream-rpms
java-11-openjdk-11.0.17.0.8-2.el8_6.x86_64.rpm
f1ec1f28c33c37259da402d2e06a1467f4f9d7dfda6560d6c82ecfaf3ad6a8bd
java-11-openjdk-demo-11.0.17.0.8-2.el8_6.x86_64.rpm
b4e143d786bb6f13ad9170b9a5c7dd433aedb83213cc620ed9eea084a9f10b7d
java-11-openjdk-devel-11.0.17.0.8-2.el8_6.x86_64.rpm
294a5307e7d6a47cddb771bf7331bd33f0c76f11713a340cf9c2ba898fcdf3d4
java-11-openjdk-headless-11.0.17.0.8-2.el8_6.x86_64.rpm
ac1d47d33942cbb35a09fd0bbb94c70bf33ed1294a59069d1e7ede814e3d6fb7
java-11-openjdk-javadoc-11.0.17.0.8-2.el8_6.x86_64.rpm
51fe1350c0503073ec925d0b4872a11160cc0861b5e5d410533132621fc72e8f
java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el8_6.x86_64.rpm
a07639947737757b7337950563036a4d97230d069275a35781f6fa631a41bc71
java-11-openjdk-jmods-11.0.17.0.8-2.el8_6.x86_64.rpm
0670b157826eed4f457070a9944f09d339724159aeff56f6befed0496757cfcf
java-11-openjdk-src-11.0.17.0.8-2.el8_6.x86_64.rpm
4ebaae7da862f73d7398d0053cfd96d1249bbe313afb54279c6b0379be246732
java-11-openjdk-static-libs-11.0.17.0.8-2.el8_6.x86_64.rpm
4d8bec512555940ee20d1b0df6bc3f4680498b58c28433fa49b2431f5f5e40a7
RLSA-2022:7119
Moderate: mysql:8.0 security, bug fix, and enhancement update
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30).
Security Fix(es):
* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265)
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415)
* mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596)
* mysql: C API unspecified vulnerability (CVE-2021-35597)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423)
* mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454)
* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538)
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625)
* mysql: Server: GIS unspecified vulnerability (CVE-2021-35631)
* mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632)
* mysql: Server: PS unspecified vulnerability (CVE-2021-35637)
* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534)
* mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427)
* mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547)
* mysql: Server: Parser unspecified vulnerability (CVE-2022-21304)
* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374)
* mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367)
* mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457)
* mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633)
* mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mecab-ipadic, mecab, mysql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30).
Security Fix(es):
* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265)
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415)
* mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596)
* mysql: C API unspecified vulnerability (CVE-2021-35597)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423)
* mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454)
* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538)
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625)
* mysql: Server: GIS unspecified vulnerability (CVE-2021-35631)
* mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632)
* mysql: Server: PS unspecified vulnerability (CVE-2021-35637)
* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534)
* mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427)
* mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547)
* mysql: Server: Parser unspecified vulnerability (CVE-2022-21304)
* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374)
* mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367)
* mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457)
* mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633)
* mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940)
rocky-linux-8-x86-64-appstream-rpms__mysql
mecab-0.996-2.module+el8.6.0+1057+4d6a1721.x86_64.rpm
3c0021184a048d318e81df62882e329ccc9575395989cf57e5c6bb8d3dd12153
mysql-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
9cb5d1bbe5620dd769c4f7f75a45e21dcbcfac3fe3ff91b934d0c1fc3f15a0ea
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
mysql-common-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
1bc4b3d9628f3a617b83f355d19ec0105d6f13922efb67ca08ac33f99dbe5ca3
mysql-devel-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
824a5cada6538b9f41773f07d6c7f94b0aeb89454426062b7b2911873db1cd18
mysql-errmsg-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
a2063a9fd8dffa3a87a5e511b9b5e39052a530fcb27920f88ec0efed3e740d3e
mysql-libs-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
3bf0fe5f852a135cbae23e9a087f4724038b237938cd9fc2b19339517417a13a
mysql-server-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
c9db82d27d816893a193b9cab3c9195cb693c69f6dce2227fb4136bcedc1b7c9
mysql-test-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
cc7ee9a9065cb0585ee6606c762ddf8d87502be170df730f4de4cf1978e96fe8
RLBA-2022:7122
virt:rhel and virt-devel:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fixes:
* scsi-generic: Fix emulated block limits VPD page (BZ#2121783)
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fixes:
* scsi-generic: Fix emulated block limits VPD page (BZ#2121783)
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm
b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm
eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
RLBA-2022:7125
virt-who bug fix and enhancement update
The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate.
Bug Fix(es) and Enhancement(s):
* virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124813)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-who.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate.
Bug Fix(es) and Enhancement(s):
* virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124813)
rocky-linux-8-x86-64-appstream-rpms
virt-who-1.30.12-2.el8_6.noarch.rpm
a8a8915997def51cea3cfaa933c4fdae496932cbfe2c47b7d7a4aee90117b52b
RLBA-2022:7126
stalld bug fix and enhancement update
The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time.
Bug Fix(es) and Enhancement(s):
* Stalld is running in unconfined_service_t type (BZ#2126495)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for stalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time.
Bug Fix(es) and Enhancement(s):
* Stalld is running in unconfined_service_t type (BZ#2126495)
rocky-linux-8-x86-64-appstream-rpms
stalld-1.17-3.el8_6.x86_64.rpm
f7461f2670713844d6f832dc358b7516e6b53b0386403c7de3b83bf5f88c5aba
RLBA-2022:7127
container-tools:rhel8 bug fix and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es) and Enhancement(s):
* containers config.json gets empty after sudden power loss (BZ#2130237)
* Podman support to perform custom actions on unhealthy containers (BZ#2130912)
* [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361)
* PANIC podman API service endpoint handler panic (BZ#2132413)
* Podman volume plugin timeout should be configurable (BZ#2132993)
* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es) and Enhancement(s):
* containers config.json gets empty after sudden power loss (BZ#2130237)
* Podman support to perform custom actions on unhealthy containers (BZ#2130912)
* [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361)
* PANIC podman API service endpoint handler panic (BZ#2132413)
* Podman volume plugin timeout should be configurable (BZ#2132993)
* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm
0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b
RLSA-2022:7128
Moderate: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
postgresql-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
f95444ae27053c5504601cfb1bf4d44bdc56f7d54b60f69fabff2a3a30f4f8c7
postgresql-contrib-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
d1da2be66f7b945e18f9ce5937472540a4e5fae27b68a66f3f6860a4c6b4cd04
postgresql-docs-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
ffa8d10df01db092f4039b3819a79dca1222c639c62cae7aca314fd59bcf68cf
postgresql-plperl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
29e8b7b91a348651e31084e03c04835aa7c00a84025fc22b252cfa772cbb2a14
postgresql-plpython3-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
1fd6e4891442fa7c18e0d3333658477bac3edf374df44767ad1a4a86d510f438
postgresql-pltcl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
5f1507924fba91e1f0ba51b3bf43d689c833a106b99635464db81d7916521a4d
postgresql-server-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
91acd673cfab624d1f4740cfa486f8da657dfe03696600e6eb50abcc8bb7469c
postgresql-server-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
8c9e2a4148198e518085b207d0f4845feeaedbd20ed36dc6bab84eb7a706394b
postgresql-static-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
43620e6cb1f200bca1539909808563f88ca31f0776c0e38a33213b63a3be7c30
postgresql-test-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
e994ddb1ebcac70c941d100c25cec93c489c1b33ff282e70f15525591e807236
postgresql-test-rpm-macros-12.12-1.module+el8.6.0+1049+f8fc4c36.noarch.rpm
a509742a04550e2d84aa41a407c5f4b567d9af0eb989ea2ad9438d313c482c35
postgresql-upgrade-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
8253518c68242b0c0f1807b360228af9568e96156030d52b8de3278ef1e89f0d
postgresql-upgrade-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
c7b67025026e57a72036510e11d20e3516f3792d177a22d78c9973622d401fad
RLSA-2022:7129
Moderate: git-lfs security and bug fix update
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* git-lfs needs to be rebuild with golang 1.17.7-1 or above
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for git-lfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* git-lfs needs to be rebuild with golang 1.17.7-1 or above
rocky-linux-8-x86-64-appstream-rpms
git-lfs-2.13.3-3.el8_6.x86_64.rpm
d8a246dcad708db6bac5f33227ceefa96d4a79c8dd6ec00d99ad12d0ac0adf9a
RLBA-2022:7132
idm:DL1 bug fix and enhancement update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324)
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036)
* Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324)
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036)
* Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051)
rocky-linux-8-x86-64-appstream-rpms__idm
bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm
615d759274eb3f3f8c28657012cfec65b67d8a47fbf38b897955cec7bdde1495
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm
b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2022:7240
container-tools:rhel8 bug fix and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm
0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b
RLBA-2022:7455
jigawatts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jigawatts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jigawatts-1.21.0.0.0-3.el8.x86_64.rpm
4dd6d7a49e770ec4d95f4bd04a3c6fc11f66c3889786262819905773a984f52e
RLBA-2022:7456
ansible-core bug fix and enhancement update
Update ansible-core version to 2.13.3
Switch from git to git-core dependency
Build manpages
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ansible-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Update ansible-core version to 2.13.3
Switch from git to git-core dependency
Build manpages
rocky-linux-8-x86-64-appstream-rpms
ansible-core-2.13.3-1.el8.x86_64.rpm
292ce7fdb68aab58926c7df28b3e108988bf148642adae06ba348a557d8b85ba
ansible-test-2.13.3-1.el8.x86_64.rpm
ec9d55e4bac46fde13b4b2d2bedb59fec2b424441ad913bb8596fcbb984690eb
RLSA-2022:7457
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)
* buildah: possible information disclosure and modification (CVE-2022-2990)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, conmon, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)
* buildah: possible information disclosure and modification (CVE-2022-2990)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
cockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm
2b6ec4da8b57643e010868c767fe370c537f59dae20ec5459864a53d026a8aed
conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm
c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b
RLSA-2022:7458
Moderate: flatpak-builder security and bug fix update
Flatpak-builder is a tool for building flatpaks from sources.
Security Fix(es):
* flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for flatpak-builder.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Flatpak-builder is a tool for building flatpaks from sources.
Security Fix(es):
* flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
flatpak-builder-1.0.14-2.el8.x86_64.rpm
38a880b0af6d805dc60a1620d78a913f8c72a50492847a3c3c4f9171185a717a
RLBA-2022:7459
flatpak bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for flatpak.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
flatpak-selinux-1.10.7-1.el8.noarch.rpm
f000e6bc7105d6e55e8c901dda0312295705d18561cd86c85319bdb15fee0341
flatpak-session-helper-1.10.7-1.el8.x86_64.rpm
58c7ddd4eb66a852c86537cd722cba96f9167c9ff1209e0aca229354bd135d60
flatpak-1.10.7-1.el8.x86_64.rpm
16307d86bcf90b9a10b580f7264318cb01a20df8223a49db0361c08719093cc0
flatpak-libs-1.10.7-1.el8.x86_64.rpm
c0d6a3caa7713cf94f9e05bb1c83d0fef2bbfe006fba98d52da154523d765b0b
RLBA-2022:7460
rsyslog bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rsyslog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rsyslog-8.2102.0-10.el8.x86_64.rpm
6ecfc0924652059a0e59a20663a4c8492163d3a9476ef65fcc05b618885b110a
rsyslog-crypto-8.2102.0-10.el8.x86_64.rpm
501ef5dd0642197789c8afee86e586a53b3dc4e0dec9ed6454538c50b9b9e936
rsyslog-snmp-8.2102.0-10.el8.x86_64.rpm
01cee07ed3a8d9e112cc04ea731a89ddc4900d3eac727348f602f8e70104c315
rsyslog-doc-8.2102.0-10.el8.noarch.rpm
d12e90ee2eba31f268851222219d5727401dde065307b50ec6a904ef3bdfe15e
rsyslog-elasticsearch-8.2102.0-10.el8.x86_64.rpm
5ae55243ecb13f18a8d4eccc3bbe99b688782bd25f92cca293650b13969b0c45
rsyslog-gnutls-8.2102.0-10.el8.x86_64.rpm
26f9b8eb9d7fb3d1ee0fa496c6d86afe1745a1300a2aeeb033f5336534b3b3ac
rsyslog-gssapi-8.2102.0-10.el8.x86_64.rpm
fb7659e51b89347942a0682769c11c65b480af8b9fa5283fbf6a912bc3b51763
rsyslog-kafka-8.2102.0-10.el8.x86_64.rpm
57623cfbeaf169b8d9db3917e3380e47ddf7d3a77981ba322a992945001e2c7c
rsyslog-mmaudit-8.2102.0-10.el8.x86_64.rpm
7c02db10512225c70140c4efe8fed9983dd8c23436e73d637b930abd82b5d6a9
rsyslog-mmfields-8.2102.0-10.el8.x86_64.rpm
8ae41c4ebda5bb2f5e490be17ea34df8a796a8ac82e37a4c6f79151fb880a682
rsyslog-mmjsonparse-8.2102.0-10.el8.x86_64.rpm
8990b09e3e34970d687f3a6dbb7a068a219ff3fa3d5dbfc6950c7009a263150c
rsyslog-mmkubernetes-8.2102.0-10.el8.x86_64.rpm
18ed1f630dd647c958ab135b7d19bf0c58a6bcf84d1fd4cf2b87abd3a1403869
rsyslog-mmnormalize-8.2102.0-10.el8.x86_64.rpm
121fbc57104776d1c67e521a9a26ba31ca81ad9cce470deaf29dc7726f5c3c18
rsyslog-mmsnmptrapd-8.2102.0-10.el8.x86_64.rpm
cac180c9d44da54781f873b435ae76dbb37cdaf659849420fc5ecd50df9d5de1
rsyslog-mysql-8.2102.0-10.el8.x86_64.rpm
009b093a178792b7a9b1322e1727a539e34a4f1f3e67333e3b157e41c623305b
rsyslog-omamqp1-8.2102.0-10.el8.x86_64.rpm
b0f15abe796a6650d2431ee09c162cdcccd9025800153f2b8521b591d5ac42d9
rsyslog-openssl-8.2102.0-10.el8.x86_64.rpm
0608b3b3949e0d32ba9ca1dd81cad91f3380b223a03ce25f8602399a5c4f5020
rsyslog-pgsql-8.2102.0-10.el8.x86_64.rpm
781b4b2940485824095aafbc61004154fdf5e7a82ffe9551952a935f51631b9f
rsyslog-relp-8.2102.0-10.el8.x86_64.rpm
8ab65a687c251669d44ce1a907e031dc45d99bd63b90796562afa9b698dbe3da
rsyslog-udpspoof-8.2102.0-10.el8.x86_64.rpm
c42e276660b6ec51faeabe13bee30151c26f441bce27a0818f5da24bcf973d5d
RLSA-2022:7461
Moderate: libreoffice security update
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libreoffice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
autocorr-sr-6.4.7.2-11.el8.noarch.rpm
42204c6b12b4e04de5d8440e7bf72029279e36c126bb20387bbac7e29830de0a
autocorr-sv-6.4.7.2-11.el8.noarch.rpm
ed521d9178292aaf9043777735f412e3225020df3b9e03ce8eac2a340b3b5a71
autocorr-tr-6.4.7.2-11.el8.noarch.rpm
c29a0038e3738fffbdff5b4da2f8bc929e3500a73a5e8edcded02cc5cd9c826a
autocorr-vi-6.4.7.2-11.el8.noarch.rpm
c6cfa1f5620a46f5e40be143b413c2201608adabb5e10dd4d7c316b52d21771a
autocorr-zh-6.4.7.2-11.el8.noarch.rpm
18bf00fe10257cabb348f1dd32bb434ea904ba38b0992040edd34ad59c1da676
autocorr-af-6.4.7.2-11.el8.noarch.rpm
822fe0988c60c6c12d97797ffe772ef701d5ebb999affd37c8d0d1efe60b6b5c
autocorr-bg-6.4.7.2-11.el8.noarch.rpm
24cc991c2d0044f356df58c2f84998d800de153773dcd8933d1eaad58d1179df
autocorr-ca-6.4.7.2-11.el8.noarch.rpm
1bd4e9ed716d92b7bae868f7cdacb1b2f4643177852e930cb65569ef84205ab2
autocorr-cs-6.4.7.2-11.el8.noarch.rpm
b27646f77e91404bc694494ef2f7d0548980f94fa7b1f58d9f7384cefd475501
autocorr-da-6.4.7.2-11.el8.noarch.rpm
50e747b665bd7eafa15b17d9a58a36b315385baf770e2bfa72befc38fb02370b
autocorr-de-6.4.7.2-11.el8.noarch.rpm
61652321f50de9597f727a6ea9d32ca1a12313e3362d83122fdc8266c7967a7e
autocorr-en-6.4.7.2-11.el8.noarch.rpm
523f57eccce35e2270f95719410183908a5251ba81337e9284f7dda5beda4016
autocorr-es-6.4.7.2-11.el8.noarch.rpm
436f825319c18fa10c6e9073fef10a28b8c8fdc7395759268ac680d9bdf7990d
autocorr-fa-6.4.7.2-11.el8.noarch.rpm
680dcb2f67d5984f8f8d65bbd89df32334b77147f2b563d8f7918e8663d61a02
autocorr-fi-6.4.7.2-11.el8.noarch.rpm
109240571044eb4a795426a291eef9e6136675a4b42c6f63319ed616c2946a8b
autocorr-fr-6.4.7.2-11.el8.noarch.rpm
2b82c45193d7868008f71b5c25a21c34e457e6bfe7bf4d33eb46b08fbc78dc47
autocorr-ga-6.4.7.2-11.el8.noarch.rpm
1484dc2c72c32b179e786944a080ff68e6b343371bf130f8428a4778591c6b85
autocorr-hr-6.4.7.2-11.el8.noarch.rpm
c67b6f697f053325081b9bb5019bcdfbab7be6fdc6647d8d15c1f049babc9485
autocorr-hu-6.4.7.2-11.el8.noarch.rpm
8165be4abbfec025e68bb674e77335802931d08c9ffaa051c44db23d48cdf9fc
autocorr-is-6.4.7.2-11.el8.noarch.rpm
98abe90f6c4fdbe8bbe9e6f8aeac2ba712b5486a6c6b2f21dfde3e8902b94e28
autocorr-it-6.4.7.2-11.el8.noarch.rpm
3e0ec0774098fa395b2145abfc17f3090b4337987f6200118e5ec974dbea5a64
autocorr-ja-6.4.7.2-11.el8.noarch.rpm
30137d009107d421261f7478b5fa48cecc75167556f6dbfad31e588b40f5b08c
autocorr-ko-6.4.7.2-11.el8.noarch.rpm
70d1b125291053332b33e8c2b5e61661af2343382da49f3dab89eaad34b3a0f2
autocorr-lb-6.4.7.2-11.el8.noarch.rpm
217a05ed41e91f04401d9f7dce5056519b52d19b6f73aba22cda9821cdbfa8e3
autocorr-lt-6.4.7.2-11.el8.noarch.rpm
fe71a78fd9867ffd2ac0cc2c953d398330452d5b5147393fe11b430520143713
autocorr-mn-6.4.7.2-11.el8.noarch.rpm
e5f746a0e5d5a26f364979109e759794880e1c8e23abfce3dda106180aa499b9
autocorr-nl-6.4.7.2-11.el8.noarch.rpm
d8fd18a7187de9427d31f9298017fb3c30ee3b8ee13839185393ed29966906bb
autocorr-pl-6.4.7.2-11.el8.noarch.rpm
19d1875232fbeb134f7e039be66f1252fce8f076f864433114184476bd4c2c77
autocorr-pt-6.4.7.2-11.el8.noarch.rpm
66eddb6cf4f26f282e615e5b62a5617d4753ffab8e61e9e9c68fddfeafe720b7
autocorr-ro-6.4.7.2-11.el8.noarch.rpm
813fecdb44735d187d74deda4273220164cd04f8b9e54096016dcce317656942
autocorr-ru-6.4.7.2-11.el8.noarch.rpm
78b60ee89bda48bbcea627d6a6441d37ae51265126b9a26d8d1632c4285e746f
autocorr-sk-6.4.7.2-11.el8.noarch.rpm
b4c77f36fb31570ffc56262c7c648724a7113f5d263b2cfda7a8fddda20c91e0
autocorr-sl-6.4.7.2-11.el8.noarch.rpm
9e5a343dbd8d23ae6a964a5bd2a0b49c24f5094c7534114a9ea5f139421575c6
libreoffice-base-6.4.7.2-11.el8.x86_64.rpm
e784d3b3d878595e6b5718236bfc928ddfd72e16b594bb701f169d5b4bb19fb0
libreoffice-calc-6.4.7.2-11.el8.x86_64.rpm
13a622c42cc9bb41a70c3f323778a02b216fffa7cac576de211cd008c4be5924
libreoffice-core-6.4.7.2-11.el8.x86_64.rpm
569b1e6c4b044f78ccc7f2f719db1d31bb6bff3c73c49bdcbaac648f1d34706a
libreoffice-data-6.4.7.2-11.el8.noarch.rpm
c5b41db25cc40f622156f96e9720813142580a7410984913eb3e1fa05dfcb38d
libreoffice-draw-6.4.7.2-11.el8.x86_64.rpm
fc12df8aac7db65f8811e75271dbffabe2f35c0327782c1f19183ae2cca17ca0
libreoffice-emailmerge-6.4.7.2-11.el8.x86_64.rpm
068020d9b424cf5b6064ce2445ca374426fb790bfb70fced8b03216aedaf11a6
libreoffice-filters-6.4.7.2-11.el8.x86_64.rpm
a4942a4e72a76ac33204bb3405a0403b555eb3d416ab202038dd225bb1b7bc82
libreoffice-gdb-debug-support-6.4.7.2-11.el8.x86_64.rpm
73cb704b69babc93a7f851b3139e674479f490a77f52be334efb8afb64b05335
libreoffice-graphicfilter-6.4.7.2-11.el8.x86_64.rpm
9fef96de29a3c8d3038d71c04f35c81140547d0fcd91e99b9913ab7776a64746
libreoffice-gtk3-6.4.7.2-11.el8.x86_64.rpm
4ac6b5cb0644021c73e86ece8780d23869cc28e5c771e53a29eade4c3c17842f
libreoffice-help-ar-6.4.7.2-11.el8.x86_64.rpm
ee890e090faa8676295771d932fb884d6099a2beaaab0603399e910705e890ad
libreoffice-help-bg-6.4.7.2-11.el8.x86_64.rpm
c912487c44b0738bfca597127376b9e6f6b1ea159cf8fdc75e7275dc2dd7de1e
libreoffice-help-bn-6.4.7.2-11.el8.x86_64.rpm
920f525cb192101f31076810a33d06f8b277aa3a7c10c3ee0a83e3254a0caad7
libreoffice-help-ca-6.4.7.2-11.el8.x86_64.rpm
575219a5a54c5c83668914536f5b5d837fefded1ed9edf5e3002513cc02a0c16
libreoffice-help-cs-6.4.7.2-11.el8.x86_64.rpm
791f9d044ff91ce79e41611cbaa090831eb388712faa25b0ccb83f1e14faae3d
libreoffice-help-da-6.4.7.2-11.el8.x86_64.rpm
fa389a9af08bb8f5cc1d8ecd93b019985feba5686a5f0258cc36e5d57e05f5c0
libreoffice-help-de-6.4.7.2-11.el8.x86_64.rpm
421df053f212befe0d653589e9a9d7a6bdf24d8770962df2b5df5b95bb4647ec
libreoffice-help-dz-6.4.7.2-11.el8.x86_64.rpm
87a691ac5f08d12a8d82edae974431450adbb696065815656c1d2d381d927cf7
libreoffice-help-el-6.4.7.2-11.el8.x86_64.rpm
e171326eb0a005c3ce6be4d70b38b5bf759a2edd055c831d7ba6985bc8b4d0e3
libreoffice-help-en-6.4.7.2-11.el8.x86_64.rpm
40cb5a04825d52b8024097953e8ab073251b1b9302492a3747ac76b5d8eeaba4
libreoffice-help-es-6.4.7.2-11.el8.x86_64.rpm
ece90ae7d153a7b4ab4342ef668d2d0d2d9c3848a5533bac1646223514308c19
libreoffice-help-et-6.4.7.2-11.el8.x86_64.rpm
2584db17d49570e5be9bb9c6b1992f657f1fd39a14c22660fac5f5ad3a0f12d5
libreoffice-help-eu-6.4.7.2-11.el8.x86_64.rpm
9b2bf8f20b5c55f45814a41e8b03eabf933b9e7f2102d264b5a772553e53795c
libreoffice-help-fi-6.4.7.2-11.el8.x86_64.rpm
248b8850942c061e29f85fea119dad8b4d9bbd4ee3a4b6c82507d1d14c0b8ac4
libreoffice-help-fr-6.4.7.2-11.el8.x86_64.rpm
07750739db60164fd32aa035c5759d2f98556e21a9500003cf4e0f9f56aecbaa
libreoffice-help-gl-6.4.7.2-11.el8.x86_64.rpm
83866e5641d3d082eb819ecaae24a9464268de6f43bcb6c5267da61f03a001a6
libreoffice-help-gu-6.4.7.2-11.el8.x86_64.rpm
20a62bc41f0c1f385c98cc698a8eae4b07966216927abb3d04e60d1295ceea3f
libreoffice-help-he-6.4.7.2-11.el8.x86_64.rpm
6bc1c0e71e2f937ac0b63d22e9216ebf1ec34edcb18001b1bf08c22fb288f65d
libreoffice-help-hi-6.4.7.2-11.el8.x86_64.rpm
b7b375b0a8b0611b9e5602dce593f650d8ba6f47b9b462313939d3314ac6b321
libreoffice-help-hr-6.4.7.2-11.el8.x86_64.rpm
888b6b6761e58dd9f2f197415eaff390a8e26b850aa58c64172541f5a4afb851
libreoffice-help-hu-6.4.7.2-11.el8.x86_64.rpm
95795933c331257c56715e5a7bcd3a8abd5238f991ce0bf6267e47c69c643bc5
libreoffice-help-id-6.4.7.2-11.el8.x86_64.rpm
33ddc4dc9bf005d2931c67d54293d4514cb82ff15ef1faba84f97f38de994b10
libreoffice-help-it-6.4.7.2-11.el8.x86_64.rpm
559cac012576ad3f96840f5b7d74456b05df1ce2ca7de35e06cfee76e725de92
libreoffice-help-ja-6.4.7.2-11.el8.x86_64.rpm
6c69d6276a109cabb59ab93f1654a4d9870ef55d2db79461c1ca07dac419108e
libreoffice-help-ko-6.4.7.2-11.el8.x86_64.rpm
05f77b6b10dd37903b3bb15c6ce79d95d2ef0430ed73e1fb408a59d053a9a171
libreoffice-help-lt-6.4.7.2-11.el8.x86_64.rpm
594806caaf8c77e46d0b480a46025333177a488ece90735e3428e9bc0e278061
libreoffice-help-lv-6.4.7.2-11.el8.x86_64.rpm
049e912243762a99accf055d7e62353664eea8c77454e0285022f94df087b58e
libreoffice-help-nb-6.4.7.2-11.el8.x86_64.rpm
fc80baa0e6dec3c3ec5033fa26b63466e5a3ee2d1ff402d27ed93d50a2828d95
libreoffice-help-nl-6.4.7.2-11.el8.x86_64.rpm
685eae5ec3d43b31dcdd7b236bf4e31c2077e3fff84c5f1b6bc0b4fc5cf7bf33
libreoffice-help-nn-6.4.7.2-11.el8.x86_64.rpm
bb9f7eb8f57330402296b20934818ba5a19ac2c029ad0a47a633886a3abbe102
libreoffice-help-pl-6.4.7.2-11.el8.x86_64.rpm
9690a6a8be4dbef2807b61f5b052e78615452a654857bac3a41ff3bdfdb82765
libreoffice-help-pt-BR-6.4.7.2-11.el8.x86_64.rpm
62f14100a8f013a43f6bb58859ad6e7feef6c3d8183e6d8d96cacd431eb04025
libreoffice-help-pt-PT-6.4.7.2-11.el8.x86_64.rpm
4b3aab38a0ed9e7a48c5e1a7827e8c2566b9636e08f1bb813ea2e4e3754ed2a3
libreoffice-help-ro-6.4.7.2-11.el8.x86_64.rpm
44785c7cafb42fd6c3ac8a5bf658b877c470d8c91737a92da6f5da82b56fe87f
libreoffice-help-ru-6.4.7.2-11.el8.x86_64.rpm
7bdf2abb286b93262572148ad11d7041b20d18b06d7faea3fb6eb3a9cbaee64f
libreoffice-help-si-6.4.7.2-11.el8.x86_64.rpm
5453763157ca7a92b1721f1911ab68c62e5052535dffe77867cbe685a01413b6
libreoffice-help-sk-6.4.7.2-11.el8.x86_64.rpm
0db00490546a1c35218f0f82b635884b62b38470ae277396b83f6289613a8b71
libreoffice-help-sl-6.4.7.2-11.el8.x86_64.rpm
6e7733266c803e5caa36e2896fea4fe599e5012751452a610903f8d4df67dca5
libreoffice-help-sv-6.4.7.2-11.el8.x86_64.rpm
164d894544ed4a05ecbf69ad8c2c46d6c5fc7fb7cea79b70339805aacb810acf
libreoffice-help-ta-6.4.7.2-11.el8.x86_64.rpm
f83456099ab414a7dae0f7b009a4f62db6ea612bef8c439048b85d7e6f41b9d6
libreoffice-help-tr-6.4.7.2-11.el8.x86_64.rpm
e806c0810d321553f1e019230b9478faca0e9a2c7e1b2c15f7336ae84ae50648
libreoffice-help-uk-6.4.7.2-11.el8.x86_64.rpm
394ba1ba1178fe17b10387d6130b7993bf6181e1fedc51489af41c758420da06
libreoffice-help-zh-Hans-6.4.7.2-11.el8.x86_64.rpm
331aa48197e887000c33ec90eb152233758417a8ca7a34a9c23fa56e9867abeb
libreoffice-help-zh-Hant-6.4.7.2-11.el8.x86_64.rpm
51bfd6c693778df95e385dab79f3a2d9dd620460aaf91d7f9841f2e7b9f7438c
libreoffice-impress-6.4.7.2-11.el8.x86_64.rpm
ab078bb46f726b92d551f80de1c1e4fe4dff33e544bd1f5400d1252197c48122
libreofficekit-6.4.7.2-11.el8.x86_64.rpm
31ee988803ad3d5fdffed3fcabe9b8e09ab09c4bba48da7deec1edff7bdc542b
libreoffice-langpack-af-6.4.7.2-11.el8.x86_64.rpm
920b83b49d2f09d784f401be46451dbb64aaea5cd9e17dac49bdd36697f0b7b6
libreoffice-langpack-ar-6.4.7.2-11.el8.x86_64.rpm
78d7693a1d87b98587be9292817d18ad52ef17f86d20c6deebc30412781e1c08
libreoffice-langpack-as-6.4.7.2-11.el8.x86_64.rpm
bf9f6b9f8785ee91989b7ce88fd895b34c7f24f1270c352c4cc305d246136100
libreoffice-langpack-bg-6.4.7.2-11.el8.x86_64.rpm
568ab8afe163d334bf54497768ad14c00d1345e88c246ddee3bcbe65bf3cbc7d
libreoffice-langpack-bn-6.4.7.2-11.el8.x86_64.rpm
9d46c8162e4a6c61c0d03f4a9957455994796bbad10d405affb586bfb371007c
libreoffice-langpack-br-6.4.7.2-11.el8.x86_64.rpm
2072472994ae16686268dc29d979511844c96ce03a7817a5fb2960be76b9448b
libreoffice-langpack-ca-6.4.7.2-11.el8.x86_64.rpm
4a64181451223fa8ff4e23ce1f170c33bcf9fc450e56beb4246f622e9c22f005
libreoffice-langpack-cs-6.4.7.2-11.el8.x86_64.rpm
6f37ad410df8528f60b9ae8692b6e930f5b746b2a78e9dfc13f6ea062824108d
libreoffice-langpack-cy-6.4.7.2-11.el8.x86_64.rpm
08db94cfa6188f782f7dac1c52d27f9cdd7a103b67ff035edc10a579fc7ecafd
libreoffice-langpack-da-6.4.7.2-11.el8.x86_64.rpm
e7ac8a5cc2b5c040c6763be085cbe073b446cd0c8bfe2b3472fd24e412735adf
libreoffice-langpack-de-6.4.7.2-11.el8.x86_64.rpm
fa0967f42a2a7ed22dcc87888d61b4f59de2d8124f621281c3cbe6ea36160cfc
libreoffice-langpack-dz-6.4.7.2-11.el8.x86_64.rpm
052a14f24797706b445f29da9ec6c7a4dc996caa698f7e6df88606b4cefb0aa8
libreoffice-langpack-el-6.4.7.2-11.el8.x86_64.rpm
ed1d9e061b826621936931c484880dcd308547ddf4e35e6babf9ed6bd4a97ade
libreoffice-langpack-en-6.4.7.2-11.el8.x86_64.rpm
2e2bd44915aa57912b1c011f147871a08e0a4d28f1c2c25c1714d58c52380532
libreoffice-langpack-es-6.4.7.2-11.el8.x86_64.rpm
9c4eb79e70ab48de21eed1b5d165840c050cbce63fb0123e61ebb784745d2569
libreoffice-langpack-et-6.4.7.2-11.el8.x86_64.rpm
a19f1eccd5d341bf50942f31d50faf245e4744be232020be202397a39cab10c4
libreoffice-langpack-eu-6.4.7.2-11.el8.x86_64.rpm
3ce74f2358e6c95eb557d18ff35dfda581c0d9c962266d2559a1af8d5e4a95fb
libreoffice-langpack-fa-6.4.7.2-11.el8.x86_64.rpm
66ec9fa22aff02f7b450aa593ee2e17bf1a7a9328def2b2e218aa79a92c1afbd
libreoffice-langpack-fi-6.4.7.2-11.el8.x86_64.rpm
0007da28362f134d6a29b59c0e31507819c2e8eb907cdc346f2626059ee54f0d
libreoffice-langpack-fr-6.4.7.2-11.el8.x86_64.rpm
1e971ec9733d2f2b0a8104b330cdb12fb0279f7180126f3ae02c045bd559ebd3
libreoffice-langpack-ga-6.4.7.2-11.el8.x86_64.rpm
d2d3b4d019c6dae924c0213ea715ed91e3097bec26584bb57abb2909ac6ee004
libreoffice-langpack-gl-6.4.7.2-11.el8.x86_64.rpm
d474863b26dd82ba714788d8a5446babdf74577a209545c4afb37d75f37e50d4
libreoffice-langpack-gu-6.4.7.2-11.el8.x86_64.rpm
9c21941139e520fc8df84e541874189de039beb2699f7b2eaa6b33810a8c8b73
libreoffice-langpack-he-6.4.7.2-11.el8.x86_64.rpm
c547e3730b7df5e9609bca51e1aed8ac056072c0398fccff9e35baf50d120b75
libreoffice-langpack-hi-6.4.7.2-11.el8.x86_64.rpm
90364bc4907ecd68d76e456ec4aba8fcc0ac6145a65e9528f16331463dc3993a
libreoffice-langpack-hr-6.4.7.2-11.el8.x86_64.rpm
e1053f16476b87fd20df4afb4b31babceba72ac39c606b3e4783447a9eb10c5d
libreoffice-langpack-hu-6.4.7.2-11.el8.x86_64.rpm
a47a5652b3fd1cbd20e81f01864bf30882dcfbb9b488686917a6a8ee4964d7b5
libreoffice-langpack-id-6.4.7.2-11.el8.x86_64.rpm
e5fc6af405d73ed4acd1f8dbf26dc90193f37f76807b886fbbef762969a6d908
libreoffice-langpack-it-6.4.7.2-11.el8.x86_64.rpm
2278b30d85f696659b0a8b839229139595aa4f084133f5874b892e336ca4baac
libreoffice-langpack-ja-6.4.7.2-11.el8.x86_64.rpm
4a6c68d4cc66833e63bc094270eaf56aa3a4c18bf6561553813a1503a59d181f
libreoffice-langpack-kk-6.4.7.2-11.el8.x86_64.rpm
7e0d56cad92910078122a661f46d2d1d47b3876e5372473ecb61f8caeaffae4d
libreoffice-langpack-kn-6.4.7.2-11.el8.x86_64.rpm
b9d9eda16e0193f6c2de880587875f1f717a73169bd3628ed262f38e5c61c78c
libreoffice-langpack-ko-6.4.7.2-11.el8.x86_64.rpm
7ac0e0b82cf9490d634ebf46652992767434abb4df8ee1e7c4fe859ffcbabc78
libreoffice-langpack-lt-6.4.7.2-11.el8.x86_64.rpm
94ef0c95d3a2fcad1446ada35b9a8e3c2856deaed94e74f511360d24c229a1a9
libreoffice-langpack-lv-6.4.7.2-11.el8.x86_64.rpm
c9ac8ea5cb09ce99cf6696aea58f8c41184a8b13196fb89e1ca710d443cac54a
libreoffice-langpack-mai-6.4.7.2-11.el8.x86_64.rpm
b84546e33836b08193ef9f21ad24b890acdb90f00f4e04f605967b9968056a02
libreoffice-langpack-ml-6.4.7.2-11.el8.x86_64.rpm
01a3ac316f6787a3954c127250bb120a664dfdea71cd7d29a0ad2228da5b7ad2
libreoffice-langpack-mr-6.4.7.2-11.el8.x86_64.rpm
74bbfebf485064a916d2b177296680da70f16201f5782251e08afb1a2dd4aa33
libreoffice-langpack-nb-6.4.7.2-11.el8.x86_64.rpm
7596e0be67731a86d23baaa48653a88f1c9f58b7866058718a341a9ff539eda3
libreoffice-langpack-nl-6.4.7.2-11.el8.x86_64.rpm
e0425b68617eac2cfe1f4778b57fbc91829bd4705ad1a46117153f6790b19676
libreoffice-langpack-nn-6.4.7.2-11.el8.x86_64.rpm
54246c31a82ae4a834c4e443f69f8208dac2b7a0f07ec9a2566aae5375987ffd
libreoffice-langpack-nr-6.4.7.2-11.el8.x86_64.rpm
8ee2cb7edefb120807acf38d12b9266110f9d8f038e3d3d2da3d94775743a61a
libreoffice-langpack-nso-6.4.7.2-11.el8.x86_64.rpm
3d3e1c098ea29f4b056e16f88d478dd1889ff2ddbca105d3cb415b3cdc10784b
libreoffice-langpack-or-6.4.7.2-11.el8.x86_64.rpm
2bd24705f08d7fa3eed46b80b6862f879a3275fe47937b4cd709cc121bf3aeed
libreoffice-langpack-pa-6.4.7.2-11.el8.x86_64.rpm
b60f858a2490f6e1c129557dc27f9a5c4d0db6b5dd7ca16b852b4f61b22c2514
libreoffice-langpack-pl-6.4.7.2-11.el8.x86_64.rpm
6be7e833f030e569a69abd3f365bf6bad1a0832fa06e0aa8b55afdb138cd3a56
libreoffice-langpack-pt-BR-6.4.7.2-11.el8.x86_64.rpm
8586cdac51a23f6191ed5ee0902f1013a8d89931a5485348bae81787ce3247c3
libreoffice-langpack-pt-PT-6.4.7.2-11.el8.x86_64.rpm
1d398544cf751db220dc57b0cede75b98b8fde4905f30480f3c4b346d96fb356
libreoffice-langpack-ro-6.4.7.2-11.el8.x86_64.rpm
01809b70aef0cd108de61e294d9dec7987cd29498ff227973545b781ff8be96c
libreoffice-langpack-ru-6.4.7.2-11.el8.x86_64.rpm
4120bfe2987a8e3686239e55cfbadcb75b46dbb052456987a9d3af4164278652
libreoffice-langpack-si-6.4.7.2-11.el8.x86_64.rpm
9c5db83d6d161c13fb6db8ffa620aa98028a72169e62c533a662417b86fb72a8
libreoffice-langpack-sk-6.4.7.2-11.el8.x86_64.rpm
42816f66e0b3add535d723e74ef474715559bdcdf50ea6bbf8baac0c46e7f035
libreoffice-langpack-sl-6.4.7.2-11.el8.x86_64.rpm
bec9e82d634f585a2bbca25637ae8f552120f00b167d15ce95fd414e9961d2e2
libreoffice-langpack-sr-6.4.7.2-11.el8.x86_64.rpm
d66eb1c40feb6849926c06c7ff09d0de1868b7a013c62d74eb3c8bfa40509571
libreoffice-langpack-ss-6.4.7.2-11.el8.x86_64.rpm
40c16a683107387c4eddc0bc20777b63451f010c89efe29a53bd8502c5a1808f
libreoffice-langpack-st-6.4.7.2-11.el8.x86_64.rpm
35455447bc8b151b54be32cae0d0ff05ac977560e4b63f5ef08c00280abc6d44
libreoffice-langpack-sv-6.4.7.2-11.el8.x86_64.rpm
7d0cf2fb10d71e4516316ada6dc0fb2056f95acb9cb11a2802f9b68798b4ccd5
libreoffice-langpack-ta-6.4.7.2-11.el8.x86_64.rpm
9ceebf7aaeaaa9b5b8d0c8d0f22cdd574aca4a5f6dfda7bb0f5de1cf4ac4d0a8
libreoffice-langpack-te-6.4.7.2-11.el8.x86_64.rpm
f0979c16747675ec447148eedc8e8bc8911995ab920e1c160ac92037ee14697e
libreoffice-langpack-th-6.4.7.2-11.el8.x86_64.rpm
b9130736d9c55c76e97a44e0dc962a8031d7e32ecccaaa748e7480df8e388a27
libreoffice-langpack-tn-6.4.7.2-11.el8.x86_64.rpm
86146a3ed6873845b74de241424108cae0d08fc2c7455f54da13f6f9f1b38f48
libreoffice-langpack-tr-6.4.7.2-11.el8.x86_64.rpm
471572257f239e4bf9d45b3c9eaaf0a66b7770503b10244134fd341588199ee3
libreoffice-langpack-ts-6.4.7.2-11.el8.x86_64.rpm
eab92b10daa3e4e1f91b45e5974610165513d85f77f72901cd8eacf4974ac4ce
libreoffice-langpack-uk-6.4.7.2-11.el8.x86_64.rpm
8443da58a43ab69132adccd4b6c4e1660c900da203c7d6d282f127848fc7c9b3
libreoffice-langpack-ve-6.4.7.2-11.el8.x86_64.rpm
b322b352715b61ea3cdca2766ab860131b54b5a4e2d403c62f98c4a9469ec913
libreoffice-langpack-xh-6.4.7.2-11.el8.x86_64.rpm
f059618824618d09a8b2775aa0ed08d9e968e6f0cd4a6f87d45528e89e8e37c5
libreoffice-langpack-zh-Hans-6.4.7.2-11.el8.x86_64.rpm
0a34d26627c8afa66059c6ddd5b5c3344f5ca01858b0d02c99d54af1c9c8d757
libreoffice-langpack-zh-Hant-6.4.7.2-11.el8.x86_64.rpm
d24444aabc7278a7c20c8a3000d6dc6921a21a511e4ca669b51110ae27af21db
libreoffice-langpack-zu-6.4.7.2-11.el8.x86_64.rpm
c466d26a5deecbc1e28a950d03a3c15c1ee964afee2821f74426fa9cf8675dc4
libreoffice-math-6.4.7.2-11.el8.x86_64.rpm
d001266648ce05a1235e7028d84898268905787686ee7faabdb72cebd4645803
libreoffice-ogltrans-6.4.7.2-11.el8.x86_64.rpm
7b4ab27cf8d16d626049f9cc4016f6445b1f3950f7308e122ec73b9d2a92b70b
libreoffice-opensymbol-fonts-6.4.7.2-11.el8.noarch.rpm
a8a0953db5c80d1181a2974203ff7928e87b59f36dee3ea0e9e46b861df14194
libreoffice-pdfimport-6.4.7.2-11.el8.x86_64.rpm
4173256e429df5eb0b28dbabe2a961612aa840b9d89b0b11f2b5cea8a2305113
libreoffice-pyuno-6.4.7.2-11.el8.x86_64.rpm
bc96cfc8ccce93fd6fa9ec61d1fd02f164893754bac7e766e3655c02a8e898aa
libreoffice-ure-6.4.7.2-11.el8.x86_64.rpm
008dcee0c499355dc23ceae84b819be63f3a245052e46068af0b6b0aad3cee72
libreoffice-ure-common-6.4.7.2-11.el8.noarch.rpm
53f00b7b2a3878e3bb85034aa804ab7ed697d4df342ea1302d1e301424173c08
libreoffice-wiki-publisher-6.4.7.2-11.el8.x86_64.rpm
87121150e754e030e1dc88f7dc4c7c4b3632cfb8cdeaaeb90fe407ddd044e313
libreoffice-writer-6.4.7.2-11.el8.x86_64.rpm
42e7244e1d162abbda7a6e4e3acbcc11a880cfb8692ce5ad8aee842026f05dd8
libreoffice-x11-6.4.7.2-11.el8.x86_64.rpm
32e691c44997fb0530c0ed4c9ba40ad4eb6f9c4a471640f11560bb1c610199d6
libreoffice-xsltfilter-6.4.7.2-11.el8.x86_64.rpm
eb29356082fc1eb03f733e03503830625f605aec1673daebc65a6db85c3cf191
RLSA-2022:7464
Moderate: protobuf security update
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for protobuf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
protobuf-3.5.0-15.el8.x86_64.rpm
bbe6424af46d5510d24c8e9c5d9198ac1b130582bd806a32b37d4308b803007e
protobuf-compiler-3.5.0-15.el8.x86_64.rpm
e8d6d89ce0937625dede41e2543fe7d68e9057b110c286da3f8ab570a42e577f
protobuf-lite-3.5.0-15.el8.x86_64.rpm
8c7dd42b7cb65b53a24b1c730699b4d443b2b5191fd07885dd5e568a59f6c511
python3-protobuf-3.5.0-15.el8.noarch.rpm
032353658522c1218db3ba1b8bb3fc2e1f7b9c01e0c7258faaa0a44da15f1806
RLBA-2022:7465
nmstate bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nmstate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nmstate-1.3.3-1.el8.x86_64.rpm
63466af6734f4f6c8cc09b9eeca17696fd0cb24a4cbfb52712c67c75d3c35c61
nmstate-libs-1.3.3-1.el8.x86_64.rpm
6a78b43ecc69f3e2fea22391a2e3429e739541e2705409ac22750ba029d0d922
nmstate-plugin-ovsdb-1.3.3-1.el8.noarch.rpm
c1654ca5dd05c18d2cb0da8506c7ba67d8548f6faed407cc386bf20b49d7bfe4
python3-libnmstate-1.3.3-1.el8.noarch.rpm
49b701eec6829bd48c9f2399ffa7f77c2bcd30b8ced4648d2f2a51cbcf3f863a
RLBA-2022:7466
network-manager-applet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for network-manager-applet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
network-manager-applet-1.26.0-1.el8.x86_64.rpm
6de3fb69095b578fc44818250cb608ff5d1eafd2971b5919789a0f0af9838f23
nm-connection-editor-1.26.0-1.el8.x86_64.rpm
573a88541d4fe6bf303cf3f6ca9971252ffc8781b1a8dbfdb24e48a63d9f7624
RLBA-2022:7467
annobin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
annobin-10.67-3.el8.x86_64.rpm
001814c01eab83a5008379e3f6092e31d6df9948bab87770ac6e1c04bc8c4877
annobin-annocheck-10.67-3.el8.x86_64.rpm
5af4367270a02b2aee39756ccbcb6c37cefabf6bfaee61224595b7c5b7b849f2
RLBA-2022:7468
libnma bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnma.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libnma-1.8.38-1.el8.x86_64.rpm
fa9f87d388e229cf8b3611d5d5d6db249bcc97f807fc25e5fcfa68e76b49054e
RLSA-2022:7469
Moderate: container-tools:4.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
8fb2669180d717578f5407e383babf56b298d037148cf7d9c0bd7f819a707601
buildah-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2f25ea2a6be5c7011a1916c56ff82621deb8cd1d6f0217706778357723366905
buildah-tests-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
ddf136a758c754d1fd72d1438e3c92e44b6eb6b97f825cbe0d8e819e04ab1d73
cockpit-podman-46-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm
31b189daa75aaa373b83e652622ebecc62fb8e4f76e9af1a266b3c90d4c3f9ff
conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a
containernetworking-plugins-1.1.1-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
66a46e625dfc054cd5870d6167e113d10bb59505276e810ba7da03a8db35b55e
containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
a0a9eb3a59768b77fa3790a555c1fb3f3b221258a5703418c0cd05b65245b4c9
container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
5053642b22732a14803ee43bcb11874bb3771e7bc9a4ddac6f46ffdd3543a154
oci-seccomp-bpf-hook-1.2.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
e554c656d1081836a1cb7ba203733908cd2d6962e5d44444ce830f7390fb18ba
podman-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
490f60764e4fcbd8023ea76f67ae1388251b4652f3fb943722ced31cf84fdf0c
podman-catatonit-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
52bd88d63cbbc3baaceefc983b99f22f9dcc35d413fe6bbca4546d7e60c0033d
podman-docker-4.0.2-8.module+el8.7.0+1077+0e4f03d4.noarch.rpm
10a7c81ad06ae9dbdfda484dd13565f7c22151ea91a079a1ad63ed2e531da66e
podman-gvproxy-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
42d506b86c4af61e6a5ffff7af6ac0a4ee9f22755927088e298554dbc3fc1eb3
podman-plugins-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b758f026bc43ab5ace11b05645d519087a5ec14e826a5d12f9f49979dc3e0a1d
podman-remote-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
f533129f039cf6cb7f2d4d3a961305ca1f6b731f5d60994486a27d958780a293
podman-tests-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d5cdfb3bee10883d7db12f92d710a598abcdb3a607790d54f5706f5bcd9bf581
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm
0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1
runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856
skopeo-1.6.2-5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
00879c92217e659f1ab2e92d2b65b8f09c2db2a4b690cc63ee70ac2f5a8af06b
skopeo-tests-1.6.2-5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
3692622d7758eb5d1b23030258ea1689ac1c7b55d93e241db3a43fab9eef329e
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
toolbox-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4070fc688f1a94fb09eb2d1d290c15aa06cc523a40ec39a6eb2c6e2a4a49cf14
toolbox-tests-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
f2ac5e105f0c039a157be718b529c5c0d1fa6478b678cdafb95ce6388c006700
udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm
c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b
RLSA-2022:7470
Important: pki-core:10.6 and pki-deps:10.6 security and bug fix update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm
479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85
apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm
3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722
apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm
20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d
bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm
7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1
glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm
07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524
glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm
3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7
glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e
glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698
glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be
jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9
jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73
jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9
jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca
jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a
jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm
064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706
jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm
f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9
javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60
javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm
ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7
resteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpm
92ea72f7a67d5de0fb940e1cbbc36752c56f02d056915d35be500fe51e146e6e
slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a
slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba
stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm
972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18
velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm
568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882
xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm
8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26
xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm
f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8
xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm
d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783
xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm
143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26
xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm
31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e
xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm
6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9
rocky-linux-8-x86-64-appstream-rpms__pki-core
idm-pki-acme-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm
c75bd19936084ad802be1105482da2be5811f29ecb13560b7ee81faa8ac1e980
idm-pki-base-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm
02f3a3a945b31588eb0dee689345d951d235c8768466eccfef67c5c39a0d5948
idm-pki-base-java-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm
d44b53d8db698569bcd73ebdd90d4cb3f04803e2311b1808b2a57270ea3abaca
idm-pki-ca-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm
f3f37d4f225cb537289d5e672623ecdc73fef5d5e23fa5dccf2b719a7e96a7f9
idm-pki-kra-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm
26f54074d17e768bb73d8cc8a002cda1c2afb6e0bd8a4398b72ebb9e4beb7f2b
idm-pki-server-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm
3393ab8263567bb27c4a17f9d65107219ecd399e3a6eebeb65fc665e141e4a31
idm-pki-symkey-10.12.0-4.module+el8.7.0+1069+6f3de942.x86_64.rpm
07512c1525c5c5f2e8d0cd8e854a10cfe6bea277397011d10161b6a49bbaea33
idm-pki-tools-10.12.0-4.module+el8.7.0+1069+6f3de942.x86_64.rpm
59ad86761970d0125faf88d75fd1ebf7ce377cc3bc004dba6457a259f47c1978
jss-4.9.4-1.module+el8.7.0+1069+6f3de942.x86_64.rpm
639900844e2769e46d074053aff869916a34bf1c396dc8a068585c9b06d50654
jss-javadoc-4.9.4-1.module+el8.7.0+1069+6f3de942.x86_64.rpm
37da27e63ac0c3f7440ffac703a02e1efb8689438552706bb0b53e661cd8ff87
ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3
ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm
15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f
python3-idm-pki-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm
33551818f77ff11cd3b0f352418bd7a4ebee284a87ddb8ccc709d726972543ff
tomcatjss-7.7.1-1.module+el8.6.0+788+76246f77.noarch.rpm
086e5c953de53c42f6ae4abcd32e4c9126ba1dd9a028a7a2624a7d8bff1fa27b
RLBA-2022:7471
libestr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libestr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libestr-0.1.10-3.el8.x86_64.rpm
e1e6d6fceb008a0fce814e9664a506b16325c490e608f3e6fed42a26f7058f7e
RLSA-2022:7472
Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828)
Security Fix(es):
* QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)
* libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)
* libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)
* swtpm: Unchecked header size indicator against expected size (CVE-2022-23645)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828)
Security Fix(es):
* QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)
* libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)
* libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)
* swtpm: Unchecked header size indicator against expected size (CVE-2022-23645)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f
libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45
libguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
4456694874c9d7346f28a9f1afa1a3456df30b16304fe183ff42190cd9e708c6
libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f
libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd
libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f
libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645
libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
3c9d51c249abda39f7eb4c3a9e7aec28fd90a7bbebcade157e9bae228e0c99fc
libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0
libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b
libguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
0c1afa84a2ce7357193c0eae89c65ce30a9e143e7ead6c774c16371f58da4ea4
libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
e6cafc935323470c7f0fa1156693ff1fb9816931387cebcfc33057f1f535fee8
libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
f45396ca362fd4fc35b9f14babd32cfaea1321a6417308a1292f44d1224898f2
libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea
libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100
libguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
5d5c05f7f8470a00208277eb34687306aab70af2ce1bd57ac78528e631505f59
libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm
b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52
libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0
libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
ea41423cb9ccd317d1a5ebbcb070b9e1a74f99ecce9c3e5051267bb64c188eee
libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
7ed71d62ecf427822af3a0b9e20fc93f9e05bf2004fb7be9511d6ab5e9b3de7d
libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
0ce8f2e8e6dca56e8a76186d1dfa73130956079bfd6f2818c1ee50944fc0b416
libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
d0cea4e0b6167849fb7edcb91531b3716e01887bfe9faea099bd0b8c7fc51858
libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
0c0d39b5bfd236922c883c4367c39d9c711ccdace73f36ece10088d466b889de
libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
092bc77167d3a1d392f4f214a08a4eaec63d5b25c12f7f3f0850b48c2de205e5
libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
c484e35d7ad61b87ad9662109aecb110158136240c797bbc126dae3078f4414a
libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
830a30966b383cdc2ed0cf28870c8af581d8a2b1dff4d0ed3fc1b4e6ec9941b4
libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
1f37a92b9f136ee4e4fc8f9bed72ca1cf858bbde132596cd5fcb789018e40a8f
libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
97350f3e49235032387990bfadb529874b4cc8fdaa39edc6f13d69e36253b4ad
libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6df6e0e49b97c69ff5b065e574b4c9eaa08c0ae4de46832fd1dc5c8b19abe6c0
libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
e8d54db9bd04dc675d8b44bab42de599af7c56fa68d5715135c1742056a0c6b3
libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
c87e4f8cb42bcbe09ed1c043fe3d57ffd7bc2e7f5adc56814651901db5f79a40
libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
ef4b347f15c6ab94fb348337c7856ba6acad1fbd7d425486741be6a5640a73e3
libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6c4b97bcb6b615b8c2bf886459f22fe782c05d2679c56fc1808e044feb60658b
libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
087db2ba93134a2c732b4fa5fa37b3c9fc2369447398a86a1a6c10de5f467609
libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
a791d8f7e3badb26d0385db4d3c03fbc0c8c800c6f5e4b984c3fcb093ba36d15
libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
57a656c3775cd30fb0e46818c56616b2083bb5a6fc1268ef52cb2ba0bf11968d
libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
b382f68a7b9146a952801ceeadf99f7ffacd5b3cdff873278f4c5e87dcf12169
libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6233e0708101c4fab6f867a5bd7081aea83c1b813f0b73b27d2dd066424feab3
libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
cfbadecd26551afc63bb73ffff83ed1a575276d71fae78783579b7200030e03e
libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6118db5d391e5ea27aeb8131ed3f596d918706291f0cb7a0ad2df37aa7d8eb26
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
e2a47a6cd93b6be3cb6cfe5b2db5852bd9934cf0e959f37ee82ac6bbfadffe93
libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
4330e66821e29bc2d1412a0480aec1bcdc1f942a81da56d43653bfb9172d9636
libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
fd055f2146f2f2210fe413dcd3500896cfaaa4683cdd3ca9cb6d130f0eb56e51
libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
5853e8e20b37b510049a488594a5e92bfd022747013a2854fcbdcc21bae08757
libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
decc7c7175a8a8456aa9fcb8aa312d9a0aac9657b8cc8a427af79f203bcaf0cb
libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
108e8b905f821306c1a18e368b647482898b6726e56268f57f967ba8ca263ee6
lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm
eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776
qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
f53d318c4b0613a22aebf4e177ad1f9105fce5fd18dc993e0229980aafc36b93
qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
c6429b4d1d9f6ac6162a7b0a6686ed3f2e1f856b1819d953dd73fc7207946275
qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
0adb29176532c04f3da5718b171484e4116fbdeb09cda55aecca84efeb2a8e98
qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
5fcca46736dc69adb0f7ff4f057607527a15031d5a13d87446cd377dc6eefe04
qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
9625fe3e4a5fffecfa1eb5b6451dd7c5a666bd468c0032198ba9dcefd2fb62cd
qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
d587a9dbc9af15a3c4408189098dd620294b95f6673b0614fead295697e1b4d3
qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
13cb392b10b20cfae2cdc32435b6177b26180bbe18ad6108cc9af993090a6c4f
qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
5ac7b977816ce165fed7737e3aba3bab5a7150730d979f1d12fb4d1a7ba62832
qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
f4cd7b44410c2c3a1c15413d45916901c818cdd79e8bff1535c416a4a74b3d33
qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
9f1769ac46cca5dd72edd4f2d7cc088d5c10dea45ec6802835aee4b2cdb0e79e
qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
e38d06d10d96bf278ce730343fd70de5c90521a564c7b739839c1e24f78a0dd2
qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
161c40f475f3129578d666dc0e8019573443ef59be07e7559618b7ccf68fae31
qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
76329de8d248dfe414a30907f835662cc25fa1bb03823724d7a87c3f32aad717
qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
631ac3650401c6f558dff57a24626a58aa7ad05e7dc8549e8bde07f483087b02
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada
supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70
supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b
swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838
swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf
swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe
swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9
swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c
virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4
RLBA-2022:7473
redhat-rpm-config bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for redhat-rpm-config.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
kernel-rpm-macros-130-1.el8.noarch.rpm
9cd56deb5481f895537c65561edbe8acb12712d430da972565fe349fe213c5d1
redhat-rpm-config-130-1.el8.noarch.rpm
1fd4e15c423d85b224c0baf80bcc6de17f38a01636cd4ecaaec81b8e405065fa
RLBA-2022:7474
pcp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pcp-doc-5.3.7-7.el8.noarch.rpm
5801ed335c4b6b87b650b867866987aefcc223f191fb044938a89e6f29868e63
pcp-export-pcp2json-5.3.7-7.el8.x86_64.rpm
7f6c8907c4010774ce95460a05c58da2ac493943168eff189beb3546d7274805
pcp-export-pcp2elasticsearch-5.3.7-7.el8.x86_64.rpm
e1049e0e49a43d39b9d0a550b3c6d65356ee2a186a64d9cf8e3a81a2a563b232
pcp-export-pcp2graphite-5.3.7-7.el8.x86_64.rpm
b118fcafeee32bd85c199e196edcb04c4215fc393860148013d28f32dd3d4fc8
pcp-export-pcp2influxdb-5.3.7-7.el8.x86_64.rpm
1eb430a6942f94f8c246f0b64b49879f076a9211967ee1170283a4416fb155db
pcp-devel-5.3.7-7.el8.x86_64.rpm
53ed873be0a925f576b7373bd6e5b82227406aff0f7bd6d92e609ad40661f00b
pcp-5.3.7-7.el8.x86_64.rpm
00ebd7b43bc8a1b8c881d0c1d90752e7f9bdea90c55d4d6bdd960b52d2721d6b
pcp-conf-5.3.7-7.el8.x86_64.rpm
dc498244e321fa312f5fcf7006dfa5c0c7845bf1925ecfd5d6c393ed60ed69ba
pcp-export-pcp2spark-5.3.7-7.el8.x86_64.rpm
f2d5bb86bcc8ee31ed2b79beebaad4cc1dbb561e6db017857dd5b7beb06458b2
pcp-export-pcp2xml-5.3.7-7.el8.x86_64.rpm
5f964378221649516161216e7186f07f765f8812f51752b3548398444031616b
pcp-export-pcp2zabbix-5.3.7-7.el8.x86_64.rpm
c6dc535961e350604a665fe860315640b2f0c92e49a283cba3f7ab54e2e3e712
pcp-export-zabbix-agent-5.3.7-7.el8.x86_64.rpm
35c42db07bfd2aec133c643626ade46fb99c1161eb68ed0687ddca0d355b27d9
pcp-gui-5.3.7-7.el8.x86_64.rpm
2b7d06926848b9660823faba8921967bbd086cef56ded0fd2ac80285f4f64e7c
pcp-import-collectl2pcp-5.3.7-7.el8.x86_64.rpm
9bf437967b2f1ea1bdb71d0c9cacbd4769f5d51f6fe5fdc0e974da18434885fd
pcp-import-ganglia2pcp-5.3.7-7.el8.x86_64.rpm
9b78bddabe9eefa71861c432eac7a7b204ec400c4fbba29242ef0ac020617cad
pcp-import-iostat2pcp-5.3.7-7.el8.x86_64.rpm
02fe9376a1032c9103eb11733f9f08102b987d2315b14191bf264b1299c10b40
pcp-import-mrtg2pcp-5.3.7-7.el8.x86_64.rpm
fa014a3f31fc1ca1e5691b00d83739b3b98dc9af771fa697922320edd29ac72c
pcp-import-sar2pcp-5.3.7-7.el8.x86_64.rpm
3560e51b6528e51c36475c5949281077b881fe901ff1aa244b90ec6f364f7926
pcp-libs-5.3.7-7.el8.x86_64.rpm
9e17bc46a551e9edbf052b7b61639eca23fe433e0de7dc83b0bcba2cc12df00f
pcp-libs-devel-5.3.7-7.el8.x86_64.rpm
ca7ac79edf9b392626264422415265aac1b7c389085b94fdfccfd23359b46028
pcp-pmda-activemq-5.3.7-7.el8.x86_64.rpm
872e8abcf6fcc6c2a00990999d551ddda31be1a91d1e4a03ea6752b47fbb546f
pcp-pmda-apache-5.3.7-7.el8.x86_64.rpm
67d4640cedb9b327455eb3df26a6a2248561fe24391785db8bba26d3156ce6e8
pcp-pmda-bash-5.3.7-7.el8.x86_64.rpm
51facfa1c869ba09f53e3aa70900fc2f701a4321ec94d5d1687c70bdbb73e512
pcp-pmda-bcc-5.3.7-7.el8.x86_64.rpm
15817e139b5918e6503548f997a23bd7a540728ed25efef4a3c9b7b07adf5423
pcp-pmda-bind2-5.3.7-7.el8.x86_64.rpm
ea7c47bd76ea337e05476c8bc72c1b3df4f916efb5f3fbc453ef5b22a58e34bd
pcp-pmda-bonding-5.3.7-7.el8.x86_64.rpm
eabee9b7c021e2f1b2d78d634741220b1d5ad90508ed38d571eb68528fb8956f
pcp-pmda-bpftrace-5.3.7-7.el8.x86_64.rpm
614fc74fb65feb56a18aaffcb9f14737e0233a9b937be0ef9322f6be6c93fd3c
pcp-pmda-cifs-5.3.7-7.el8.x86_64.rpm
e9240900588e11d294004c9474ec240b680c0fa8c53d85971ea428ade018db04
pcp-pmda-cisco-5.3.7-7.el8.x86_64.rpm
6ab58ef8e02de9a0ab041ad77a17b93e036a4055f5599baa89122094afb6f44e
pcp-pmda-dbping-5.3.7-7.el8.x86_64.rpm
1ed8819ef1bb7b9d0cf2f3b6fa0fe03614235ebe1bd7d9cb43f01d5ab2daf80b
pcp-pmda-denki-5.3.7-7.el8.x86_64.rpm
de66b1141ec48dd4ce4ea4bc73e9796355a6f87c4371aecd197d81d360fadacf
pcp-pmda-dm-5.3.7-7.el8.x86_64.rpm
e7116371b14ad7f2d12b53b973bb4835916810bc23c93cb8ffbbb99251df158a
pcp-pmda-docker-5.3.7-7.el8.x86_64.rpm
eb41b394a2cb327dd5cf978e5e5442fa61465d0a2c7a7c936c92b442111a4a5d
pcp-pmda-ds389-5.3.7-7.el8.x86_64.rpm
a18e9439e2cfa458108c3203231d54289504963cb558277b2ae2adf1419572c1
pcp-pmda-ds389log-5.3.7-7.el8.x86_64.rpm
5ca961ca4a3cd832154e978a234b2366aeb821c9d386c50f7ef5f126dbfe4ef2
pcp-pmda-elasticsearch-5.3.7-7.el8.x86_64.rpm
07f3370cae783f296f3ef63f461b828440a14c0d97f5c05993c34afa7d8b27bb
pcp-pmda-gfs2-5.3.7-7.el8.x86_64.rpm
b81dea7bafdfff3b5153ad1c2bfe01b4e5be4ea7b4940ff7e126c126bad0650e
pcp-pmda-gluster-5.3.7-7.el8.x86_64.rpm
5f4005fa3a78eb4a30877aa3ace5d1c663f3685699c17d9ad24dea89af231a87
pcp-pmda-gpfs-5.3.7-7.el8.x86_64.rpm
373e6c36ff883952ca43c985667d6d22b1460bf23c825436695b61f6f82aabec
pcp-pmda-gpsd-5.3.7-7.el8.x86_64.rpm
c7dd1e16b62800b5941b53b9f6f965ad6d96f54f9220eecaca89ee4d841ce5af
pcp-pmda-hacluster-5.3.7-7.el8.x86_64.rpm
560a0f7086af3c8c812fda6105d9ec9d17284549539db3ca9c9982b59037bb2d
pcp-pmda-haproxy-5.3.7-7.el8.x86_64.rpm
efe061e03e82e894a6e563896bb1a55245aa4a7ab5ba5862ff46ae032ebba3ab
pcp-pmda-infiniband-5.3.7-7.el8.x86_64.rpm
66d153a49faec50aaa7b5d439c7fc86f34f2ded2828169e06d2964550c955cf2
pcp-pmda-json-5.3.7-7.el8.x86_64.rpm
902a782334542230ef69e996a6a1d1b853789798ea3d1643b51e6ba2b6d7b288
pcp-pmda-libvirt-5.3.7-7.el8.x86_64.rpm
8f2643279569d40fe30d06aee546598a6c1bef045eab4780a0c4bdecfc5b7119
pcp-pmda-lio-5.3.7-7.el8.x86_64.rpm
9d335fe1edf4daefd1ae9476b2f37ae9127de91848d181a3a0254fc336bcad9b
pcp-pmda-lmsensors-5.3.7-7.el8.x86_64.rpm
05f540c9b787a785d7d3cdccb846a2ef395961cf380859a564cab572de1026a8
pcp-pmda-logger-5.3.7-7.el8.x86_64.rpm
409849d5599e3fa27ac740cc80ab2f78b1f48c136d15c15d92f189022c5418c9
pcp-pmda-lustre-5.3.7-7.el8.x86_64.rpm
752d7c1012c438e765c2592ab3feccfb1c25f919b3bd5f5b323c0e8bed47f00e
pcp-pmda-lustrecomm-5.3.7-7.el8.x86_64.rpm
783458dec76d9e1747586260565105804723d3691e05e7e8ef3e638f8debc494
pcp-pmda-mailq-5.3.7-7.el8.x86_64.rpm
854e15d307eb44a6d3327fb9f361a0a565bb86841ca1ad9a7db790e5d7178990
pcp-pmda-memcache-5.3.7-7.el8.x86_64.rpm
5b7d46fb1b55895b98cef386fbf0105d9252952fc140779b57a4000b7f54eebd
pcp-pmda-mic-5.3.7-7.el8.x86_64.rpm
d64902cb5d41f559ce5d33d0db74f0f78e4b6f23720c479e07e6dd357f6e97cc
pcp-pmda-mongodb-5.3.7-7.el8.x86_64.rpm
6ae518e8af3587d018b42fac33081762609aa6beccf4fac89cab91cf44fadb79
pcp-pmda-mounts-5.3.7-7.el8.x86_64.rpm
16b938aa3e8180b94e7f2767cff2c0812c3a743bf825fded52678f6394ccf323
pcp-pmda-mssql-5.3.7-7.el8.x86_64.rpm
3123ce8d083dd4ffb03eb5ad07a9e1b793dcebe090dc26c960849a5a5d2d3442
pcp-pmda-mysql-5.3.7-7.el8.x86_64.rpm
245dc0e620170830161c3fe8209cf402ec1f978cd40980fdbf262660ab056d82
pcp-pmda-named-5.3.7-7.el8.x86_64.rpm
064f4f327642f255dde1ef4eef4f04920c6dc47a8953a8f2f5bbfcf774d769ab
pcp-pmda-netcheck-5.3.7-7.el8.x86_64.rpm
2424f1b2fb83f55878bdd2eeb2cfa2cea5416deca67c1748419b90d218e53201
pcp-pmda-netfilter-5.3.7-7.el8.x86_64.rpm
af97b89d79002cc54cb2495c53edca7feca94a4d8213d3b7e76e6584b3e65cbb
pcp-pmda-news-5.3.7-7.el8.x86_64.rpm
f11571ad54438d2b54796baecdfe3815420842b39b2f8199681ebf10a57361c4
pcp-pmda-nfsclient-5.3.7-7.el8.x86_64.rpm
35f0478d71860dd5735407f6efb74dd9f4ffaa35d6e4c5a103bef9825743a7c4
pcp-pmda-nginx-5.3.7-7.el8.x86_64.rpm
e78b31685a0d0126fda6c4ca67102e8fe17aa5c0e2c24461e9dc58eb7ae6c025
pcp-pmda-nvidia-gpu-5.3.7-7.el8.x86_64.rpm
a0903ccaa5d73ca885c7b6c9238433dde0f5ed22aad7c713692808fb369a6f9f
pcp-pmda-openmetrics-5.3.7-7.el8.x86_64.rpm
acda2ced8cb0e5cf25c340ff68af62118b2b54d631fb013bc3e49d87c867fe57
pcp-pmda-openvswitch-5.3.7-7.el8.x86_64.rpm
4019049bd7536ef2cfcfffdefa1ad20d14497e9ffb1b8440c0515570f65e8fca
pcp-pmda-oracle-5.3.7-7.el8.x86_64.rpm
265ba7ec8906991b9d82b8741eb06a19cd09870f5e0e0f4d455805226d66d4a0
pcp-pmda-pdns-5.3.7-7.el8.x86_64.rpm
03cc10c9c45397426a6f341eb3e2281b4c40afa120de3f60e6a115d11280a9cb
pcp-pmda-perfevent-5.3.7-7.el8.x86_64.rpm
5c46827714826ad2e46ca438832372b68756a23b2a814d232c24e004cb22bb8f
pcp-pmda-podman-5.3.7-7.el8.x86_64.rpm
f98fc7f25d25d301001a221af560a5181ee3c28780b2b7478031856797c3cf97
pcp-pmda-postfix-5.3.7-7.el8.x86_64.rpm
6cb13bada18d1817a51e19ce494ad14a965904a8f2a5426aeab20f744402b7ac
pcp-pmda-postgresql-5.3.7-7.el8.x86_64.rpm
2e940c0bbc810fa465555a3ff028676adfd86f02a999464e2cd48b056eeda51c
pcp-pmda-rabbitmq-5.3.7-7.el8.x86_64.rpm
715ab60a7c06980e5a05777b2d4697269ba1776d561b75c35e66ff0e1f8c8531
pcp-pmda-redis-5.3.7-7.el8.x86_64.rpm
34f3c72cc2046583e287fcf28ccbc00d8e08398f9699e56802942a0cc292e62b
pcp-pmda-roomtemp-5.3.7-7.el8.x86_64.rpm
ef99347ad293640a26a44dc17d1e2f7abc94df873ce5ab70aa77ac9578e449b1
pcp-pmda-rsyslog-5.3.7-7.el8.x86_64.rpm
53fad6bb65b717420b8ee72d4a95498d4b6a1ca55c390044b91e2acc5509462e
pcp-pmda-samba-5.3.7-7.el8.x86_64.rpm
87aaf1312975daf6af0ffa6a579ff34681c7efd432b454f92290ca771cdc1107
pcp-pmda-sendmail-5.3.7-7.el8.x86_64.rpm
d6d13dc716111db98c2376e7a3a916984f99afa1009c0341e3ae2c5b627ff292
pcp-pmda-shping-5.3.7-7.el8.x86_64.rpm
860edf1878bf5794559a23a78f2f7c17a20ca3e999af2e2b9a773d6c663ddd79
pcp-pmda-slurm-5.3.7-7.el8.x86_64.rpm
7ef94e6af4bc6384063e02cb096261e8880e5c0d61be8c18eb2e2ed466513255
pcp-pmda-smart-5.3.7-7.el8.x86_64.rpm
adce64bc75f3ed731ad1dd76346a59fa47b81184b9d0c302b5ed493c21498190
pcp-pmda-snmp-5.3.7-7.el8.x86_64.rpm
a3d4e26d42a018553a136e19e5b862e42cb32d62992a03a5fe0efa42db0ae51a
pcp-pmda-sockets-5.3.7-7.el8.x86_64.rpm
e4ab1e5d7a26a2f9223f120c0b7e703622410f4df956df2acc72a6eb2668cc59
pcp-pmda-statsd-5.3.7-7.el8.x86_64.rpm
2dd774c88537feae2dd76e3a9e6cad37ec5aa603d32da9398935df31ba85607e
pcp-pmda-summary-5.3.7-7.el8.x86_64.rpm
04a905391cb95625ce471b18343a1cafc0a0bee64a75b90c600313d3b446824f
pcp-pmda-systemd-5.3.7-7.el8.x86_64.rpm
37942492caf9f786859b2415103e5b4ebc0c69267dea087ed893d394deef005e
pcp-pmda-trace-5.3.7-7.el8.x86_64.rpm
788b42135383d3d3e29891c9088d746a3cec73b335ceba123d74cc7485d92c4f
pcp-pmda-unbound-5.3.7-7.el8.x86_64.rpm
7e9f02e2b312b580a969985523797ae105f67c75dd7d0fdb4d8e8ec421648e26
pcp-pmda-weblog-5.3.7-7.el8.x86_64.rpm
f012e167eaf763d8908d1f56a85659cedb77ce3b2f0568af50734daaf19c0880
pcp-pmda-zimbra-5.3.7-7.el8.x86_64.rpm
1f5bc88a2cf9f5aca0ac3f814ffb56b8852a2b5fa690adc9c676b004c2796377
pcp-pmda-zswap-5.3.7-7.el8.x86_64.rpm
e38b1b32a225ac0e773a10c49df473113c602d2e58702446355d5d5944936b48
pcp-selinux-5.3.7-7.el8.x86_64.rpm
0c80aba651a6d738b1437bceb7d9cc88423603d523e67de9fdb3a574248afa81
pcp-system-tools-5.3.7-7.el8.x86_64.rpm
f0e0d1b2ec9871988473d800224d427031dd19725080490c70fb944a21c5180a
pcp-testsuite-5.3.7-7.el8.x86_64.rpm
92021870bee5c92df2860e2ca5860da23dae9a47b27e4e47cbcc9b91816a23c8
pcp-zeroconf-5.3.7-7.el8.x86_64.rpm
a4325860c9a9e0b0dd9fb5801d5b83fa6fe6f3368a37519e2236ad70b2ad4a0b
perl-PCP-LogImport-5.3.7-7.el8.x86_64.rpm
f3cdaff8b6ad441b42acb20d38a12e845bb46a782f619c9b0aa7bef10f5cdc01
perl-PCP-LogSummary-5.3.7-7.el8.x86_64.rpm
e334610db252b3d394c6009ff10086f012404fe268ca8517038b66005e1a36d6
perl-PCP-MMV-5.3.7-7.el8.x86_64.rpm
8f348ee17908a1b0c01e846baa66b3ce580fb02c13267fae67af3e6bb0dc94cd
perl-PCP-PMDA-5.3.7-7.el8.x86_64.rpm
061290de4584cf422e1b7c33be79c4f6511997b7cfeb55ef7c0f3ca01ff9d646
python3-pcp-5.3.7-7.el8.x86_64.rpm
4ed2c50a8db6aa05bdc0cc68778bd1a99ef408e618fce74ef366cce4b6495d74
RLBA-2022:7475
flatpak-xdg-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for flatpak-xdg-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
flatpak-spawn-1.0.5-1.el8.x86_64.rpm
092dfe7f72bc10fa6b176644a851b3f7139c0c8f0b9d6dc5c2957925fb9dc54a
flatpak-xdg-utils-1.0.5-1.el8.x86_64.rpm
214e2855e04dae2982f996b9c3cc6fb99644190001a4e40eb56908c88053ee10
RLBA-2022:7476
xdg-desktop-portal-gtk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xdg-desktop-portal-gtk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xdg-desktop-portal-gtk-1.8.0-1.el8.x86_64.rpm
a85062ed9546335a63ee9c70d9af983ef3cdec29f602b3f07d985cfd390627d5
RLBA-2022:7477
motif bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for motif.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
motif-2.3.4-18.el8.x86_64.rpm
86ecba4ceba64fdff89a7f101adceb50d239963cf57986f5d25a33bf2c95571c
motif-devel-2.3.4-18.el8.x86_64.rpm
43139d0c2d1505c072a6a3da122d89a597308f6e4ba0ddcb35c0bb73036527f3
motif-static-2.3.4-18.el8.x86_64.rpm
b2238946b5e91bbfe0aba25eb8dc14f1209c844bb36cba8697df79d01fc0190b
RLBA-2022:7479
xdg-desktop-portal bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xdg-desktop-portal.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xdg-desktop-portal-1.8.1-1.el8.x86_64.rpm
4fdd21063a36da9322478dd1539c5c0b5150467da0d9deebad8276e7e5736c2c
RLBA-2022:7480
mod_auth_openidc:2.3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_auth_openidc, cjose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc
cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06
cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102
mod_auth_openidc-2.4.9.4-1.module+el8.7.0+1061+55d14382.x86_64.rpm
a7a7267411bd04af8caa7eb94670e7a9891c5013d3d13ee54f1249db8f50fe0a
RLBA-2022:7481
python-qt5 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-qt5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-qt5-5.15.0-3.el8.x86_64.rpm
84a3a09fcbccdf1a11d7b7c0480468953b090a06e1e609c92ecf9ea68025bb29
python3-qt5-base-5.15.0-3.el8.x86_64.rpm
ab6493c339c96cb6a973f3e1132c5f341ea7bd8f81dc0b1444bff9d661a57233
python-qt5-rpm-macros-5.15.0-3.el8.noarch.rpm
5841de551507eff9e1bca1cc379412ea9c4a23711fb5ff6969f4085f4e2a3eef
RLSA-2022:7482
Moderate: qt5 security, bug fix, and enhancement update
The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework.
The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377)
Security Fix(es):
* qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for qt5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework.
The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377)
Security Fix(es):
* qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-rpm-macros-5.15.3-1.el8.noarch.rpm
318bce8eeab528f3f10626f40aa1cc9301c90d4738155043da3b39a447afe501
qt5-srpm-macros-5.15.3-1.el8.noarch.rpm
3c67f14e96c3953ccae000512d56e7db073fedac51b7a3cb79de29fc941b6891
RLBA-2022:7483
adwaita-qt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for adwaita-qt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
adwaita-qt5-1.2.1-4.el8.x86_64.rpm
d8f67653bc6e3a790140c8429aa913b72ac6fb74f03f43d435e133befb9d5e03
libadwaita-qt5-1.2.1-4.el8.x86_64.rpm
87fecd70e89aa29945a28fa96049f3511b7240218c0d4f5accf1e6db0bbfafd8
RLBA-2022:7484
qgnomeplatform bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qgnomeplatform.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qgnomeplatform-0.7.1-3.el8.x86_64.rpm
64fb1dfdeff8c07b8660f54caebc5749cb648980112637684248d419fc897b91
RLBA-2022:7485
qt5-doc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-doc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qt3d-doc-5.15.3-1.el8.noarch.rpm
b578c8870ee6e910502e42b81710fc8a6e985b198e0617fc85791f44cc942c59
qt5-qtbase-doc-5.15.3-1.el8.noarch.rpm
a37d8b86162330ecbd017e593b7713e1f8d0b4a07e8221b2af1a6696209d6244
qt5-qtconnectivity-doc-5.15.3-1.el8.noarch.rpm
d68d4c01de884931c2f872003220916688ca1f56f377394b9c7669ee22c2cf20
qt5-qtdeclarative-doc-5.15.3-1.el8.noarch.rpm
2f3bd7e7948bb220f0ce95641a66867f8d2c3c4d56d8b06a4c8a0a1715d9f19f
qt5-qtgraphicaleffects-doc-5.15.3-1.el8.noarch.rpm
a47323715d075aef530937b15aa3def0a83236230aa78eec946b8845f14d4257
qt5-qtimageformats-doc-5.15.3-1.el8.noarch.rpm
b78e11fd07c00d5cac56fed0399c6265ccb4a5028444fec9dd48c6057c1d92a8
qt5-qtlocation-doc-5.15.3-1.el8.noarch.rpm
17926542bc2a4728e759fc6976f8bc474a150647b908744dd89244cbe7e19b3a
qt5-qtmultimedia-doc-5.15.3-1.el8.noarch.rpm
0ada051b2273caae04efae6cd4fcb5c72cd7bf3a1655d91d47dc9ba8207282a2
qt5-qtquickcontrols2-doc-5.15.3-1.el8.noarch.rpm
a60592429c1c1849ac4214e529bddb43db4930662b0f5b3b8080660c62a8b663
qt5-qtquickcontrols-doc-5.15.3-1.el8.noarch.rpm
4c0d9d49de82d2a7371ff8066aec0fa9295c26eb8cb46ba5a7105630804cdabf
qt5-qtscript-doc-5.15.3-1.el8.noarch.rpm
ca663a26418cff9367340ade7a1bd5474b2f7749ff45f3ef78b5c2e2f3711b85
qt5-qtsensors-doc-5.15.3-1.el8.noarch.rpm
150059e9748d920c4c7bc7187ac9976c2962d56338129de13659772526a873d8
qt5-qtserialbus-doc-5.15.3-1.el8.noarch.rpm
c42f425f201373eccdc9868f46d015b31e579e6371cc2e95a9e21f8f8371f97b
qt5-qtserialport-doc-5.15.3-1.el8.noarch.rpm
bcb7190d9641cc04d64e568ffbf55561b43e3c010e75ced68cd3c3ce079e99e7
qt5-qtsvg-doc-5.15.3-1.el8.noarch.rpm
e0409aeeceae97f8fe2ce907e39c9044e5ab19bfc63fe70631de723e62df9011
qt5-qttools-doc-5.15.3-1.el8.noarch.rpm
47067ec7068fee6779714e18ed430650779a66ada664e10bd3d215f0c86bbef8
qt5-qtwayland-doc-5.15.3-1.el8.noarch.rpm
dece0d172de59c7ed2fe4a0ba2a254e907a881fd779f709782101a975ad137fa
qt5-qtwebchannel-doc-5.15.3-1.el8.noarch.rpm
07786d83f41f9caf0090d57714cd30a4a126880b29759292b3605b58e2b3076c
qt5-qtwebsockets-doc-5.15.3-1.el8.noarch.rpm
5458756aa5dea8068108c34f2a0c42bd57f7981f359ecd197750a5a9643b5d94
qt5-qtx11extras-doc-5.15.3-1.el8.noarch.rpm
e0e3b5caeb20ce57596ec80050bd292305f48c01ec0acdde06fe4f87341bc371
qt5-qtxmlpatterns-doc-5.15.3-1.el8.noarch.rpm
62f8c4c51edbca393ac5f6e53c17a96ac5384a2d1315e7b29a5cdcaf4e4ac427
RLBA-2022:7486
qt5-qt3d bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qt3d.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qt3d-5.15.3-1.el8.x86_64.rpm
f642deb151e9167b281d810050bbcfc12fc5c7f52d759374312c16165b49adb1
qt5-qt3d-devel-5.15.3-1.el8.x86_64.rpm
8d93413a59bc9466e402d5f66fa3d31d8cdb730c4861c6f236a762bca5f3f27d
qt5-qt3d-examples-5.15.3-1.el8.x86_64.rpm
e5fd66c3c33d003cf23cde7a101ea5df935c06b390903deb595718d6849feebe
RLBA-2022:7487
qt5-qtbase bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtbase.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtbase-mysql-5.15.3-1.el8.x86_64.rpm
dc359fa9c118d821e66dfb9bb15d5f8cb81214aa97059b17f053543b164b2283
qt5-qtbase-5.15.3-1.el8.x86_64.rpm
dc4b63e65a81d43416a0e4d32d9d32f766fa1b1d84725631f41127353beb9fae
qt5-qtbase-common-5.15.3-1.el8.noarch.rpm
c9beaaf5b55fd368b320648260a863f080cf9f326f5c6baa209a83266b6a9374
qt5-qtbase-devel-5.15.3-1.el8.x86_64.rpm
c3b18b7f39aff76909fc8a46a972178b119927ad3390082cefb2f39aebf93ddb
qt5-qtbase-examples-5.15.3-1.el8.x86_64.rpm
0ded827c44ecf02c587c99ef8644b63dba7fb1861c93005d437eb3fe88cbf33b
qt5-qtbase-gui-5.15.3-1.el8.x86_64.rpm
e0cd9f93b35b74e750bf6b8c261852162e62ad5370b2b8c0f945410c3e054445
qt5-qtbase-odbc-5.15.3-1.el8.x86_64.rpm
0a326827cf4afdde4766f906369ebf8d4528fbed72547a40135c93dbe8a17fd2
qt5-qtbase-postgresql-5.15.3-1.el8.x86_64.rpm
3b161f3710bc965e70dfd1b827301ce1602132e50e9317ed889f4cd5daf447cd
qt5-qtbase-private-devel-5.15.3-1.el8.x86_64.rpm
75a20862f2c2d64cf34c949c5251bbbc187d513240d15a08eb51782bc14ca2b7
RLBA-2022:7489
qt5-qtconnectivity bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtconnectivity.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtconnectivity-5.15.3-1.el8.x86_64.rpm
be299dd4932be3deabe76096da6c38eb2be939a7a31213729c2739ea0d93e92f
qt5-qtconnectivity-devel-5.15.3-1.el8.x86_64.rpm
7613a3fff4065c91d19671415f34e42340e3bfa7fa14f6bb9bd2f3383cb21a4f
qt5-qtconnectivity-examples-5.15.3-1.el8.x86_64.rpm
0f221bcb899ad158aa0305ccec25b21c9d992c3315bedb6569f1b8083776e21b
RLBA-2022:7488
qt5-qtcanvas3d bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtcanvas3d.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtcanvas3d-5.12.5-4.el8.x86_64.rpm
c73830a1359e8613357d6481cf21cc3e3c681eaf5aeb3de83933c32a67930bb0
qt5-qtcanvas3d-examples-5.12.5-4.el8.x86_64.rpm
372384db2ebc1b1060416eb037fb407c9ee7070ddab840bc6a665293b249e9fd
RLBA-2022:7490
qt5-qtdeclarative bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtdeclarative.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtdeclarative-5.15.3-1.el8.x86_64.rpm
81491b48ae87d0a1ff98e6ecb754acc649785dd754a2109795bef669542da1ec
qt5-qtdeclarative-devel-5.15.3-1.el8.x86_64.rpm
ebf169329015e35b3e644bf229d92fdacc1a88d42d1b2afa533fb290cfa841ee
qt5-qtdeclarative-examples-5.15.3-1.el8.x86_64.rpm
b37e87d2f25e77843b77268ea4e3d2f3d52f34e075f60d40681420ce5868efdc
RLBA-2022:7491
qt5-qtdoc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtdoc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtdoc-5.15.3-1.el8.noarch.rpm
dac6619086ac617dc01cf5853d55c1c0f772321db93c1e5a16fde1af92415d5e
RLBA-2022:7492
qt5-qtgraphicaleffects bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtgraphicaleffects.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtgraphicaleffects-5.15.3-1.el8.x86_64.rpm
922bf366ab50acea4ed46c3b02aa697dbe2a8a93374f38a538b9e470e434f294
RLBA-2022:7493
qt5-qtimageformats bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtimageformats.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtimageformats-5.15.3-1.el8.x86_64.rpm
35f5a9434f1e60f2eb3bcb3bbda936e06749a8fb8dea14bbbc844ea2fb0e6d7b
RLBA-2022:7494
qt5-qtlocation bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtlocation.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtlocation-5.15.3-1.el8.x86_64.rpm
ca43c96196e6a8115fbf0cdf01a4489ade997dbd58048e924228498acd7a0097
qt5-qtlocation-devel-5.15.3-1.el8.x86_64.rpm
5bffd4353bab449e1392becd7834bf272be7651bb68a6794ce2f8e7ef64c8515
qt5-qtlocation-examples-5.15.3-1.el8.x86_64.rpm
b189cdea1cafc1ca79c697f4aa1665c36f4608b8115df8a76b57e41643b6a246
RLBA-2022:7495
sip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pyqt5-sip-4.19.25-1.el8.x86_64.rpm
21db75baab778c8cd4ec6c33f44121a6532765db7ee209d7f9846b38528da3d5
python3-wx-siplib-4.19.25-1.el8.x86_64.rpm
90031a5995d9cb103e42d1a3f843f403f8a967738f3cb5ae563f9d12a1147420
sip-4.19.25-1.el8.x86_64.rpm
c68c49f9f4c35640f1d4650b4e787019062837c576c291ad21ff95c460b4e803
RLBA-2022:7496
qt5-qtmultimedia bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtmultimedia.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtmultimedia-5.15.3-1.el8.x86_64.rpm
1e948901d495ba214f0cf4e587ee090fcf45e891720c0110f77c3f7334c7344a
qt5-qtmultimedia-devel-5.15.3-1.el8.x86_64.rpm
81822f107128ae673ef95bebd307e7df7d6dead5186814de1ad54de356522e41
qt5-qtmultimedia-examples-5.15.3-1.el8.x86_64.rpm
3fe41f0f9ec7114616ad8e821087cb67530c043f8dd0a1387cad67a4c6ff0209
RLBA-2022:7498
qt5-qtquickcontrols2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtquickcontrols2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtquickcontrols2-5.15.3-1.el8.x86_64.rpm
91ff6355e91bf7fe76755e23c8ead79a6fa87c4f252d8e6aaba7ead0d5fdc9aa
qt5-qtquickcontrols2-examples-5.15.3-1.el8.x86_64.rpm
63e7a95e7a582c2d5eb16ab5e562fd91a1373fe43bd56f47b32321584087b902
RLBA-2022:7497
qt5-qtquickcontrols bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtquickcontrols.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtquickcontrols-5.15.3-1.el8.x86_64.rpm
e841695428818cb159ba7374630821ca61b5c031b7b7c626d8608a90ab763dcf
qt5-qtquickcontrols-examples-5.15.3-1.el8.x86_64.rpm
8824d8b3cffaa241822275917734a2895be9512f23237c6b7dd78fdcfd7bc921
RLBA-2022:7499
qt5-qtscript bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtscript.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtscript-5.15.3-1.el8.x86_64.rpm
b83e41de8c573f77493eb68b2f7d0b6fadbd3780c862ab4d842f8625dd9f5266
qt5-qtscript-devel-5.15.3-1.el8.x86_64.rpm
d59bd5ed20649f3fe127a33e219167c0acb851430a925ae2ae90fc8d17e9b840
qt5-qtscript-examples-5.15.3-1.el8.x86_64.rpm
a13d7b60509e536da399c7616845b03f02a2b32b766aa47c1e26dc1eb659ef62
RLBA-2022:7500
qt5-qtsensors bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtsensors.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtsensors-5.15.3-1.el8.x86_64.rpm
dd4d07314abe281986d456785a42987f84b669116f22cda25d5b51c13520e6f6
qt5-qtsensors-devel-5.15.3-1.el8.x86_64.rpm
33692a009b3d3696018cc619d05a208a45121b882e0a8efa610d5fb210d485e7
qt5-qtsensors-examples-5.15.3-1.el8.x86_64.rpm
b6e291636b85e6e0ce8ceff41b66c45d8bb855b05dafe996d16b604c7412d3ea
RLBA-2022:7501
qt5-qtserialbus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtserialbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtserialbus-5.15.3-1.el8.x86_64.rpm
c4db81d111757495d20ca6a7b68973c7e927a8d51396c163117f31000b81b3bf
qt5-qtserialbus-examples-5.15.3-1.el8.x86_64.rpm
50d8960d7d9c4254094cc5705434fbd6541ca8d820fb396a7f41f13d0d75e84d
RLBA-2022:7502
qt5-qtserialport bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtserialport.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtserialport-5.15.3-1.el8.x86_64.rpm
09eaa88aabaa25fd0f3d2de55688c787571ebd157e1519c8ac9b4c36cb899faa
qt5-qtserialport-devel-5.15.3-1.el8.x86_64.rpm
14e06e875b9033364a60bdaa8e0fcc4d2bd3d13f6cbd863471d9db02341b3f31
qt5-qtserialport-examples-5.15.3-1.el8.x86_64.rpm
29c28edda395b9cc97d2e70bfc48f2c82e4577652069d130ed35eb6eb2166483
RLBA-2022:7503
qt5-qtsvg bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtsvg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtsvg-5.15.3-1.el8.x86_64.rpm
cdbf4491b61986e0ee8cf4414e8070c8a2ca6d764ccb28080171454892e33ad8
qt5-qtsvg-devel-5.15.3-1.el8.x86_64.rpm
3f24f40dcde1e14c935483eb9817603474a86669cbdc10fa4482547b8ac5ab3f
qt5-qtsvg-examples-5.15.3-1.el8.x86_64.rpm
fbc08cea6cf9f441676ff57ddc1f83801e1bb61c406e5e9130e70f4f39783e8b
RLBA-2022:7504
qt5-qttools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qttools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-assistant-5.15.3-2.el8.x86_64.rpm
4786d6a96af720485ec88fdbe3bdaddfa6a61d3d087d56d0c5bc274229280b42
qt5-designer-5.15.3-2.el8.x86_64.rpm
b588430701a85e8277df8f757f3e8b4374d8867b9115d8fbb5b903a01edcf7ed
qt5-doctools-5.15.3-2.el8.x86_64.rpm
793533bdaf94da8620a691031351a0ac17770ef7e3256e94be2b450afd201d08
qt5-linguist-5.15.3-2.el8.x86_64.rpm
5eff7f0d07543875cfb87014838ee97e538245510cc9574ea9bfd51d8e56f772
qt5-qdbusviewer-5.15.3-2.el8.x86_64.rpm
7e1f1b3baa1205fcac3da36229d869f85839cfbc277dfed7bd8021f414e37f1d
qt5-qttools-5.15.3-2.el8.x86_64.rpm
3e61f3b558d79f3a3132909a1ba6e6acd16ded1a93f5bd5dee748ecab73c0b34
qt5-qttools-common-5.15.3-2.el8.noarch.rpm
e140fb61b2795542cea5ce5cb0de9bd011de07ba8f6dc709ca4df853d4c06e98
qt5-qttools-devel-5.15.3-2.el8.x86_64.rpm
a23ae3009fe541d82308977d2b4b5075f621e055a13d6e664fd29d7e6b1ce2d2
qt5-qttools-examples-5.15.3-2.el8.x86_64.rpm
2d11266ebc3e3d3fc23e27f5bb078ce38b24bf9d569bf03f7a21f1e0ac8e48fc
qt5-qttools-libs-designer-5.15.3-2.el8.x86_64.rpm
2c97dbd47aecc3b760b3c2d9284150bed26a1b97e65ac70fd09eb827bf11e512
qt5-qttools-libs-designercomponents-5.15.3-2.el8.x86_64.rpm
ff65c962ce9aac0643920b97bba917dc2ca0b543b6abe5ed9ec063ac361291d7
qt5-qttools-libs-help-5.15.3-2.el8.x86_64.rpm
f44d75132665fe1e52e6caa7dceb6be280b5b2150187cb8db3f5eae7e33a3598
RLBA-2022:7505
qt5-qttranslations bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qttranslations.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qttranslations-5.15.3-1.el8.noarch.rpm
3016601e5aa44729d1f95ba152efce40c782bf555972e3e918a448f228409c43
RLBA-2022:7506
qt5-qtwayland bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtwayland.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtwayland-5.15.3-1.el8.x86_64.rpm
8769fcd7c04ba583f9aa0c984102efcdd0e5bc577c4c69643b0885163b293c83
qt5-qtwayland-examples-5.15.3-1.el8.x86_64.rpm
330235f622ad7be14595e9ab681a33e0bafab0c261928bc39dba45dbd7e112da
RLBA-2022:7507
qt5-qtwebchannel bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtwebchannel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtwebchannel-5.15.3-1.el8.x86_64.rpm
b5c86d314559448bf51dace12132f8f443f0c120428c4a101d70a4bf25a33be4
qt5-qtwebchannel-devel-5.15.3-1.el8.x86_64.rpm
1976ea364e37d03ec715bea5a4e6e3280c10cf657ea2c518229bd8278f0f3a48
qt5-qtwebchannel-examples-5.15.3-1.el8.x86_64.rpm
f59a44f98929e829dad4e3e13e21851b64c8def131f0bc093a78e9531cc1f3db
RLBA-2022:7508
qt5-qtwebsockets bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtwebsockets.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtwebsockets-5.15.3-1.el8.x86_64.rpm
b4d4be2415c4b0e76a3503f8a4c0b18902e7e7a5dc1b1c3162c6f04f64af2b95
qt5-qtwebsockets-devel-5.15.3-1.el8.x86_64.rpm
ff3872ded5fcbea63b4e0b5a2d784890a4340d73c577e7b76cd96aa8e8ed3169
qt5-qtwebsockets-examples-5.15.3-1.el8.x86_64.rpm
79320ecf2fb9a33400357523fde690f8feee0b0387b6b0f1e70afe532436fcd8
RLBA-2022:7509
qt5-qtx11extras bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtx11extras.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtx11extras-5.15.3-1.el8.x86_64.rpm
78e2cdb2bfddb5279ebb67065511d1bdf66f319faf4c3e87bffffc0f8eee4f35
qt5-qtx11extras-devel-5.15.3-1.el8.x86_64.rpm
8f6b8ee7473805e8b5626940f0874ba8cbc0a5577052fe7ceaf760782f036643
RLBA-2022:7510
qt5-qtxmlpatterns bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtxmlpatterns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtxmlpatterns-5.15.3-1.el8.x86_64.rpm
1794e993e0845db24c600f3e8c3273016bad7b19d1e9214a8a6afe8b6c54db31
qt5-qtxmlpatterns-devel-5.15.3-1.el8.x86_64.rpm
9441b21ff1425ac34927e4d4d9e559dd4d8f9579977d4c4d5282025d3ff7a42e
qt5-qtxmlpatterns-examples-5.15.3-1.el8.x86_64.rpm
c19c46e282d2f0415f76f45271d9782ca8ebefffd8143406a755f0303e077eb3
RLBA-2022:7512
postgresql-jdbc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for postgresql-jdbc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
postgresql-jdbc-42.2.14-1.el8.noarch.rpm
ab35417ec6f0de396ecf11645cf9de6898976c6f26623d88af88fabb4129a410
postgresql-jdbc-javadoc-42.2.14-1.el8.noarch.rpm
61475799800b1fa962b38a45a989f4389e499d3f4fe36e601d36dda268f72173
RLBA-2022:7513
crash-gcore-command bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crash-gcore-command.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
crash-gcore-command-1.6.3-2.el8.x86_64.rpm
c62a9f19df7f7cb1c3c040df142636139a09406b030fdb601071fb30223ee44b
RLSA-2022:7514
Moderate: fribidi security update
FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order.
Security Fix(es):
* fribidi: Stack based buffer overflow (CVE-2022-25308)
* fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309)
* fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fribidi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order.
Security Fix(es):
* fribidi: Stack based buffer overflow (CVE-2022-25308)
* fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309)
* fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fribidi-1.0.4-9.el8.x86_64.rpm
140455eb981d3ea0296f5719b1026b29f8e6316caf885301b5607af38483edec
fribidi-devel-1.0.4-9.el8.x86_64.rpm
faba78d5909ef3519964138414e4eb0d3a72a2b0251d407382b1351e9dcfd1ac
RLBA-2022:7515
papi and libpfm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpfm, papi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpfm-4.10.1-5.el8.x86_64.rpm
494bf65d6993e1af506a1289877dee03a3e8acdebdcedc3d56f0e6b175ff064b
libpfm-devel-4.10.1-5.el8.x86_64.rpm
0596e3333ad57a7cbfb1eb7205ff0fb33f8eb32b6651eb5962a8dda3c39401d0
papi-5.6.0-16.el8.x86_64.rpm
f3e910ba21ae8d8c84fb4a863e4e974a44a4c98136b70072c23dcb041744a7f6
papi-devel-5.6.0-16.el8.x86_64.rpm
7460659d870a675802deb1ae4b0b40a12c7ed26bb6568733a0529836fc58b526
papi-libs-5.6.0-16.el8.x86_64.rpm
923001360211247341c2e32a8aaad2649ce1fe5ae82902426d96f39750724bbb
RLBA-2022:7517
cscope bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cscope.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cscope-15.9-11.el8.x86_64.rpm
3780ca8f1158a74d20e09e7290b502ca445d9e9bf09e8335a0d771a682946580
RLBA-2022:7516
oscap-anaconda-addon bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for oscap-anaconda-addon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
oscap-anaconda-addon-1.2.1-8.el8.noarch.rpm
75bac43c9f12ff5fd2444d0203244762838868a9eada5355269c9e0259a0e14c
RLBA-2022:7518
dyninst bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dyninst-12.1.0-1.el8.x86_64.rpm
12a4d57690143e288538a6eb2ae079e312f2eaba2baaaf9e24ae018daa455a7a
RLSA-2022:7519
Moderate: grafana security, bug fix, and enhancement update
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348)
Security Fix(es):
* sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* grafana: XSS vulnerability in data source handling (CVE-2022-21702)
* grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
* grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348)
Security Fix(es):
* sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* grafana: XSS vulnerability in data source handling (CVE-2022-21702)
* grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
* grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
grafana-7.5.15-3.el8.x86_64.rpm
34d4eb252d22d335ff8f1dc3ce270d6e7b354af349860e74a39d430c57b6eff3
RLBA-2022:7520
fence-agents bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fence-agents.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fence-agents-all-4.2.1-103.el8.x86_64.rpm
a17f6c28510305c719c3cf348360783fc48c50897dfcf6bf7bf88ca89161524a
fence-agents-amt-ws-4.2.1-103.el8.noarch.rpm
3ce7796c1b72fc99bb8b651196b2c66272fb0934eb7a47628935a9680a9ee392
fence-agents-apc-4.2.1-103.el8.noarch.rpm
03b96adcf7b6b23947608429663653d8f36e12bd93f22965b01ff04907768900
fence-agents-apc-snmp-4.2.1-103.el8.noarch.rpm
fc8242c43925467482603f14189ccc96392561c7b444d8388dde3e1e9f0508cc
fence-agents-bladecenter-4.2.1-103.el8.noarch.rpm
02570e8d92bf5b2f01166bfec7a2d4da4b410b0cd95d6fdf8ae332156891efbd
fence-agents-brocade-4.2.1-103.el8.noarch.rpm
73d3e127cdab2dd2678da360b7a21fe7f080f03dc7978d53393d7eb25a2bd274
fence-agents-cisco-mds-4.2.1-103.el8.noarch.rpm
79bba3b89457f2ebde56ff07c236fc499a4a06f308f6250b085eeaae8101be55
fence-agents-cisco-ucs-4.2.1-103.el8.noarch.rpm
9418aa0750789ef08823a0f4629f44d48db5575115ca46b511b97ac8b9c460de
fence-agents-common-4.2.1-103.el8.noarch.rpm
5a43c017ed93f80dd71581da79f2ed2851bc48374857f282bc8860dcadc1f926
fence-agents-compute-4.2.1-103.el8.noarch.rpm
a18fcfb155cb2742c33a0e837ca3df2f0292e9d1d3eceb8875f3fa972afb15c8
fence-agents-drac5-4.2.1-103.el8.noarch.rpm
9f1faad3b7ed178a698ca70c51279d178d0c22b46aab20081872248580326a48
fence-agents-eaton-snmp-4.2.1-103.el8.noarch.rpm
1271a18e7ad0791c76ff5aad0bcdb31914f26f6f4dc147f77670c52ed29b4632
fence-agents-emerson-4.2.1-103.el8.noarch.rpm
2dc5b8b4ccc72e61f7d073da13341c5d998aac2eb72b55bef70504bea2b7c94e
fence-agents-eps-4.2.1-103.el8.noarch.rpm
dd323b8c343c479947b93e98b3c71873c3fb8607a99d06816b36e8fe5ee8f3e8
fence-agents-heuristics-ping-4.2.1-103.el8.noarch.rpm
f737e418f3b093da281437b9f79dd92d0565f0a2f64c1b0b8a5996df71d704f2
fence-agents-hpblade-4.2.1-103.el8.noarch.rpm
1f979e340c291570cc5f32df9c2c0f6037c251cb0a045d0068d5a67e916adbf0
fence-agents-ibmblade-4.2.1-103.el8.noarch.rpm
af3d02b14d3081309474639ede715cd2f7d3f6072641c7d700a6a4b9a3d325a5
fence-agents-ibm-powervs-4.2.1-103.el8.noarch.rpm
42dc1db7cd61928a962b04460470130383607ca82c380a2c5e44ebdadd0c525c
fence-agents-ibm-vpc-4.2.1-103.el8.noarch.rpm
0c87a64a71b9d8b1cda74ab174ff8cb613fa19c642c21d4cde321f6b35de84d3
fence-agents-ifmib-4.2.1-103.el8.noarch.rpm
58e6a2fdbe3e9d7194e5403ed2560c6f4edca37a3bbca66ea82d3828b48aeff3
fence-agents-ilo2-4.2.1-103.el8.noarch.rpm
0955ab63e59343c483525b6fa09bcb4954666086029254c44174891167e7089e
fence-agents-ilo-moonshot-4.2.1-103.el8.noarch.rpm
24098099cd95d917de58766fd040cba01942f97e9b0509296eb5d25d9a95a443
fence-agents-ilo-mp-4.2.1-103.el8.noarch.rpm
3d4a43190dcb56fc538b3a6e9e349ba747e39929d6907ab8c97f68b90474fa21
fence-agents-ilo-ssh-4.2.1-103.el8.noarch.rpm
bf763b2d0385b2e01065b35385b3fb909ac59bf48068495980035eed44a4555c
fence-agents-intelmodular-4.2.1-103.el8.noarch.rpm
0b13c96a0375ea1dc5790603eefb34550396d8f59b4c329d12373fede46ee79e
fence-agents-ipdu-4.2.1-103.el8.noarch.rpm
34d75540f09eb789898492d8f8719a61fc78bbcaae721b0fe1f42279b3cff80a
fence-agents-ipmilan-4.2.1-103.el8.noarch.rpm
ea8597775ff0aa34d12de666cec3230117acce02de240758613c514ceddb30c4
fence-agents-kdump-4.2.1-103.el8.x86_64.rpm
a2856762f3dc88db905edfc92ab1e6029d7fde90796c1e304f377a225f3b88bc
fence-agents-kubevirt-4.2.1-103.el8.x86_64.rpm
5544706a9d2b7aa240ac81883b8c2f01c445a124ae7ab0b5898271d5c1b63608
fence-agents-lpar-4.2.1-103.el8.noarch.rpm
94821479a731808043753d3aa8f1162fda086fed9dd19017268a5b48a43c1dab
fence-agents-mpath-4.2.1-103.el8.noarch.rpm
df48090184b093f37bcc05d6021c67e9bdb4c66498c1bd9d50b784d7b0710c92
fence-agents-redfish-4.2.1-103.el8.x86_64.rpm
5e65d9e3b9ccb0357a7b0d13bd2102f095a342c4269c016e404fc9b762e1438f
fence-agents-rhevm-4.2.1-103.el8.noarch.rpm
55e637fcc0537d56fd2cbf4b3125d77959e0607b6a045cc462be3b408336e03d
fence-agents-rsa-4.2.1-103.el8.noarch.rpm
7a7ebcfc117cac222693a822452a0adc7d844bc85aa8a05d377c98e91ac9789a
fence-agents-rsb-4.2.1-103.el8.noarch.rpm
238b7b85a8005b6f7b9bed745e26595d0c624ddd322ca03ac5fbd89998f30626
fence-agents-sbd-4.2.1-103.el8.noarch.rpm
9c1889a795da3dfeaaa4dd6191a2740ccf97f5faa7de3924f356fa3529f6f87c
fence-agents-scsi-4.2.1-103.el8.noarch.rpm
3f9fe935d6d472a3f979e15511f4426b639f2b70561a45e24755c3c8ba56b55a
fence-agents-virsh-4.2.1-103.el8.noarch.rpm
08a3f2ad0be57af41e86cdc0e6509f3857f1e0c63357f086d4714b977bf75789
fence-agents-vmware-rest-4.2.1-103.el8.noarch.rpm
3057ef2b1dd858a1b174731a3cd5dc33cf5ccba2a7dc8d2b0c24273c0a60ef9b
fence-agents-vmware-soap-4.2.1-103.el8.noarch.rpm
38c303fb36b35d97d356b657f8a5e0dda0c3b9630ff197c0db53284f48e69144
fence-agents-wti-4.2.1-103.el8.noarch.rpm
a2919d9609a4ad93b5a979a1db3ac3741d88527a7058b41d854e9b5afa5c8341
RLBA-2022:7521
tftp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tftp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tftp-5.2-26.el8.x86_64.rpm
de51b5d08092f05a1fee9c26441c20c3fce36f76015ea2e14d4b59d16490cf04
tftp-server-5.2-26.el8.x86_64.rpm
f408a44bc2cec703d78478ae3359aa2ca95962d644d99f80ec93c8a02bee38f3
RLBA-2022:7522
go-toolset:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for delve, golang, go-toolset.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__go-toolset
delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
be45db0ede57b9a9918c621811a3aaffb944f36ae3770ac645652983d9c3e4a7
golang-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
72e59fc43726600f51602f6126e1e9efb12dcdd525b52613b360a91d6e28faa7
golang-bin-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
d7246676585f4146b680bd263905fc30fdbeae6895072b8210a6b31081682d39
golang-docs-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm
aad0c28a7e3554ef9114efe3c09f666c373eee0555d496901603c58b355fa548
golang-misc-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm
2323eab968fe9e83c7219b8d635140b28f41beb2dcae9e4034a1517c578afd19
golang-race-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
89897b9645358e6c32cd4c81afbcc34046c15277fe62873a5dbfe0a8afa79ada
golang-src-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm
972eeddab4835df47dd7f5077fa147f82209aa9fcac4c13aa1c29c962d288784
golang-tests-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm
5455050e157f67ada49c9f0a77fdf0b5156786f77980a649d1b659f84c933c7c
go-toolset-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
95b1b435a0fb426600a6538735c5a98a44af71e0fb4de962a6cec1cc1e63a4c8
RLBA-2022:7523
cloud-init bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cloud-init.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cloud-init-22.1-5.el8.noarch.rpm
fefa78c128171f878fedba5f9d823e1ee6e0fc435779389c25d0c040d31f366a
RLSA-2022:7524
Moderate: yajl security update
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator.
Security Fix(es):
* yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for yajl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator.
Security Fix(es):
* yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
yajl-2.1.0-11.el8.x86_64.rpm
daca84d640abaceed94eaa249bcf7f85df19201cb41e1be7a908d4ee8a12534e
RLBA-2022:7525
valgrind bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for valgrind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
valgrind-3.19.0-1.el8.x86_64.rpm
3e53250e78ff4505641d6fa1665cc6a8e0a51972017e583191e3be1622f367f0
valgrind-devel-3.19.0-1.el8.x86_64.rpm
6b9ff3fcba5a03dacce33410d00ff6052bfee362e885e4f0e06ef7405c0ce218
RLEA-2022:7528
ruby:3.1 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
f4004fc8f1fbe42230b6b849a4f2c487dd17a20acd7e046d1b886ca8adba8391
ruby-bundled-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
b46fe1f1f933210251597c5b927c4e78baa1066f0a0e2a859a898c4f7ebc77ee
ruby-default-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm
7c18a028426d5f9b2d86b66097c13afcde26de6a14c116ba951cd208d3979cca
ruby-devel-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
c659134bb04568a0f5cad3ea76e2be9194ed247070fcc2700fac4c027e78482e
ruby-doc-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm
391d5027e0f209197b0e1d31e841f7c41a6399e1e74eac695f285f02f723f812
rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f
rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm
45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939
rubygem-bigdecimal-3.1.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
975f18976d211bce5dbefe7ee440a278295698833a6bb4d2aa8f059e34de1002
rubygem-bundler-2.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm
806611bac1cab60e9f1c70c67b7e7230acdeda7f88fdf55f39fce4a126144ad6
rubygem-io-console-0.5.11-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
d8d1cc2f174f93e306e1632ea97393986e5d8a0a2f793baf916c2690e814ae5e
rubygem-irb-1.4.1-141.module+el8.7.0+1081+f0a69743.noarch.rpm
74fa0e47d61a7d62c8b5fa088bf9afa8a98b1e01317b8964c43580d3dfd11465
rubygem-json-2.6.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
00bea2d03d3884ba228fc716df85e81537ceaa4fd80c67a514493f2bf83cd46d
rubygem-minitest-5.15.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm
a34a35947e355bc829b933b39727c62727328529dda780d5722a6b928ea63e9a
rubygem-mysql2-0.5.3-2.module+el8.7.0+1081+f0a69743.x86_64.rpm
c2c8f820300b260bbe21037c29d089b5c685d944baa6c9a33f992de1ab7ef3b5
rubygem-mysql2-doc-0.5.3-2.module+el8.7.0+1081+f0a69743.noarch.rpm
39cf4908e356cbe0c00cb912ed37adf012ede109ac04721c631bc82efc020c6f
rubygem-pg-1.3.2-1.module+el8.7.0+1081+f0a69743.x86_64.rpm
f08ddfa2201801ae0272d077d8f5ced1fdf3c416bd330e5569710739be04ca76
rubygem-pg-doc-1.3.2-1.module+el8.7.0+1081+f0a69743.noarch.rpm
959c9b529e593c5c51bd65597a55335cc9acb3c13ded0545b022d44ba45e7b4e
rubygem-power_assert-2.0.1-141.module+el8.7.0+1081+f0a69743.noarch.rpm
1cc6ad1c8cf12f603a078784250d368e5444e231ba4e21e87d28f19dd7726d85
rubygem-psych-4.0.3-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
bb252b125709fa8b52739a2c8e948567e15e6b8887c0cc4f5650f26d2d38f8e2
rubygem-rake-13.0.6-141.module+el8.7.0+1081+f0a69743.noarch.rpm
dc465a415b7c7f809635738dc7a89e08d974e34fd5a8ff578265a460311ee4f2
rubygem-rbs-2.1.0-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
d51cc0321fbd69dd43120d6b872f026d9cd5831dec96aa50e96df871a0edb4dc
rubygem-rdoc-6.4.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm
266282d7a1fe1d6f7b9a8720e84d96c637795ed62b4c7b7986f41c3cf270deaa
rubygems-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm
ed88a51b43339ffc8199bc9b8c4ec1756ed1a702bc936bcb980cf648e5785b4d
rubygems-devel-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm
e625021ebd94e59dbed04148f68ce9bb7eb49d39e3359054de0f8f8e4f11943c
rubygem-test-unit-3.5.3-141.module+el8.7.0+1081+f0a69743.noarch.rpm
b857b6b967535592300725d3e6cde4a4a62549354903c9a8445132d3b7742209
rubygem-typeprof-0.21.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm
35b740433ac48b0a64d2c83dba9d6cbcf56a9e18b9238285c48a17a2d243b556
ruby-libs-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
f313a918d61bd5ae15f35483b3ee33f9ad655bf1c4467de40c205fb9a86c0565
RLSA-2022:7529
Moderate: container-tools:3.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
08f071670fe28ccd63e3840c62819c2b25d38d2287c3b63605626114e544a6eb
buildah-tests-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
fca90c4be12b6d3078b7d6d682abe4434fa6d956f655bc1731879a67dc6c425c
cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5
conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3af0efabcac69789ce47fab592ecc29899095fcc2be8f8a6201db544376bc188
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
containers-common-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
abc291da55ad2008cc79640586a2576695de84b8e44f1c5e48dcaa247a689cc0
container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
podman-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
110128fa91767a24299b7b40ea77ad98ccb477c231150e66c88370e3ea47c249
podman-catatonit-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
a14d125bcc99bcd1c40e8a2cb27780e523c46a358f60cace03f148289f3ab0dc
podman-docker-3.0.1-13.module+el8.7.0+1076+9b1c11c1.noarch.rpm
13c17400ce1f7fd5be3064d31fc6df69484d37c18170fd99b6678f3bc8d6a3c5
podman-plugins-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
6e9b5997c40ffd4377bcacd10528f1cc38441c04d0afbecbb192e5aeb29c271c
podman-remote-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b4a1ed3a0c0618e372a5cf506864b6b336f186190d9016056a979d46bcf4847
podman-tests-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
bddb7e274024806035e7a1e8ca34d2716099d36084975731d99de1df93264289
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
skopeo-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
2d660e8c7f3942d3f67cc57ddbf24728bbe91c63b10954e46d93171785575532
skopeo-tests-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3aac4f2b10e39dea615da0233a32a6be25ac7294fee165483e1e63c5ceae577
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f
RLBA-2022:7530
ansible-pcp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ansible-pcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ansible-pcp-2.2.5-1.el8.noarch.rpm
43bcb96ad0f1f6b4ae28f31ff13c54cd6825024d27c1c919c25a3a6faa39194c
RLBA-2022:7531
evolution-data-server bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evolution-data-server.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evolution-data-server-3.28.5-20.el8.x86_64.rpm
c567ccf699097288b1861e2d0ffcaebea3ea10b9508af5d7ad1c84c4a7639db6
evolution-data-server-devel-3.28.5-20.el8.x86_64.rpm
bd6853c427551bbe5935caa4eea7b54008a050b4567457d16fcb71366cd50047
evolution-data-server-langpacks-3.28.5-20.el8.noarch.rpm
833711b12ab839728adbb252c686beec45f3cc36bc29df3544cd83d9d159751e
RLBA-2022:7532
evolution-ews bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evolution-ews.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evolution-ews-3.28.5-13.el8.x86_64.rpm
a7c0a8ee534fa31c5b6c06f92db8f26259f8bf9eb6b2c025dbf3e145dc84c545
evolution-ews-langpacks-3.28.5-13.el8.noarch.rpm
869590768476b712d0edec973c5345e50bb6fc0f89ebdb8033adbce7e151af6e
RLBA-2022:7533
cheese bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cheese.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cheese-3.28.0-4.el8_6.x86_64.rpm
1cd8f7b5f5f9888477b2bcefcb93b5be066a6590b2c641568c3f6181b6285412
cheese-libs-3.28.0-4.el8_6.x86_64.rpm
dd228cd48876d9151169a9ea0a1a7038423436c278231b7f41c1acc0fd374499
RLBA-2022:7534
mod_auth_gssapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_auth_gssapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_auth_gssapi-1.6.1-9.el8.x86_64.rpm
59074b8ba68426e1ac78f601751ae94a3e7346d77490e26d283cc0e43456b588
RLBA-2022:7535
stress-ng bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for stress-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
stress-ng-0.14.00-1.el8.x86_64.rpm
09e5fede907ee0ee3049dfa622b48736b808198032227dcf05bf1ca2a911ddf9
RLBA-2022:7537
llvm-toolset:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for compiler-rt, lldb, lld, llvm, llvm-toolset, clang, libomp, python-lit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__llvm-toolset
clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
4019138e3c053013c923f5b29f8f3d8d6665f4bc966553b1722eeb52358105cb
clang-analyzer-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm
c7cfa90b4b5f897410dd6604f91d5cfd06d819898b250ab482c753eae78b0c5e
clang-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
32adf389fd14a400c7714351b91ec01d22d2b7df50c66609f2017855d5313ef7
clang-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
1e9ae8c22585124989957376e435e92ce7a611f9daaa4a6b884b91f08e4f91ac
clang-resource-filesystem-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
570e5e123e4974910864f4b56d333412341822f894bc90a416968a0cd0b79487
clang-tools-extra-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
9683b2d54e15e1273295c2799595215d7e4019716f54a130eaa5285e5aaff13e
compiler-rt-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
905b2cc701a2f5785c66604609207bb95341c6a02281d01db8d402aa02688a19
git-clang-format-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
f36b25e63fde63ec7bf1aaa3ca23afd3ddfbe58d94445462370fad7df7abc402
libomp-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm
baa0ee79ba1778f3f7f8b0002202d6f10bfd9b62fc4556a642887ee14c3ff543
libomp-devel-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm
8d2a2f4aa8c374c2769dc4bd7cf93dc52e2a2a5b2791a9498db42669772ef424
libomp-test-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm
cbb90c4dc11520376ced98704d10028185ad9002dbb7b23c664b803b7db2b2ad
lld-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
6761adc0183eb3675d79aedc216bccb6bf03187e7658d323bb8271fe33d8007d
lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
648cbc670df222c9909ce2f4b07681ded1a5b574446b574d0e658844101a07ea
lldb-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
140e0416e72aa350be3bd1a30189f19121b937f498cadf919bf213ff8ee5f18e
lld-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
b3cf3fc434fbccdfd091bf2642dd4453fd31d1a36f30a73370953a54cb95200a
lld-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
ac581ec9fa342d38c1661237d260ceff68c8daf89a9cbfa823291cbb804cdd56
llvm-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
025dd2e04a1d7ec2304905d7b86da94d7ffb46c372e72ecf2d91766d25f97996
llvm-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
c86f75512c19a0afae71e4eaaeb9e09613df6c8b00295c6ad01b6e89cf20fbae
llvm-doc-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm
c1be87e9a4dd7357f46fde9d36a86c311dce9162b400d08db28eb44a59d5b659
llvm-googletest-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
e66365da6dea97c46700dda219e87d2770be98f57b07cb687a3b96955a8be915
llvm-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
db3cd9ebcbda9282c40e20386e21a30ebf6d178592284ddc2f4a86962761fd0b
llvm-static-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
39e1f7fa0779fb638208df74797475233aa11a53a02a342f8ab820fcd2713983
llvm-test-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
436b8dca43fbf2daf6065a807d9a4f5036d71f8cb3b4e98e805509329f2021da
llvm-toolset-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
698737c91866add724a82bc2b32e6793a7e4ba02fd11d100f4ed132fc59dbb48
python3-clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
8f99ba21f59cf14ff807ae1042b5ffd06471af728c2a7dd0bb3cf0fe70d0d9b7
python3-lit-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm
de725c08eeb03c1304d6cb3942294deb8f5e2c3473cacc6c2d5e77c54550d2f0
python3-lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
365f752b0027d7cf9015fb9ddbf566777801d9d12348801b4a45fcc9d2889d29
RLBA-2022:7536
nautilus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nautilus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nautilus-3.28.1-21.el8.x86_64.rpm
11e67d5eb29255f83fb1a0372e062574d29d28288ca886f009b7f9ff6286c20f
nautilus-extensions-3.28.1-21.el8.x86_64.rpm
dc186b11c5054e93db20cc7e3fff78501893fd9296dd7928b46ec4d42136f47f
RLBA-2022:7538
systemtap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemtap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
systemtap-4.7-1.el8.x86_64.rpm
8d56d3f7f25b1f0ab7989ff2aedccda102c6373c51d80a97c006edf9c4e3c8a1
systemtap-client-4.7-1.el8.x86_64.rpm
94c0288987480045fb0360a19e6d57508930feb1357b047c75317cbc59e83bc7
systemtap-devel-4.7-1.el8.x86_64.rpm
3e3173bc5da8e298e2b65f563bbfb017e313d582a7d2f656c2d8ed7719c37a3e
systemtap-exporter-4.7-1.el8.x86_64.rpm
efacdbcf9a4f2a485bc1eec0673086181fbb3033311917ba6dc8e15760f3ad9d
systemtap-initscript-4.7-1.el8.x86_64.rpm
c53ee31c2b1b778c4b0a2bdcc1f177c2c9992c1f34f0c9137c0ff1cc67d35c0a
systemtap-runtime-4.7-1.el8.x86_64.rpm
40c542c53113d9bdd6da664e1ba4c1299c4c0ba3615499bc6dc376c52046a0b6
systemtap-runtime-java-4.7-1.el8.x86_64.rpm
bf9152e68d8091ad35919157a52cd06d3546b3cb64cc85832a682cfeb3f463d9
systemtap-runtime-python3-4.7-1.el8.x86_64.rpm
c39170333c363e4789894a8989db4965d986e1fb8fc9236f1ea189b8b2bf9ddf
systemtap-runtime-virtguest-4.7-1.el8.x86_64.rpm
b786f6bd861b7a5d8ad4c754587ffa696942aebc3792e0e65bbd1bf70cb0b75e
systemtap-runtime-virthost-4.7-1.el8.x86_64.rpm
3bff66eb561bc80457981900ea1af095cc3047101321b009910b86dd475ed28b
systemtap-sdt-devel-4.7-1.el8.x86_64.rpm
5284d6c6e5f93880d0520b6954a4e3401bca1be7dc8e492280105760bd21c905
systemtap-server-4.7-1.el8.x86_64.rpm
e51f53c8099209f335ec89005182df88b9a071b181c73a1b1bc441fdb61d7487
RLBA-2022:7539
libgdata bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgdata-0.17.9-4.el8.x86_64.rpm
75d4aa16927ac0856e33a7da1df09d7f51c39b0a94d686e5172c151e2935e090
libgdata-devel-0.17.9-4.el8.x86_64.rpm
f627bf3a4956c741c8ee7e1a6be9a5ab9bde87a9e139cd42d78fbdac26368fc5
RLBA-2022:7540
idm:client and idm:DL1 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
ipa-client-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm
0f015ca9126dbf6adf72e89def936c93720d13bd3ab39996a07681cdb1e6b968
ipa-client-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
5627c47f2914e7189d0ec801e8d67e9c32ebd02b79728197995f6d952274d6df
ipa-client-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm
479f6dfb3c17e9ddd5e6dd9eddc39dc18b22f2c1a864a9bffd6a016f58746853
ipa-client-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
be705b636f081a46557f91a42295f0b6723afc20e6d6a857801ae5de9a50c916
ipa-client-epn-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm
89d738551a9170fcc56efe16ed2266831877c8de1d6fc8b636920afb52a22826
ipa-client-epn-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
16f5cc61defc5d37520dff7f5de7040f82348302fb8e08991f54dde571b6c5e9
ipa-client-samba-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm
da345ecd063a748b18217785da5198cd2c19e3a917c8ca0b4107fc2c11db3b37
ipa-client-samba-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
ec80710ad400a4e43d183499f085e9a737e1bdd47ed4a1ff1b01c0eb0711b90e
ipa-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm
0273528be5542e496c224410b196f75f80c96cccef8aa50fe877ba3fd6f4eb67
ipa-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
a484042a3bdaa281429a752ceddc62c907108424d45d26dfafc0b825f3ab30cb
ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm
e273335ad4d42c167d380d2367e199f7b7df5b251a42c3fea602770a842f11d2
ipa-python-compat-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm
b5a9bf5a66ec43167636748169c35dc08ce9a994c75d086845122b4e0e0a5963
ipa-python-compat-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
f35a45b4365fcd63d1b76dc7435583b46cc62ba801cbf6bca35424fbbfe4b134
ipa-selinux-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm
99e090241440e24a10743a9d147cb5587ea5070d5f2c80010f084227978162c6
ipa-selinux-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
e6840a613c1508d6fe34ec27f01393023c1f544dcd1dc82ae94fd948b4726418
ipa-server-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
980b7ef4cf9445bb17abcdee681a311357eaaf62a14e927998807201360dee40
ipa-server-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
37ce4afa670d0d9d679469784430214a26a99e4467f44bf95f9bac93a40981d3
ipa-server-dns-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
0ac3f88ce3777ead8b97da89996d655031feae8f763a133333d2dcfd18f01fb8
ipa-server-trust-ad-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
62e27f55b52932cad8b3fc8b029753ae0b93cb1a6dc16e1975d7c62c9cd690ff
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-ipaclient-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm
3e7844d1fa36ccc39d5f9445b6cc262109f335700db911876aac545604841291
python3-ipaclient-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
53738c5f9fa3149863f05ebf49f004a74c3d178d9bea2ee0a13403c8391a473a
python3-ipalib-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm
67ea7a4ddb5203008f69586b9ddeef4deb164c556a4d97d00ec7ec4f5c78e426
python3-ipalib-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
04143fd2b11a26b201ca14442663c41ac21c00c325b41cd7e911da5f531506c0
python3-ipaserver-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
92eac700748418bf37fe61a1068837cf4c24c2dec304f4f62a283dbdd9a91aad
python3-ipatests-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm
81e12d9e93633047cda161a6b096361b7a521cd848f545b83022df803cbc7230
python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpm
614fd471d5b1912f23791f8b533172d92d1c6b27d504b4a900180f83d7e8c37f
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm
c5f6dfd01f04862214fa2f092a4574889d903e9a081cae92ead60cc020557baf
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
python3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm
94698890dc8f5935b11ac8d3e2cd070ed0095cbff39670a6a09638b03045452a
slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm
b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2022:7541
Low: redis:6 security, bug fix, and enhancement update
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873)
Security Fix(es):
* redis: Code injection via Lua script execution environment (CVE-2022-24735)
* redis: Malformed Lua script can crash Redis (CVE-2022-24736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for redis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873)
Security Fix(es):
* redis: Code injection via Lua script execution environment (CVE-2022-24735)
* redis: Malformed Lua script can crash Redis (CVE-2022-24736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__redis
redis-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm
993f80907022da689b54d819c1393c56e94702a0bad0edaeb5517a2db1d874f9
redis-devel-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm
41aaf2f81f3473eefbae0eaa3f6d923b5886dbd8f1517b4d3d3143387e41f404
redis-doc-6.2.7-1.module+el8.7.0+1105+8815ce78.noarch.rpm
7bfd99fe21b4a2ac911ddc70db22e0e4bc0ac484a0760bd596fdf3a5daec8524
RLBA-2022:7542
subversion:1.14 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
731bbe79595f494e581798261d3910616e1bcdbae2ef7f981b215453cf5af705
python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
b9453a4cc7f514c6b5d4fc9635d55f1cf4c75dc38cb5f774719646b8d4e57001
subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
2089246938eb318f05ba38eeeb5cbba0cf766f9b1d2add194ed624c6123087f5
subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
7a0b71de12a9a00fa90c466b489c01106b0efb79cb41ff2eba7559ae09236461
subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
117b77bc021f04f14594b64923ba7fc5d339150c0c18bcaac03c2830da8dc238
subversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm
911dd1adbc2b2cac43e6114aadfc7a825121a1e4211043c26c97549ab1495e75
subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
e08caf8753168202fcb5ed6b9c38e8bb3897bfa19054afb1746cd7ea65d6fd4b
subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
2f746f1042536d1ba89f58dfb7530418fc05f4c86af692b53a40239cb12a83a2
subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
af4c11a20b867799fde5ed6bf4dfb553c6904e4e9c46a1824273bb52354920a0
utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpm
58848ac20523ce7eb107a8b9ce747474ded2c3f55f12f1f6c23511e45c735e6b
RLEA-2022:7543
subversion bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
dc6f52adf8b10fd6b240c72b5ea1d62e0bbbe3d5bcc47380339117fc1953eb3f
subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
802bbeaf38639b1e42096fab308cf1bf8efe3df3a1b3c3720b7a5ac3939b7265
subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
e5c5a44c338f73bb0445575d27aef6a4b1a7d1ae1f7246b7bce10b6fe5782f47
subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
152d3eccdd9928c4d97f5a47117cbd0d224ae5b7c9886e3cb0414f645ad85d82
subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm
173765bd35da01cbad3cba259410b0fe81e32cfe2efb3795e435403fdf4029e5
subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
1837382796e426c99566575486d20468e5e08d54a9feec23a37f37664c105dd1
subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
c019433f83ba3f54fb215c6f1a57e182c582f2f7b5aba6659278fb65bf8216cd
subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
a181eeabc6eb2ac08c26cea039b8776703ecd01ee9af67eeddeef97c3765418d
utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpm
58848ac20523ce7eb107a8b9ce747474ded2c3f55f12f1f6c23511e45c735e6b
RLBA-2022:7545
zenity bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zenity.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
zenity-3.28.1-2.el8.x86_64.rpm
77daeb3134ae0280c77c265cca49f6116c1390eaf3b1c5ff3f0aa910d1a4b54d
RLBA-2022:7546
createrepo_c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for createrepo_c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
createrepo_c-0.17.7-6.el8.x86_64.rpm
d828fa1173d6e0b69249da5c965b6ba3cefd303fb390e485c768f4c540e044c0
createrepo_c-devel-0.17.7-6.el8.x86_64.rpm
b1cfbe29d70723acd0b6d83293a4c66c85c78f82c8db6abf5d57b4b771e0bf43
createrepo_c-libs-0.17.7-6.el8.x86_64.rpm
035cc734eb41822da21c95e6216047da87841c6e556820a07eeb3cc719b0c6b2
python3-createrepo_c-0.17.7-6.el8.x86_64.rpm
16e83c095a1c3a4654b4ffcc714e7e93fb5c93a626f5e6199116f082a4357b62
RLBA-2022:7547
gnome-shell bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-shell.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-shell-3.32.2-48.el8.x86_64.rpm
e50fd5ed905dde25ae8c673f919534cf9cbb6c339dc177b6afa62173acd319ea
RLSA-2022:7548
Low: Image Builder security, bug fix, and enhancement update
Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.
Security Fix(es):
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for cockpit-composer, weldr-client.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.
Security Fix(es):
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cockpit-composer-41-1.el8.noarch.rpm
d7bfe1373b85cd1f91ede9e66071d02acf3fe71c634101e92a2c5368adf4a546
weldr-client-35.5-4.el8.x86_64.rpm
19c8b20aab31af7a43f7ce7a80a348a686adb340b65afda7f6c4d83d25da3485
osbuild-65-1.el8.rocky.0.1.noarch.rpm
c66df858d97a7bfb6f08448e4b46dd13a87129c13124b70e0b79ecf303061d11
osbuild-luks2-65-1.el8.rocky.0.1.noarch.rpm
b666d99dc28d5a4d23f638ed26fc488d9700c2ac1eefcbafc8c751baa0ef7d9c
osbuild-lvm2-65-1.el8.rocky.0.1.noarch.rpm
ffbb5b12367dad592e26541798c773fc6f1229d6d19ab5c58664679d3f0e4cdf
osbuild-ostree-65-1.el8.rocky.0.1.noarch.rpm
70651b8c479985e20ba1cc5131079bd742b7e5b4f898597bbce44010ba4aa7ec
osbuild-selinux-65-1.el8.rocky.0.1.noarch.rpm
c16458f41f87af49f4d67b8d92393feb069f7981efcca5383010db929e9f8666
python3-osbuild-65-1.el8.rocky.0.1.noarch.rpm
2d29649c59f6c1fae6565113431d1e679689b229b930a6da00f1d3e4d83ecdf7
RLBA-2022:7549
rust-toolset:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rust.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__rust-toolset
cargo-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
e2aacb62b0a04d09e65f77eb3e6956c748376c05f6256ba7280f11242641aa8c
cargo-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm
d5cfc7511803b28817230db889f64b64da8c8a85a7cf37a15d52ac0bd115089e
clippy-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
b55e65d264a1edbf17dbdad814cf6d1f0c5d4f2eeb74f2fe3b544b7b8696ab5b
rls-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
9292c0914637091ccfc4548010a93309190976fbafabac36017f925663261924
rust-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
597b07fc8c22d4eaab9d77ed221630f5c150dde5294dcdba7bab4016ed400129
rust-analysis-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
9847d19de31f87f39a3e468cd7dc83888b38031bf3392fea1421bac0c39b9dfc
rust-debugger-common-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm
4192226b0a6cc7cf738391a14321c835225f3731b1b8fd654010475cab0a3aed
rust-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
05711b5b03f2ce3d391815ff403527b9b4e60fe998d3be1ee6028688d2efa1c0
rustfmt-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
616c1c9558c7be14424a13966220a074edb22bbf1182e1a97283cf5d8b322054
rust-gdb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm
9b6abf4b2d05d55c5bf242364e319d0b04ed9d27ab6119ab0430bca381ac63bb
rust-lldb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm
a6c8e4cac0b76628ed2d5295bad5d5c149c45f046729c146e6d6dbf2a252edfd
rust-src-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm
943a8bf08f99a073fdfc258b588cbf9bf6690cdd2987551ae03fdd476086e7e8
rust-std-static-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
d52db076d0134d47baa62886125b1f01002747e35c1f68f533234f97f444edc2
rust-std-static-wasm32-unknown-unknown-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
af938bf001ff2a4eac39304861b05bfae61be186e5216dd9e618f6c58f208a44
rust-std-static-wasm32-wasi-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
0e339fd20d42a84dc580f26aa49abf344a75c21ad438cbda899da6f81551cf3f
rust-toolset-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
f322dd661282948b26c683217b23d22ddfb41312c27b9afd50e8b9ca9736d462
RLBA-2022:7550
gcc-toolset-12 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-12.0-5.el8.x86_64.rpm
bb3bb847cad532741692cd6ee4aec06211ac3813583ac942506f14de75cd4492
gcc-toolset-12-runtime-12.0-5.el8.x86_64.rpm
bbe5cbe4d6baa144f7ee3b6e9da8858b68014eb39b1bb695e7cda3202627dd7a
RLBA-2022:7551
open-vm-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for open-vm-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
open-vm-tools-12.0.5-2.el8.x86_64.rpm
d83ff8d9a0ee44ee88557c14e9d0e0ba1f914c46156a3b7a72110c4c75d4e18b
open-vm-tools-desktop-12.0.5-2.el8.x86_64.rpm
d26ad2544eed14cc8820cd48dcf587e2297bb23b69453540f39594eb1ccaf93f
open-vm-tools-salt-minion-12.0.5-2.el8.x86_64.rpm
c480803dfafaea1e468ec9fc6abaeb0ed847e4bc9652ab0c2d3ed6bdcf24a83f
open-vm-tools-sdmp-12.0.5-2.el8.x86_64.rpm
1edeea21be29003c5601fd52c98b39935890b33f5cd60fa27f28653260b6369f
RLBA-2022:7553
nmap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nmap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nmap-7.70-8.el8.x86_64.rpm
c7cc616c87e54be47898034e3444f285fbc48dc1737a35c08e1ca53b580355ca
nmap-ncat-7.70-8.el8.x86_64.rpm
b347dd5a8f73d8a60b1cccfc7430f170ad6cdb62a21fc992bd9e9bfcd7f62763
RLBA-2022:7552
389-ds:1.4 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for 389-ds-base.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__389-ds
389-ds-base-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
fd4b8faa3537e6c1ef532c877e223a0352bcbf54a5b9b45b7436afebd70bc5ef
389-ds-base-devel-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
c85f42e199ab8b7796366b25ac528cff406ec413dcd43e67ebb60d055b867969
389-ds-base-legacy-tools-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
0fb9e7794dd320934e292c19fba27baef221225ab2b85d3f635ecb6493822fa8
389-ds-base-libs-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
90b0f1fb9776623272a2c53715d6be6c6bbc0a1baab67d9618c10be91668bb65
389-ds-base-snmp-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
af40980abeff5a461d09cec4b5ed13facd6771a658af746f29f71348b2fdb60b
python3-lib389-1.4.3.30-6.module+el8.7.0+1060+852806e7.noarch.rpm
01214606f2a6a7c6d1bf17fff3b1de0cead7e9c170d7161733e620766a744bf0
RLBA-2022:7554
cockpit-appstream bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit-appstream.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cockpit-machines-276-1.el8.noarch.rpm
cb65ac78dafa8d93335587d0d7c1568e4025a79575fcd43bf0a7d4a93296dcdd
cockpit-packagekit-276-1.el8.noarch.rpm
41f18cfc41073c69c14a5be37f22ee6143ec87dc812b7083489fc3886a5ee4e2
cockpit-pcp-276-1.el8.x86_64.rpm
724958dd3523c678b448d672af28f3414cf897a54eed5e1d95b308dbd24ec64f
cockpit-storaged-276-1.el8.noarch.rpm
9f2a640e294af651a88a7b05476cdaa8b2c4cd723cf41cb32cd54b601431241c
RLBA-2022:7555
osinfo-db bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for osinfo-db.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
osinfo-db-20220727-2.el8.noarch.rpm
f02e51bc7125ee294eb4868d4b7b2fca55b41675ca738ee459494b2d5335c6bb
RLBA-2022:7557
ostree bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ostree.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ostree-devel-2022.2-5.el8.x86_64.rpm
d9cf6e883b8e44fb17e72fd716130ff67e206778409ea9c95dc624e57d693da1
ostree-2022.2-5.el8.x86_64.rpm
6470b17fcf53a73a65c26431776bdd19a96694fc30153338c34f37c48f71d821
ostree-grub2-2022.2-5.el8.x86_64.rpm
6d647b18115b7a3b11910ec40e37f01da98a46f6cab9c2b18667930f6c2b70ab
ostree-libs-2022.2-5.el8.x86_64.rpm
1418313af255a42d78576f3469a52569a8f3714f631f830d7327af87e97d9429
RLBA-2022:7559
lasso bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lasso.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lasso-2.6.0-13.el8.x86_64.rpm
5db64309da2504980bd16ab3f66dd92e05db01b6cf53e6d5303f3fe3794f1c26
python3-lasso-2.6.0-13.el8.x86_64.rpm
a48c00e1bbe40437cea54bdb5110ab9a69fc60270c404e1ba36bd27ac62f09d8
RLSA-2022:7558
Low: wavpack security update
WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode.
Security Fix(es):
* wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for wavpack.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode.
Security Fix(es):
* wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
wavpack-5.1.0-16.el8.x86_64.rpm
c6f564012bcad071e357f40e1fe440d2450dce3d861234012db5a202195959ab
RLBA-2022:7560
frr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for frr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
frr-7.5.1-4.el8.x86_64.rpm
40349304cec6cea14759a270205c06b16524aab130b788b6dc1b76e078e85ffe
frr-selinux-7.5.1-4.el8.noarch.rpm
1b12bff8d2cd3ac2e31220ed59bf3d6cfe101821e1e7a731dd03584a9ad16fc4
RLBA-2022:7561
crash bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
crash-7.3.2-2.el8.x86_64.rpm
38f279bf1df01be9e2748c6e471e0bf5a567a59ef29c7d5480e5e129adf6f8d8
RLBA-2022:7562
mariadb-java-client bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mariadb-java-client.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mariadb-java-client-2.7.1-2.el8.noarch.rpm
b12d6e24639f571185cb4e7dd799f25d24b080c106afcfe90f47043db27f9573
RLBA-2022:7564
gdm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gdm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gdm-40.0-24.el8.x86_64.rpm
5209a4abbd8ef0be8f1f69de8cf1aa055cf62e89887c0820d5c7460d3bce1135
RLBA-2022:7565
gcc-toolset-12-gdb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-gdb-11.2-3.el8.x86_64.rpm
113e65b0dec403e8d27a46c7614e0d52cbaa8ba67d219a7584d27cb96e3a4389
RLBA-2022:7566
kdump-anaconda-addon bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kdump-anaconda-addon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
kdump-anaconda-addon-003-8.20220519gitffd365e.el8.noarch.rpm
afac980b6ee480376777f6219d6257898213268326d399f54ca97d716421a13a
RLEA-2022:7568
Rocky Linux-system-roles bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rhel-system-roles.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rhel-system-roles-1.20.1-1.el8.noarch.rpm
afa41c37e83245af98b4cf2de70cbff146ab3098d215861487304b25ccfa2962
RLBA-2022:7567
evolution-mapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openchange, evolution-mapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evolution-mapi-3.28.3-6.el8.x86_64.rpm
7f231b19829cf1654fa538ebb26420543f4afaf10fc28342c9dc46790c17a214
evolution-mapi-langpacks-3.28.3-6.el8.noarch.rpm
92c162bdf2086d3155879a8959e1609ec8c866583c7ca466db05210440fb789e
openchange-2.3-30.el8.x86_64.rpm
d360ecf50110f43847ce2928f60ce179feab205b108d75c05efe0e4cdbf84362
RLBA-2022:7569
gcc-toolset-12-dwz bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-dwz-0.14-2.el8.x86_64.rpm
ec341f65c71d9195a1cdb04667c4a918343269a7eec2916e770e26c5a8891e4e
RLBA-2022:7570
gcc-toolset-12-gcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-gcc-12.1.1-3.2.el8.x86_64.rpm
5f036e6fb65cae4c6e167c2689023e3829260ae53ee5eed33eaaaa1549f6853d
gcc-toolset-12-gcc-c++-12.1.1-3.2.el8.x86_64.rpm
ff3c8e494a47328d8b81142cde56486cdee179aef1627015f538b28afaf3d533
gcc-toolset-12-gcc-gfortran-12.1.1-3.2.el8.x86_64.rpm
dcd4889891cbe7e92a591f9698fb865a74fff7e2163015e2dbd8fcc69a7ed761
gcc-toolset-12-gcc-plugin-devel-12.1.1-3.2.el8.x86_64.rpm
e105fc2a8b63133b835544259e25d89cf005e78f9f3ca67f11d0091c3dc181ba
gcc-toolset-12-libasan-devel-12.1.1-3.2.el8.x86_64.rpm
04a5c62c5052f74f31475db17553ab88f39815d74d1011733396dc7418901948
gcc-toolset-12-libatomic-devel-12.1.1-3.2.el8.x86_64.rpm
c2112498e3675685653f75031aa2db6dc146cd168fd0784cad59a291858fdd0e
gcc-toolset-12-libgccjit-12.1.1-3.2.el8.x86_64.rpm
844e43a44a05f61e469a7a6f329f260c76759af94ae2887ef9e95e194236de85
gcc-toolset-12-libgccjit-devel-12.1.1-3.2.el8.x86_64.rpm
d5376961ba53bb5cd32ae4a4c045b76e7624d2646b2d8a38c962c246eecfe129
gcc-toolset-12-libgccjit-docs-12.1.1-3.2.el8.x86_64.rpm
39eb2a4794ae978a24c235dc832738ee081e0a7f9a20fe2fd47d72959a7f0b20
gcc-toolset-12-libitm-devel-12.1.1-3.2.el8.x86_64.rpm
8d8f6a9da3763dc20c3c10290992837e3700b8d43304ef190d4ee7c1979cdb20
gcc-toolset-12-liblsan-devel-12.1.1-3.2.el8.x86_64.rpm
d78f4e39473a53250d264b7a036ecb0ac3a1b6a96e2c1d0f50c7023d34ca658e
gcc-toolset-12-libquadmath-devel-12.1.1-3.2.el8.x86_64.rpm
28a06382e87a7cae81b765c06a0fd1983d35e4f7c88dc805b0770f8e429b16ac
gcc-toolset-12-libstdc++-devel-12.1.1-3.2.el8.x86_64.rpm
56afc0a2684b3e900c5f285c85676f37ac205aad636fbbcd2847266948a8058a
gcc-toolset-12-libstdc++-docs-12.1.1-3.2.el8.x86_64.rpm
e637572b30d1d1a8e6db6c777e86dfafa79abe24df5466d72cc18a4e3943a1a9
gcc-toolset-12-libtsan-devel-12.1.1-3.2.el8.x86_64.rpm
1275294233303e79d66a11eb356125b64f52d145cfbf93ae8dea363b162f7e4f
gcc-toolset-12-libubsan-devel-12.1.1-3.2.el8.x86_64.rpm
9ce1496e0e9aa163826496d9d8318bd09a60ccfcf110a7bd8bc94257814e033b
gcc-toolset-12-offload-nvptx-12.1.1-3.2.el8.x86_64.rpm
a909abaf339eaf0284fed8e9bb42e9e9956741cb3856097e2834ffe997143290
libasan8-12.1.1-3.2.el8.x86_64.rpm
3ee84fc5ca2c33cb691553ab75a03bdc2d025c62e2b10a899645783673603f6f
libtsan2-12.1.1-3.2.el8.x86_64.rpm
a2d5ba8622e3567c659ec0b9e5f4ab52c16ed69196963fd7c28f1af66f01db8a
RLBA-2022:7571
gdb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gdb-8.2-19.el8.x86_64.rpm
f1e95f9044f66c46c5993e65d2523a747bff3d68c8604faa755782621ba20b61
gdb-doc-8.2-19.el8.noarch.rpm
a5cb96d55c9ed35cbdd66cfd69094b735ec8779433a2f8c6fef748aa81523063
gdb-gdbserver-8.2-19.el8.x86_64.rpm
814ae1ebe3a48cb22f6560523d00abbf64a6639dedcc9264b020dd88f966ae94
gdb-headless-8.2-19.el8.x86_64.rpm
8b56d064df49f1c40fc59c0d4e135adc0dee8468d858156db5a97cd530dae191
RLBA-2022:7572
python-rpm-macros bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-rpm-macros.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-rpm-macros-3-43.el8.noarch.rpm
7279373c1134dc6b6cb8ce672a412ac4612eeb88fad59bdbeb5a443227dd1701
python-rpm-macros-3-43.el8.noarch.rpm
ad078c6aa5c5c87877398479a751b5d9fc9eb50f9e31732052b2e4b632a08f5a
python-srpm-macros-3-43.el8.noarch.rpm
39993310e90d3cb12a8c8de11906ee08fdd67f8a5791a530366ebeebe11b8457
RLBA-2022:7574
rig bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rig-1.1-3.el8.noarch.rpm
b1c77e8a68fdde3ce5d93decef1f8521b1570f8b1e54fc3aacc303b9808a39d8
RLBA-2022:7575
tigervnc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tigervnc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tigervnc-1.12.0-7.el8.x86_64.rpm
b1230611e255b50351678f6737c1f8492c6b1da51bee071d5d342e0a7be97827
tigervnc-icons-1.12.0-7.el8.noarch.rpm
122d4ffa5aea6b6b5fe506d065052144eb03b99912c49b6455e801cd7df75b56
tigervnc-license-1.12.0-7.el8.noarch.rpm
87b0fe02ecff533d787878381a4da36e22d4d3693bbb5c01ff77d3fa096f7024
tigervnc-selinux-1.12.0-7.el8.noarch.rpm
63f0cc1c4e5b95df906f4c02f07b8cdfa9ea1a3a24b81fcfbc6fc071366a0520
tigervnc-server-1.12.0-7.el8.x86_64.rpm
59c2cede9288429ba79bd7a91edae3f87a5d15b35b48f0736e99a0804057afe0
tigervnc-server-minimal-1.12.0-7.el8.x86_64.rpm
c9f6c21d2e3453fbe478ce1b8becc66701e4a08d236867bcd84511412c96c6c0
tigervnc-server-module-1.12.0-7.el8.x86_64.rpm
4af29ff868785ef4a86269a6642378bf677db753842b7238e2d309af6faa0d02
RLBA-2022:7577
sscg bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sscg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sscg-3.0.0-5.el8.x86_64.rpm
0db1c510948262c20b6a1ba7c848b0a3d4afac4f0761094362458e22ceff4253
RLBA-2022:7578
pulseaudio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pulseaudio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pulseaudio-14.0-4.el8.x86_64.rpm
e1e3f78e4963e6e3064bec42d2e0b94ede5d43f1d4b4c63600350ea20b78b44f
pulseaudio-libs-14.0-4.el8.x86_64.rpm
4c725cafcf46b59b2a5d22a5623d6f320a89a4bf3e26a9a36b9b46a6831a3840
pulseaudio-libs-devel-14.0-4.el8.x86_64.rpm
b8e962c9c1ee69f72aa7584965ef961f767772cca70fc37b327faa980bd6e572
pulseaudio-libs-glib2-14.0-4.el8.x86_64.rpm
1181871bcec0d4f9f9f3deb1a70a86e7364097002845ce07a8c3b35e25f0b2d4
pulseaudio-module-bluetooth-14.0-4.el8.x86_64.rpm
203c17e03a8109ec0e8c87fb083892a386e95a0ad1652bea8eeba4f9dbf8280c
pulseaudio-module-x11-14.0-4.el8.x86_64.rpm
5ffb362c7115ace38214e5fdde216cb1ae23b92e0dccc585fe3c8b03809c1375
pulseaudio-utils-14.0-4.el8.x86_64.rpm
95f025d51b234c77a329bdccf4b654b005d143fa1af6cb27e64ec2eaa1d4b2ea
RLBA-2022:7579
cockpit-session-recording bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit-session-recording.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cockpit-session-recording-12-1.el8.noarch.rpm
421b6d20e2ea6ad78f323be68bdb535b53e542b975e5823363306ea5481a90cd
RLEA-2022:7580
nodejs:18 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm
ec2f3e9547f189b1ac35d0ab8b0f84f81b80eb6639f17bf9a84dafea7dfe4e18
nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm
ffece635c6d640eed8fb89b76b64e4b03874e8ae7d4a1e6fba7438ba7f1c231a
nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm
0505c56e61229be002ba0b15b188bd7a31d7c3187ebadfe7e6348cf9c3f463a2
RLSA-2022:7581
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
70a9edf01a0c1901f64757580ba7fa770b350f3e26e1820427d35e78c5681376
python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5
python38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpm
d85f27c4100a37c74577e44e0a1d7691b2320c26c1fe40d981594be3a8287633
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm
54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-debug-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
68ea827137ec2715f8675b9393368075f33597c97882d2474cdbb77ac13f430f
python38-devel-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
253671a0f9ab494983d37500e7dc829490a27f0f1ed658e7507934536da2a8c2
python38-idle-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
83b0dee7242733e100b23cd0eebd2c77a0b47c507be10f5bc061c1c68dea88a9
python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm
6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b
python38-jinja2-2.11.3-1.module+el8.7.0+1063+20f2b9a4.noarch.rpm
883dbbd5be4f1eaeab9086df9445ffc28ccdaba34653b37ad511d59a75bfed3e
python38-libs-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
8e5504e8f1a06bc9c1523594028e3b7b78217286647adae1f2b8715b29d05735
python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpm
7867930af945070f981bdaa8645a2cbabe1c20d36c2afd88a03cec102bfef2cd
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-mod_wsgi-4.6.8-4.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
c88aa51cce97a21315a074389892d42df391b98d18eba4194960548ef3e0c9e4
python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029
python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpm
9b3dbb19e62de13d9396994f865fe252d5816356d9321c3cd64fe5775f9d4218
python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae
python38-pip-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpm
964ca9c5bc0818af45467f59cc7e3595ab2dc3491020642fdd0f74f6f4008f34
python38-pip-wheel-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpm
a774e8604a587c3cfe336da973b573416850b4e2fc6858c83edbf3b884c7781b
python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm
49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239
python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm
d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba
python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm
0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b
python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm
7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2
python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm
21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9
python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm
74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5
python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm
5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1
python38-rpm-macros-3.8.13-1.module+el8.7.0+1063+20f2b9a4.noarch.rpm
fd866d66f9ca5928930867074b5ad03726fae25223f72a4d570c8c7710de1231
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm
3c6af4f697c00c5adcd95066875ad9822fdc705e974cdea514749be83dd17d52
python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm
b038bdb9b50ede04d3b94fcd7e0f06625a6fee2c99be14ead3a15bc9bcdb5cc2
python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm
693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e
python38-test-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
33e3bc0f8a3badff0a2c98d23517c75af46747be5c6f4180071f87c5f44bad7c
python38-tkinter-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
c8b73f455de91cc9f1768ae07b0a39feca6f85d12f132be4165c279d6844adc7
python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm
288302321a47ab51788ad97666b0a258279ad9b0a4dba03818e20f84e517f0dd
python38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm
67c84dd6faadc937503b43a5381fe9fa4aa3db54bb96b83621c2d1a0c4c9f948
python38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm
c50b9253593f355f6e89721a5b6ee9025e5d8c1ea227cbc2d54b0b8fea12cf08
RLBA-2022:7582
gcc-toolset-12-annobin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-annobin-plugin-gcc-10.76-5.el8.x86_64.rpm
d81c0388932c920a78267d834ad095e3a44522d5c311043611b5c579ada2d5ec
gcc-toolset-12-annobin-annocheck-10.76-5.el8.x86_64.rpm
b8a9952c6f25520cb101e48561e554431c7ebc3e5fa04c3f9e741bf2f69d0f0a
gcc-toolset-12-annobin-docs-10.76-5.el8.noarch.rpm
8f4fce9cd9bb839c7d7e447baad469ab5f83cd5c549b1f984584b40d9edae521
RLSA-2022:7583
Moderate: xorg-x11-server and xorg-x11-server-Xwayland security and bug fix update
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xorg-x11-xtrans-devel, xorg-x11-server-Xwayland, xorg-x11-server.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-9.el8.x86_64.rpm
243dbdac755b81ceb4e08f4e5c8df7deaaa6c2fda23af5c512040cca4d620303
xorg-x11-server-Xdmx-1.20.11-9.el8.x86_64.rpm
cc382d22f8c338a0a30ddab2206c1c42cbec25b99fa0bf390c859eed820d8596
xorg-x11-server-Xephyr-1.20.11-9.el8.x86_64.rpm
ebb46c4978564fd1539eff728a8de6db3f75dedc744592683409984af203371f
xorg-x11-server-Xnest-1.20.11-9.el8.x86_64.rpm
fdef8f253dd920e91d2f9ba799a5b3e5b95204756d3824f261a4a93d66a72f7d
xorg-x11-server-Xorg-1.20.11-9.el8.x86_64.rpm
c9f4a94db051b499721b84bb3eddc0b5d895ed8a2c393fe20ceee4f6ff6f22da
xorg-x11-server-Xvfb-1.20.11-9.el8.x86_64.rpm
a99a7511f43cca2d6edcb49e9fdcc4d26c4ffaff15f9fe6cbae504e06e3a10e3
xorg-x11-server-Xwayland-21.1.3-6.el8.x86_64.rpm
d4122e38cb1e98d83ab05954f3917ea6860595f3656084502f4d4aa7352d16d7
RLBA-2022:7584
lorax bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lorax.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
composer-cli-28.14.70-1.el8.x86_64.rpm
566b39066cf83df3757322bd4f75f5e2ad0e204e8ffcae974577a9f9dd88c385
lorax-28.14.70-1.el8.x86_64.rpm
3fea44f5a18ae5d2b1b2ba431a42bf55200ce6687ae39ada916bc19620f40e86
lorax-composer-28.14.70-1.el8.x86_64.rpm
6e65bb0a8210698bd1744c0e2af233843232ebd500ecc872db7ab16e7c8f6f40
lorax-lmc-novirt-28.14.70-1.el8.x86_64.rpm
7fdbe69127d3b95fe7fdef36f7e7decd866e5c9efdd661d440e8385e311fc185
lorax-lmc-virt-28.14.70-1.el8.x86_64.rpm
103ba3e44ec3b2bb7155a5498f94ba1661549e19321a071b009c00b4480a4970
lorax-templates-generic-28.14.70-1.el8.x86_64.rpm
a35538ec540cbe2e3fe0c7d40fca5af6e2062e0f72bc9bc5a9f90c1c26561f6b
RLSA-2022:7585
Moderate: libtiff security update
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libtiff-4.0.9-23.el8.x86_64.rpm
737b891cb4bbb38adaa29d482c291dd2bfca79cbc69dfc4113209859109e7641
libtiff-devel-4.0.9-23.el8.x86_64.rpm
a0d3483698c48679e4a03e5b5e33aa8303fd8a82a80c7c652f3e0789712e0f85
RLBA-2022:7586
tlog bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tlog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tlog-12.1-2.el8.x86_64.rpm
f14e1d63221cb540cdb0d5ef775cde86b9c6fb6ccb006313d95d06ae9acf4cd0
RLBA-2022:7587
gvfs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gvfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gvfs-1.36.2-14.el8.x86_64.rpm
c3396af3cd19238ac1e3d4e0bd180fcb365fe57ba37c790dea55fe006a31a7f4
gvfs-afc-1.36.2-14.el8.x86_64.rpm
799de4e17e055a49ea4e2af95b8f193c9a41ef84cb4db9a167a4e164d44f7c1d
gvfs-afp-1.36.2-14.el8.x86_64.rpm
fe026dc45a4f1f1458c4081f1fd18323ffddf681c696ac2997945bf260242e4b
gvfs-archive-1.36.2-14.el8.x86_64.rpm
a3d9985a0c62dddc2f2e67b80e837d07c73111ef81e24ec0d474214726f66e07
gvfs-client-1.36.2-14.el8.x86_64.rpm
e3e750d027c8ec2ffec10035204d5b86f5622eb8f3a6646db64a9fbbdafdfd1b
gvfs-devel-1.36.2-14.el8.x86_64.rpm
ed4893212db9f34afb44f4db740f92b9e09dddd995107878a3286d6cbdeeadcf
gvfs-fuse-1.36.2-14.el8.x86_64.rpm
bbe4bb376c304201a1ac23eacd1056661044b7a4c4d049ee59bf883f3de4b64c
gvfs-goa-1.36.2-14.el8.x86_64.rpm
6ae54c65bed8a86d9637012094096385e864ead1762208e1179297d4a4de78f7
gvfs-gphoto2-1.36.2-14.el8.x86_64.rpm
a0f4c1b85f1d5db4e2441dbdbecd8c5741a6b73e0e5c977082ae61b097b4f1ce
gvfs-mtp-1.36.2-14.el8.x86_64.rpm
c12ec2c5bfa6fdc98d882d830cf04681bc03cd0d0bf11360520cc238da2d8efe
gvfs-smb-1.36.2-14.el8.x86_64.rpm
73db3c63640040334dcec02cc4f280c30fc852c94ed3783694c310251dd867ab
RLBA-2022:7589
yara bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for yara.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
yara-4.2.3-1.el8.x86_64.rpm
bde176a3a4a81a37e20fda6ce6066f6cc1efb13af44d5cebd454d39a624ceb7c
RLSA-2022:7592
Moderate: python39:3.9 and python39-devel:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
ed32c93d78b87f60465c94b954b49bb628a596faa9471a9abedd7e4f211c2b7a
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-devel-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
a08dbea41abb325d9bde0d9255ef00bda9f75d57c110053fe8d3de5c63fbff04
python39-idle-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
f2ffd5105213b5d051686c36392d8e8d5052cb81340c8a179a30c3656b11389b
python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm
5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4
python39-libs-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
0a70fff839ea02331a39ed679f5e3eae58501bbad631e7ab0f20657091b06a86
python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17
python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm
603e3ea442bedc2f6a2ab4f9b17eb4b50ee5bcfefdf2a90ac14eb32fdf1d3938
python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57
python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm
c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4
python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12
python39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm
5204c287450cf1579ca958d4b8e807cb70b5b7f55903604f6e8c64b9da8df019
python39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm
eb25c5ade496b7c9d8ac56a635c29813f9e7b57f108e146e4be32678bea3874d
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm
4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748
python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm
1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm
12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c
python39-rpm-macros-3.9.13-1.module+el8.7.0+1064+ad564229.noarch.rpm
a4e8f84e09b7ddf2936e56bc1e40627d7d738894302a6c8254350ebd6ea35a81
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm
2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55
python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm
fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e
python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm
a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9
python39-test-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
9c12c6ed6455bbcfcde117dabce43a704c0313b56d294e6603cca5486868fa8a
python39-tkinter-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
ac9255a15b872f0eb7811bb94786ba64395b4569d85d9f1be078638c5e83b509
python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm
e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94
python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm
58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa
python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm
b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190
python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm
c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0
RLSA-2022:7593
Moderate: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107).
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107).
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm
4af53602814c4e6074f48e25713ef6f8384bf956bdcefb1d33abd3c1071671ad
python2-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
7015c1da853f57364651a1f73dfaad46ebeb1c296a6a927431754dccac1acfc0
python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81
python2-babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm
9de14f945b487d8dc1f04035a229c98f3f2cc7ec0522d921c10217b302ef997b
python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm
6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91
python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm
b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015
python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm
f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-debug-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
3e7704a761bd3ad81d595574ca315458a858e0ae769cbb76bfefbd34c5143cf6
python2-devel-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
4009f30096acfb9b0337901f47fd585a5bb0486a185a988c1b9bd1bcf3674662
python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm
6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc
python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568
python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm
3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd
python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm
1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35
python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm
a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef
python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm
36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d
python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm
e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011
python2-jinja2-2.10-9.module+el8.7.0+1062+663ba31c.noarch.rpm
d273ecf02c532bb6e73c45d77e576f1b36560f9b9d913ac3f82f031b3503292e
python2-libs-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
cf5083603baeb48b91afdc0da35c2ce52ec937582fd8a57944e0dcb9dcfa6da3
python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.x86_64.rpm
1257203382679fe9daa7dee565a99b8ffdbcefd743bda938d3facb7c15e9a571
python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm
5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33
python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9
python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm
a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc
python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c
python2-pip-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm
424e634426f8d83d229c9960f37b448d1c68e8e656c8d820294ea9cf7262f368
python2-pip-wheel-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm
edfdfe37a85d18af2192a371b7949e9dbb34e31f1acb4fde35483074d0e61e75
python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm
0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d
python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm
b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798
python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm
d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa
python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm
bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae
python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm
4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3
python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm
86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77
python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm
fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm
cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b
python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm
f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd
python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm
7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed
python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm
3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b
python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm
7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326
python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm
5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
python2-test-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
57b5085932b57f43f8f5359f190033586be37c14121eb5da7cfe8462118d345f
python2-tkinter-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
b7fa41bc91383b205ba3e8f20d8c3f397d6d353a616f88f9381a0c7974b86a6f
python2-tools-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
1894967e20dd3a304945f1bdef29adcbee4ccf9d34fb14b7d7b0e47ac9566964
python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm
a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509
python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm
d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b
rocky-linux-8-x86-64-appstream-rpms__python36
python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm
65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960
RLSA-2022:7594
Moderate: poppler security and bug fix update
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for poppler.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
poppler-qt5-20.11.0-5.el8.x86_64.rpm
43f58f930b820bd24c5e0f2937b59f98b2ac8e147e173bcde2b493ba594ab44a
poppler-20.11.0-5.el8.x86_64.rpm
6a337f32ddb1e52c1f81b62612990a2aac41f6e458765193ce30373621d5008f
poppler-glib-20.11.0-5.el8.x86_64.rpm
b8dbaa5539bbeae4a7d9190d083b1975a6330895e16e46e110c6b01098ac875a
poppler-utils-20.11.0-5.el8.x86_64.rpm
498d99a9b5a9f9636419f7397fbfff5fc6881b7e2f4f8e8c197985d0d474e11e
RLBA-2022:7595
bcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bcc-0.24.0-2.el8.x86_64.rpm
b43d3157bece9cf3d3140b27f39eb65b0e6098dd7660183af2506e36f415e808
bcc-tools-0.24.0-2.el8.x86_64.rpm
394c2506dd1d27850ca14d3f452f1bc348b6a290b70abc473a84b5a298504f5b
python3-bcc-0.24.0-2.el8.x86_64.rpm
742246525d38e5c6ec71e75544d4e4de06a004e0ae3451ca81afe84ce24e985d
RLBA-2022:7597
ansible-collection-microsoft-sql bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ansible-collection-microsoft-sql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ansible-collection-microsoft-sql-1.2.4-1.el8.noarch.rpm
b5780681de6ea1535d87398d29640288a0b6df15f60431698eb8105386136333
RLBA-2022:7596
sblim-wbemcli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-wbemcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-wbemcli-1.6.3-16.el8.x86_64.rpm
c3d4b7fbe0bffc67fa1f645f42cb02f7740ad77903ed01a37c3473057e6081be
RLBA-2022:7598
bpftrace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bpftrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bpftrace-0.13.1-1.el8.x86_64.rpm
e8a04ca8b6e3e2e02d815e31bbace35f1c90201bbd04c44dcb33c0ac129c2662
RLBA-2022:7599
xmlstarlet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xmlstarlet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xmlstarlet-1.6.1-20.el8.x86_64.rpm
e42355fc28e75e550270e7d44a037b4d5af17830fb2eac4acbd594c9561b5ee0
RLBA-2022:7600
boost bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for boost.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
boost-1.66.0-13.el8.x86_64.rpm
f9b5aabf4efd891eff03865b02a5216c09a3ed805813d7fee22967de35990d89
boost-atomic-1.66.0-13.el8.x86_64.rpm
81a52eb6c974139e40dcc0a2a0b0a74df75f8bafd69d4d040c8564c73a6f051c
boost-chrono-1.66.0-13.el8.x86_64.rpm
13d9d6b2e16d4ed399364fa302313002eda8954a1972660b00766f69603ca130
boost-container-1.66.0-13.el8.x86_64.rpm
ca0e76f6a19edd3f438282d1410f3bf889ff9743a5222c45c786e878ac1dd4c3
boost-context-1.66.0-13.el8.x86_64.rpm
51455cfaa766bd42c0a9b162c624d7907573cfea8afee2a583222ded31173448
boost-coroutine-1.66.0-13.el8.x86_64.rpm
9c1b1e698193294b66986bcd3f8860689a03cc2d68e037be6071d6f80ef0fd07
boost-date-time-1.66.0-13.el8.x86_64.rpm
0ccb46e0969c83decfaf0d1cc6e31eb7383d146828bf50ba01201be26d7b0dbe
boost-devel-1.66.0-13.el8.x86_64.rpm
c16446b23a0fb0483e9b0416e82cdeb09b2505efd3262e465d7744f35872fd1b
boost-fiber-1.66.0-13.el8.x86_64.rpm
e08d739334ce5b91b2e6778c0897ea96649dcac433e257d78e8a87a2ef1faece
boost-filesystem-1.66.0-13.el8.x86_64.rpm
7c7c3f708ab3908ab8c5ce9c24b4afd90f763fe81f56f61981b581221fbda82d
boost-graph-1.66.0-13.el8.x86_64.rpm
7846d71e0283f478bfe2881d5d54113176723b19f6188ce7361fc39048b1f91f
boost-iostreams-1.66.0-13.el8.x86_64.rpm
3ff6762969cc3795e195c79c57462271aa7cc0924a97a47f5f620d974ed9b159
boost-locale-1.66.0-13.el8.x86_64.rpm
73d5da8e7c6c2d9b7f2c744ee40c3bd2a20de668607bf657a1ec53d456fd401b
boost-log-1.66.0-13.el8.x86_64.rpm
2d4281a6f52c320656ec0942d8f2028342d0102a3de12187ab6b78bb5e0bab39
boost-math-1.66.0-13.el8.x86_64.rpm
03863ce72ac7080d25b1779b07bec8c7834275709b99cf69a76a6cbb515cd9d2
boost-program-options-1.66.0-13.el8.x86_64.rpm
4b5301b5d92d824990af374b3650f63d700fa46960d1459a9b8da95e6c4b5931
boost-random-1.66.0-13.el8.x86_64.rpm
e33fb27c611253dc3f4eafa516a83f9eb05c1f49bfd7d65caeb95e9de8edfde8
boost-regex-1.66.0-13.el8.x86_64.rpm
5aa01be320a94051756382fd78878cffb8fdf59a97fab23a6a750d0c9d99b254
boost-serialization-1.66.0-13.el8.x86_64.rpm
1dc4557a94ae44f131959cd41c5b993a0d71c0261bca77d7eea5b71d692136b9
boost-signals-1.66.0-13.el8.x86_64.rpm
9fcd1d616e52673d76a38c49956cdf51de61de1a6030c272f16dfa35c2861f54
boost-stacktrace-1.66.0-13.el8.x86_64.rpm
6826fbdd8457d8dc4f7a3a680d5b3b95d7a7febc99b5c667cdcd436f11262f15
boost-system-1.66.0-13.el8.x86_64.rpm
fcae1cd46f216c9c9741894d2c4995d7ad14848ad06139f07a2dfc59d886d5a2
boost-test-1.66.0-13.el8.x86_64.rpm
64665d9a04cafd8ba88d9e9ef8be6ce034900a97d50bc2b7c8db98b1792eb93e
boost-thread-1.66.0-13.el8.x86_64.rpm
e0091543ecc67f75c2d21f14c484f15e377045e9b885e37bda6c2ada4367ceaa
boost-timer-1.66.0-13.el8.x86_64.rpm
05a50d26202246200a9d8faf90434d990543a8f12e96b0f154c51666cf9a45fd
boost-type_erasure-1.66.0-13.el8.x86_64.rpm
5ef4a9474ef6b2f936ec8efe5e9836b87a088ba82def6b4b237863024149b652
boost-wave-1.66.0-13.el8.x86_64.rpm
cfa1377a69616dc1f5e6093f60432413e7ef3792aa23457e56b42a9bbe3663f0
RLEA-2022:7601
libdrm, mesa, and wayland-protocols bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wayland-protocols, libdrm, mesa.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libdrm-2.4.111-1.el8.x86_64.rpm
e394a9750bef7f85575b7b5e5757b07be87d3051f852e774d2c5dd349919c57d
libdrm-devel-2.4.111-1.el8.x86_64.rpm
fd8c0a4a0402c9c0f05a2e43e6bb499371eeb9d6d373a0a1118664409c2ce837
mesa-dri-drivers-22.1.5-2.el8.x86_64.rpm
3be36619d048768ece7290533bf33d617ebd67b90db9d3171d3504b794cdb08e
mesa-filesystem-22.1.5-2.el8.x86_64.rpm
491327bd259004a5d38d1fee58b6ca12bc6eaa66f3599770f41ca93a551a0b54
mesa-libEGL-22.1.5-2.el8.x86_64.rpm
06e5f5d2ff8a974d82445718d4916043a80122355d7e72d968cfbb8e08f57dd9
mesa-libEGL-devel-22.1.5-2.el8.x86_64.rpm
1594cbdbdf9c43dde0d882936359067bec1dc66e9bb44e4bcaf00caa10b524fa
mesa-libgbm-22.1.5-2.el8.x86_64.rpm
889f75f01e3c57b747dbc83b95a31effb102af0e50a2cd7f2b9d8b766d1c580e
mesa-libGL-22.1.5-2.el8.x86_64.rpm
06e712f139ac5a65db91a3205b6783b3a60239162628ed76e3d0398d3fa20e23
mesa-libglapi-22.1.5-2.el8.x86_64.rpm
c5280a195a74d5f001366d0d31c1ec191b10603c3d5ca343b72cb066fc0e1342
mesa-libGL-devel-22.1.5-2.el8.x86_64.rpm
69e1fc2457b342d69b24910675f128f847b6cf1a57eb6423be489bab3c277113
mesa-libOSMesa-22.1.5-2.el8.x86_64.rpm
3875805b55ea3fc9690d976cf0a8e2dd16ca4e8755d834cf621563634ace5974
mesa-libxatracker-22.1.5-2.el8.x86_64.rpm
bb90afd1968756802a6ce62cdc984d7e4ed311a5d5e58fbdd531341e3ea5866f
mesa-vdpau-drivers-22.1.5-2.el8.x86_64.rpm
145c2ad189ec7d23ce54d2b524b4bdd18abd7d5d665802c58657db38f3f547e9
mesa-vulkan-devel-22.1.5-2.el8.x86_64.rpm
72593858b56bb1ccb724d16a0f73f2ee08683ae211d1d4f1826dcce5101dcd49
mesa-vulkan-drivers-22.1.5-2.el8.x86_64.rpm
1e9297112295cf07fabc4adc15a20c50cff1cfb64128477deddb9e2053cd7b71
wayland-protocols-devel-1.25-1.el8.noarch.rpm
c645c67840d46c277228fba73bf4e6bbb72e84f9e18128c1b6573e48ea19643b
RLBA-2022:7602
gnome-initial-setup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-initial-setup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-initial-setup-3.28.0-11.el8.x86_64.rpm
b7a94ff496c028ce0c0b74219c1562d1d8aaac9c7efc618e732e5b04df08ac13
RLBA-2022:7603
gnome-control-center bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-control-center.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-control-center-3.28.2-36.el8.x86_64.rpm
6006473bf42203f7f7fa2215e55a13a02d35a1dc077d726b7c2583664c1a3f48
gnome-control-center-filesystem-3.28.2-36.el8.noarch.rpm
f338919013be21a2a7e03a22a0a6088b909ae6e9d90c1902c6ddce444ff842f3
RLBA-2022:7604
libtimezonemap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtimezonemap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libtimezonemap-0.4.5.1-4.el8.x86_64.rpm
3e70b5b2eb8c0a82d5ed985ce7968d62df94786c876b83b207c3a7c973b55ca1
RLBA-2022:7605
python-blivet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-blivet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
blivet-data-3.4.0-13.el8.noarch.rpm
21038d8e6715177bb30fdffe29caa8047036d8a9e817a9f4557e857576ed3d03
python3-blivet-3.4.0-13.el8.noarch.rpm
4eb44d9cb4d461a71b079b91daa2a66ba24a8041a2b2a841fcefe68c0a09319d
RLEA-2022:7606
gcc-toolset-12-binutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-binutils-2.38-16.el8.x86_64.rpm
65ae6ef853b240ee9dbc1529e85e5eedefbc080ff7302ef345526079b3c8d650
gcc-toolset-12-binutils-gold-2.38-16.el8.x86_64.rpm
b63458b91e980c09020188726a13f5e1c424bcb263223ed8caa8ac95bfc1edfc
RLBA-2022:7607
pykickstart bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pykickstart.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pykickstart-3.16.15-1.el8.noarch.rpm
5270eb7d3a8d938917795fbc4a97ad7e45f7e7b0d81268574ff6320661a98c21
python3-kickstart-3.16.15-1.el8.noarch.rpm
30e8cdc0d4311e2e415e67279b55a32b7dd530c870470a475a65ff92f5b2f490
RLBA-2022:7608
gnome-shell-extensions bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-shell-extensions.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-classic-session-3.32.1-29.el8.noarch.rpm
ec80f11be7f3a0595344d1e76e40210a39f4ab8fa9cbe0ae2e135df854de500f
gnome-shell-extension-apps-menu-3.32.1-29.el8.noarch.rpm
8ff4b8e79c614a53b308862b5ba099ea520372ff9d3b1d1ac87cebc2573ea873
gnome-shell-extension-auto-move-windows-3.32.1-29.el8.noarch.rpm
36ef1c571cdab77ddc26df1e3dba64c7034510c18ddac209077030ffb23e4e65
gnome-shell-extension-classification-banner-3.32.1-29.el8.noarch.rpm
43fc28d158eae75f84497651b3d7aa3d02080ba45117542b667abb3e5eac17f1
gnome-shell-extension-common-3.32.1-29.el8.noarch.rpm
f9e03be95cdae3bd435c09654fe4763d867544e7ef1b0f6de93e897ef8b88880
gnome-shell-extension-dash-to-dock-3.32.1-29.el8.noarch.rpm
1437bd1e26f6e5bae726301e22d884de7718776e695115358b9582439dbac2cd
gnome-shell-extension-dash-to-panel-3.32.1-29.el8.noarch.rpm
13109fa9b789c9d729d117a9b23442bda94c2e048fd5bc513ea45f4d6f5ac2a2
gnome-shell-extension-desktop-icons-3.32.1-29.el8.noarch.rpm
44bae8d2436af05c68532a3aa6d641886e1096bc76de35f3a13419783b90a13a
gnome-shell-extension-disable-screenshield-3.32.1-29.el8.noarch.rpm
b4eeedccf7e312891b60b019f003cc700db470759e24956d72599daddd263127
gnome-shell-extension-drive-menu-3.32.1-29.el8.noarch.rpm
d0c25677bc73ab8be55dd75a6b154bd3d6e45af1b3730f69b31240d687127715
gnome-shell-extension-gesture-inhibitor-3.32.1-29.el8.noarch.rpm
e1a19c816bc7bbfcf37412a463cf513220092cb06f3ec57a5af7d6b6d3509a25
gnome-shell-extension-heads-up-display-3.32.1-29.el8.noarch.rpm
2cf86c95586dae1dac778476e5098570263b91a343cf860836efd2c5060930fc
gnome-shell-extension-horizontal-workspaces-3.32.1-29.el8.noarch.rpm
54839e0afe4342dd93e6f77f011d23f954f32e7225a254b1cb52dbfaf2af39fe
gnome-shell-extension-launch-new-instance-3.32.1-29.el8.noarch.rpm
d717ac1201846aab0c38fda56f440ee715c830a88eaf1e48569073d8be0d550a
gnome-shell-extension-native-window-placement-3.32.1-29.el8.noarch.rpm
fe769035681631b8437e248ca0f54cb9efb38d92fa5a45ee92f15b03eef0b3b3
gnome-shell-extension-no-hot-corner-3.32.1-29.el8.noarch.rpm
1e425de8c652a7644794cad6b3a186c7be9965ad6a62f8954518cd26bd5fab7a
gnome-shell-extension-panel-favorites-3.32.1-29.el8.noarch.rpm
9f1fb38e2f1dc30284ce563f58f1a336af8ba66ae846587a5f4104ab4d15e03b
gnome-shell-extension-places-menu-3.32.1-29.el8.noarch.rpm
4911b77cb960766bd1f7116b9c1f5e5080a7da0bd7b0aac74a5bb874ab759644
gnome-shell-extension-screenshot-window-sizer-3.32.1-29.el8.noarch.rpm
aefc7ebeb9924e6cb9db289fd0155bf94757f23b3d110f6ded12d537ef942253
gnome-shell-extension-systemMonitor-3.32.1-29.el8.noarch.rpm
4be5338d8da85faaeedc3b7a14540dd56d122d7ce980ffd4b888639b1020a3f1
gnome-shell-extension-top-icons-3.32.1-29.el8.noarch.rpm
0246925d43a03cc53dd168dcbc8c8980332682701a207e75295019d5277b69f2
gnome-shell-extension-updates-dialog-3.32.1-29.el8.noarch.rpm
a3e9294e11d4f33912cda78765a01972381d87fd8d13ea5863ad17824d22674d
gnome-shell-extension-user-theme-3.32.1-29.el8.noarch.rpm
5aa9438364059f0ddca85cc550e02cdd57e80c27a2979ac6b8191862802c9d21
gnome-shell-extension-window-grouper-3.32.1-29.el8.noarch.rpm
84a178d51deabb79c06616987c0794dfc3f3a47c4799c3570d2fd6cbc0755383
gnome-shell-extension-window-list-3.32.1-29.el8.noarch.rpm
64ed980e57259f0f6fde54d7f00ddeb242c813b9e7e1e0483796805beca63e09
gnome-shell-extension-windowsNavigator-3.32.1-29.el8.noarch.rpm
48d8cec0257865f83b60d18babae4bfde1b7ee0922468d25551cef74a0cfb68b
gnome-shell-extension-workspace-indicator-3.32.1-29.el8.noarch.rpm
13e70c18aeacb3000777d9234044bf1cb574429899c023c8eb6ac2691fb23413
RLBA-2022:7609
sevctl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sevctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sevctl-0.3.0-1.el8.x86_64.rpm
8883794e71306e213b24089214bb8542019dbee94dc1119caae336131b4eaac9
RLBA-2022:7611
esc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for esc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
esc-1.1.2-24.el8.x86_64.rpm
098fa8a1f91412ca575bd4373786faecf3bba27e34276ee56f83fae4c7bb5171
RLBA-2022:7612
rpm-ostree bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rpm-ostree-2022.10.90.g4abaf4b4-4.el8.x86_64.rpm
f722c597248cbc9723af75f304b0fa74f21915a8bc5cdd9fc236705e85c6d828
rpm-ostree-libs-2022.10.90.g4abaf4b4-4.el8.x86_64.rpm
13595c7f0cf104651466f47bb5ace870a75b4c937816ef0e9e60154a4495583e
RLBA-2022:7613
linuxptp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linuxptp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
linuxptp-3.1.1-3.el8.x86_64.rpm
9a606032cab1fb5bc57189b012eb24fb8ae781c3014ff6f545d47cbbbf1db868
RLBA-2022:7614
xxhash bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xxhash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xxhash-0.8.1-3.el8.x86_64.rpm
5db7484a6872866a914fe5034367b65b4edc5cacd5e9ced0d095c22be4c410a9
xxhash-libs-0.8.1-3.el8.x86_64.rpm
ebf42d96569762da0c84a0bb45e671d8dbbec85c31be20970965d5861a349bf4
RLEA-2022:7615
alsa-lib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-lib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
alsa-lib-1.2.7.2-1.el8.x86_64.rpm
bf2a1da9089da0cb1bf360ebedbbcbee3f214cd2f5e455b6374a813ca971afe7
alsa-lib-devel-1.2.7.2-1.el8.x86_64.rpm
bc17c1bd17d5be661db3b056718e6995176d87ff645afd7d23de6756f4695b84
alsa-ucm-1.2.7.2-1.el8.noarch.rpm
6308c9e936e757cda9caca8550a95b9f749c127cbcce07149faf1f893c6a894f
RLEA-2022:7616
alsa-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
alsa-utils-1.2.7-1.el8.x86_64.rpm
65ed99c2d71fd99a4fce0edbf33dc89bc5a34254600d4bba5bcc5e2c4aa54570
alsa-utils-alsabat-1.2.7-1.el8.x86_64.rpm
cb36cf54b2922d6b4b3841cc5708848ada801a8b3f1765b1b03f3dcc28bf95b3
RLBA-2022:7617
rt-tests bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rt-tests.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rt-tests-2.4-1.el8.x86_64.rpm
51a62e16f8c44ad2f798cdc626efbeac9b2190e32134b02dcf4ea2232ba0f629
RLSA-2022:7618
Moderate: gstreamer1-plugins-good security update
GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.
Security Fix(es):
* gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gstreamer1-plugins-good.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.
Security Fix(es):
* gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gstreamer1-plugins-good-1.16.1-3.el8.x86_64.rpm
2b1bce4000218db12aeb9b4d0d291379b50b74f1b76c104e397cc44be5b661d7
gstreamer1-plugins-good-gtk-1.16.1-3.el8.x86_64.rpm
17f9f05e985f6dfaf1a9aa9b749f4c3a6eb310e13dfacc864941b3a9a62f5b57
RLBA-2022:7619
libva bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libva.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libva-2.13.0-2.el8.x86_64.rpm
9e98a8ae933b9e8aaea6c3a644c15f6c86a1ee7c232b575444e1dbdebfea7619
libva-devel-2.13.0-2.el8.x86_64.rpm
3aff4ad2d1e2806565e5ac6462aa9087844f1226a5822f3c1ee968cac5e1a2cc
RLBA-2022:7620
sbd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sbd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sbd-1.5.1-2.el8.x86_64.rpm
82a8d02a85dba32889e969414148fe625138c53e8a1b16a630a88d0494666224
RLBA-2022:7621
make-latest bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for make-latest.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
make43-4.3-1.el8.x86_64.rpm
c2fb11b04b4f8f7c6b2fa99875bdd82750e9ba5a7c0cdd8b14d8770de5334f1e
RLSA-2022:7622
Moderate: unbound security, bug fix, and enhancement update
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735)
Security Fix(es):
* unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698)
* unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735)
Security Fix(es):
* unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698)
* unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-unbound-1.16.2-2.el8.x86_64.rpm
d54f95f9d67733bfedd7c020025d58fa8f3d0d01557de199df410d5a801f8db6
unbound-1.16.2-2.el8.x86_64.rpm
b76a482e3a7c9425c23e5a5522bb7d485542df4a6c7139fd23b20fdd9c840060
unbound-devel-1.16.2-2.el8.x86_64.rpm
ef50348b1d912f6a8c5d034a72d714343dd63479607610c721e1cdcc652d4178
unbound-libs-1.16.2-2.el8.x86_64.rpm
f886b2a5abf92299ffb510e03546a73c7bc9e522613b4de1babd37eec610f611
RLSA-2022:7623
Moderate: dovecot security update
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dovecot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dovecot-2.3.16-3.el8.x86_64.rpm
44ca3ac7e69ac7222188e9d81d0fd667cc6a68725e3fac7b72403f8b6ab56f84
dovecot-mysql-2.3.16-3.el8.x86_64.rpm
cca9ba93e14558a9aaa972ab1e3dbf17436747d28ee5dcb0bde3e4e90d45b8a9
dovecot-pgsql-2.3.16-3.el8.x86_64.rpm
d32ad1dd39a47a169f45d185c07f3370914e9aefb7b390629d677f99cd0660b6
dovecot-pigeonhole-2.3.16-3.el8.x86_64.rpm
7f2afd0df750de589752505a9d851dcaab761c2cce8ac41fb5bb5dc3a54aeceb
RLBA-2022:7625
haproxy bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for haproxy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
haproxy-1.8.27-5.el8.x86_64.rpm
a8e48a5349b6d288a406dedbc31c7172491f47ba5ed6ac6d986e9b18531acccc
RLSA-2022:7624
Moderate: php:8.0 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876)
Security Fix(es):
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876)
Security Fix(es):
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm
0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
a8348a286ec48a9d3604e12e82440c812e32ec26bffbce314d513c92462e01a0
php-bcmath-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
1a5b54671f55421133e8a529d85a3c123fa3d9c412ecc8e80f5b7c78f8d3749d
php-cli-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
eeff3851294f18425c968c0646b50475a97c14d92f4faa44e0b55e267c05a3b3
php-common-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
cf8bb97a63f5aa9530b5a0aa9bf858c03f33d258b096d6e47d738d0a792c9cd3
php-dba-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
b44dc57dac575f1db48001c3a949a1012c5e6716e4ea0042636f9a3db336ec48
php-dbg-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
4a83c25966e56dbc678c509c7d664351111596192d20abd18414c0959e7dab3a
php-devel-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
ad33a734ec731512f832cb3a510a5a0a7658e42374c66805bde88549473162d5
php-embedded-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
96273a2407460955cd7d5ef866fc5ad8e2d74b79095a245ffc07cbebcac2a82b
php-enchant-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
eeeead05af1841e28a23883f2578bce844218ede9ec90766022b53a20d030d5f
php-ffi-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
fc39512df234ac7e85f0987425123fadad54f2b470994414f523b62b3e49ad70
php-fpm-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
85cce205b19955a7a9ec3770fefc16f0061b8a4d61ca9f34606960894fc4051f
php-gd-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
a63857577a2659acb3e8fdec4159d54d224bac68a3ad71f860d8a74496083be2
php-gmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
69bcaa0999d4d5cc7fb7d0c79981ddabd1cfe8abf7636692f56e06c1c50a341a
php-intl-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
176d023d9815a6f42ec8375bb7edc889af14477516aba5ffeed19c802824303b
php-ldap-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
376ece7f191b43804cca3bed1cf5b1aa9665b76af448267837d4dff1e9731e68
php-mbstring-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
9f099e28b9115642ad1664564e5356f95f7be98f2dca22e400649619c842da9d
php-mysqlnd-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
7bcf84d79cb7c5ec676500c9e9256d9910e128d0f994e65f2166329403e00d98
php-odbc-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
0550ce31a2c0d310542d23a7740a5947e81eb1150f0c4694b58e064dcb031553
php-opcache-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
e307fa8123cb739f521b9f9eaab655c101ee5bb85cd926bedd1a5ab905064021
php-pdo-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
027d321cd414ebf60134f4470d4e7665b998d985b1641977da9b5bc3c4f19dbb
php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm
0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
php-pgsql-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
1d0787eeb7308493c46ff4b628d31c0bda6d7befdf3ee3367e4495bede2b4592
php-process-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
ade3494b512052966b1b2f4e14702db8346dffa9e904e30359703afff35d8cfc
php-snmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
6cdf3693c3cf99f2f4c7134f5392e27fa6641440b9e382fb386b3996aaa8ccb0
php-soap-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
263b7bb09b0b49f0a1ec1770ba76acae857ce710699767df99fd4baf85587063
php-xml-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
fceb63064b3d0fa7e035f8b740f18c906402a07b4d503ae26a167b87aaaf24f5
RLBA-2022:7626
keepalived bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for keepalived.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
keepalived-2.1.5-9.el8.x86_64.rpm
0a98989f12a97ca3ee908954eeba644438d30a901453fc3e06ecad3ec7128fce
RLBA-2022:7627
fapolicyd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fapolicyd-1.1.3-8.el8.x86_64.rpm
b511d983bdcbf2ed43b5579fee089f69e516fee36d033905ff8263f4c717ffd7
fapolicyd-selinux-1.1.3-8.el8.noarch.rpm
25d673638918789319483d2a491bddb4dcdff7b8a1b3f3e528fb167fd77189bd
RLSA-2022:7628
Moderate: php:7.4 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422)
Security Fix(es):
* php: Special character breaks path in xml parsing (CVE-2021-21707)
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php-pear: Directory traversal vulnerability (CVE-2021-32610)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422)
Security Fix(es):
* php: Special character breaks path in xml parsing (CVE-2021-21707)
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php-pear: Directory traversal vulnerability (CVE-2021-32610)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
07bf8f584e968dbf0b98dffe822d6902a58390fadaf72a50138edf455289e778
php-bcmath-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
4441262caee9f6d3d04cace9862cf9a07a2b822856c100e3030498776650e097
php-cli-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
e2128345e3a5577829de3a1a5db723802291bb3677ab173071dc787300f8c6f4
php-common-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
eb40689e613f9840ffb69f21ce9b6838b9fb29b235273464f21455949c49a37f
php-dba-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
3878213e84942a92122007f031a6ff9c05c1e2751a5a74b52ebe87383791e8cf
php-dbg-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
1a098917aa3e201a96cc3e7be2c8c5cef9eb044aaeccd389d6b1030ef937c607
php-devel-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
3437a0a07b72d5fbd5e206182cab7284f0405ed0058994f16c06ded39d44951f
php-embedded-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
0534fd869e31e07c74c3638041da0cdb90662726f06382f1f6fcb43185d2c8b8
php-enchant-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
0f6af66b1394ce147a2bea207f90c52c3d278dc7c0f4f161aa95f3a2a97f0590
php-ffi-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
85457c73a855e2d2bbc20242b56268caff452c107f2c81a6dfc744cfb7478e44
php-fpm-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
84f82ad8aa014b3dcb8549cd5e05d12c9ab2d812a508de9170e89de1b8ad8ac2
php-gd-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
0159f5632f9a7cab5584434e6a8f2d68f2cf44a6995e7cdbc43c3c13fc1203a9
php-gmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
d728cfa99a9dcaa967877dcafa771a14dd6c691787baf6258966abf32e6f5304
php-intl-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
56244aefd61b6a3880ddad75e55674f9ae961a75f948ebbf6ad5c9387622ba5d
php-json-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
306a11df0167f7855c7f8f208aa483c23f5d6bf23ade1e2650a765c445a4dae4
php-ldap-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
96ac971cda8c224e2944f8f7997716e1b75105c17473b218a8628c404f0ef1e5
php-mbstring-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
7cc7b8d3fed7f19f3897791d4666eaec1b439cdaf262052c25aa1e05fac9aee4
php-mysqlnd-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
8ac305f4fc4e8bcd0e0afb449a8059d55430ceeabeaf798e0c51da747af3dfc0
php-odbc-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
cc1be49394f375dd2c9cc316c8e056728df7c92172838f3e05eb29a7e5b68cf0
php-opcache-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
f9a1256c6aaa57bec937759f44d82e733da3ddf98c53c949e2e73e4363b06a0b
php-pdo-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
d015b7274a5c077db760c542e6b7209df1f79ba0eadcc12fd3ff446a22b8826f
php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm
0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
php-pgsql-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
44a36e0141ad3ccc42027a399e91e6fa053c54977c22a54c1df61d51207a7e98
php-process-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
9e1700636a03adba623c15fb1443db7f7c45e4ce564f5a42603d047f8f7ca8a3
php-snmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
ecb2ac8b9d3f7f5bf45c994e92ce77c78b9d7149ca6ae158a0b07ee4e3947276
php-soap-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
1ea8b82e08fba7c2de7f6d2fe2f1f8cf57585f9483ef0cfb861faf5e981cc49c
php-xml-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
403096f67c8103d7acd686e92a71fb695823898fb8b8247bb3cce6f582bde464
php-xmlrpc-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
4271876a92a4c98e11dfc9adc5e2b048203dc2c96cf7b93e3cbc0df911c6fc81
RLBA-2022:7629
nispor bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nispor.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nispor-1.2.7-1.el8.x86_64.rpm
c5638d282ec04dae1f4cd901b359ddde09409be3a6f8b78e5f3d82533029f8c5
nispor-devel-1.2.7-1.el8.x86_64.rpm
af2591a8d7dac21598930b8ed06fb769b832d4333c6cc4c16a2b7995ee5098bb
python3-nispor-1.2.7-1.el8.noarch.rpm
ca5ab3804782f7ebe26676f7021c55c430a5fdea6421f1a69e7d91848645fecd
RLBA-2022:7630
crash-ptdump-command bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crash-ptdump-command.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
crash-ptdump-command-1.0.7-2.el8.x86_64.rpm
041760d28c7f97acafc1b90f5d9f12a19c001a3fc90f7d7eb8778daf6d7e34fe
RLBA-2022:7631
ghostscript bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ghostscript.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ghostscript-9.27-4.el8.x86_64.rpm
c3828261c8b05bbaea42f43f46f9e8ab5b1bf542227e498d7ebd8b23126f0b73
ghostscript-x11-9.27-4.el8.x86_64.rpm
f366356687683723112cedcdc9a3e7cd047fa03e5c0dbc4dfc357f663ebb3511
libgs-9.27-4.el8.x86_64.rpm
a8b1846f370ddab492cfd21485d9a6b13ac3d277417bf7ede7d585ebbfef5f99
RLBA-2022:7632
thermald bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for thermald.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
thermald-2.5-3.el8.x86_64.rpm
2105e8ce92fcef71236a602ac7be02308c6b102ed635b07fa07c8e5316bdec5e
RLSA-2022:7633
Moderate: dnsmasq security and bug fix update
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
* dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dnsmasq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
* dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dnsmasq-2.79-24.el8.x86_64.rpm
8ef40fd4da1fb82b7c274ecf4b1f66c5aa0459e2668d0c8bc4d2bce70fedbec2
dnsmasq-utils-2.79-24.el8.x86_64.rpm
9219bb674aab79fd7c6c460392f97be226e6a5004eb17d20f3b6fc9f705d4ffc
RLBA-2022:7634
usbredir bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for usbredir.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
usbredir-0.12.0-2.el8.x86_64.rpm
b62803bfb0ff52df6796bba1f5ed2502a6811a7d1a41a218e1ba907eacc97f9a
usbredir-devel-0.12.0-2.el8.x86_64.rpm
f00e64939bed144aec7c61fc9a4a5d723941b806d24e641b350128667e2e88ff
RLBA-2022:7636
edk2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for edk2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
edk2-ovmf-20220126gitbb1bba3d77-3.el8.noarch.rpm
aa7733301627b7eb43236d937dc51a73ef945a7aae9ecd4d813aa519df62f550
RLEA-2022:7637
maven:3.8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
apache-commons-cli-1.5.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpm
2504808e7bb6c06c2706696895ac60a31a83764d7df665046664c16f6594c4d8
apache-commons-codec-1.15-7.module+el8.7.0+1082+b3a88d23.noarch.rpm
9bfad29fd8e93554d4ca33a6711f7b793bbdadafb0a4db81eb9ba002abd94869
apache-commons-io-2.11.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpm
4f7526242a56142e1fd231d9e7686f5a155a2070fa79fb52b1e83bad9639e8e9
apache-commons-lang3-3.12.0-7.module+el8.7.0+1082+b3a88d23.noarch.rpm
27037e8532d62c2e3b6e0a435bd903bfb1540f73c0ce6650c9bb8bde10330998
atinject-1.0.5-4.module+el8.7.0+1082+b3a88d23.noarch.rpm
a050941f674330536ec0ed3895488df293d11bc4d71803ecaa6647d7ab61f15f
cdi-api-2.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpm
d533b87cfce9ea04df2d36dfb14bd619952dcb306718824b59bb806f9d50e971
google-guice-4.2.3-9.module+el8.7.0+1082+b3a88d23.noarch.rpm
27d37752561262188b2a5618f171aa0d97e07b43f618e6f69ef2d73016394f39
guava-31.0.1-4.module+el8.7.0+1082+b3a88d23.noarch.rpm
a932defaae72ba27bdf2e8022f699a92f1a2a72e8de4e6ce3aa61cdb220d4aaf
httpcomponents-client-4.5.13-5.module+el8.7.0+1082+b3a88d23.noarch.rpm
53ad18936cb104b81292c49fbba185703fad1a4585ceda3f757b180265504b55
httpcomponents-core-4.4.13-7.module+el8.7.0+1082+b3a88d23.noarch.rpm
8c526281a2d18ae7f9b7a76f2fb1a04789781cd7ca0b2aec60a9997d66a2484a
jakarta-annotations-1.3.5-14.module+el8.7.0+1082+b3a88d23.noarch.rpm
5e89bbbc4ee2348801c810af9e34c707b61764a73adfbd0039db7355de5d3f8f
jansi-2.4.0-6.module+el8.7.0+1082+b3a88d23.x86_64.rpm
a23782fdbb258ed7ae58fc86b4859d70c66fbffa501f9258efb1c4403a2ba1bd
jcl-over-slf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm
b125935b6843082bd8c445e1950319e9b5ec76d1b05760b3a57f762706a03bed
jsr-305-3.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpm
4e3e833e9dbda4451c6f7d1e41ba92acde5bbb4a233ae5f617f08ff7d7c0b16e
maven-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm
a532cad614f39e89e5013a25e2513123ec070fc5b956102bbd3dc00eace52eba
maven-lib-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm
0f74b89b815f56b1e89d03ac1b9b0f256c77723efe7aac16209b689a8e658bca
maven-openjdk11-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm
61123d12dc39ba56868b094db24c5e7bae3bd49c83283440afe541e8eddb874a
maven-openjdk17-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm
b570e04dd05bb6febb0291828c48c3399a213bf5c7c6ca3c8cf1469e2d0c6ff6
maven-openjdk8-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm
01c706be33a63c3dfe9f3aca9163774d208cad8a5891bde4572a71ea372b8c74
maven-resolver-1.7.3-5.module+el8.7.0+1082+b3a88d23.noarch.rpm
60d9110c2e34df93e9f73495b500734492877a00caf03b83c19a0f7886d26bea
maven-shared-utils-3.3.4-5.module+el8.7.0+1082+b3a88d23.noarch.rpm
bf70be5e5cf79db68303554ff30f0fe9b59ea243814a15661dec4af551553ad2
maven-wagon-3.5.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm
5efa702d5d70f6a08b69d3c41c91785b35263aeb15c8bcb20a4bf26e854ff123
plexus-cipher-2.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpm
b780465af6320824793218270e36d0972fff8c01f426753cb3a02c602b9d4b7e
plexus-classworlds-2.6.0-12.module+el8.7.0+1082+b3a88d23.noarch.rpm
e09ca193b70a3ce3e18d15682d4314b8759c56b4b64500ee7e0ff1d77a172135
plexus-containers-component-annotations-2.1.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm
345a55610fc3c8ecb26246b09e9ebf6043862cdd3f4223ff42183462a374dbfc
plexus-interpolation-1.26-12.module+el8.7.0+1082+b3a88d23.noarch.rpm
9e6de49efe80cde3ed4dc36d5819b15a77f429b6f0ca90cb0594e66d4eb1710e
plexus-sec-dispatcher-2.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpm
4f4997c1d037cfb4180bdfc0bb54db2517a6a434a6839d0f54935d1434f46fb3
plexus-utils-3.3.0-10.module+el8.7.0+1082+b3a88d23.noarch.rpm
1c4dfffc30a7c45890df152ea03f52d0de4f878182a0573a2075bf3d65eb0419
sisu-0.3.5-2.module+el8.7.0+1082+b3a88d23.noarch.rpm
baf84b90986770d39acecf7b3490d1e2f60f6ec41adaef70655b270258d2fabb
slf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm
67122bee7bfba76c146b1e031e6b2111173029bc7c5774e325596f3a9a8354b7
RLEA-2022:7638
mercurial:6.2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mercurial.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mercurial
mercurial-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm
52bc1386bcfc64bf99b1f1c1346120b24532e839a29bee2c91a6958a460520ac
mercurial-chg-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm
18c97d8f3e8b7e3dcea459e047cedbf5ce7f7d47ca527ff5daa68cbb2a8c9456
mercurial-hgk-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm
9c945841d9eb5ad2cd4ad36a358f426569bfb95040683ed02f9640258325c276
RLSA-2022:7639
Moderate: openblas security update
OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version.
Security Fix(es):
* lapack: Out-of-bounds read in *larrv (CVE-2021-4048)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openblas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version.
Security Fix(es):
* lapack: Out-of-bounds read in *larrv (CVE-2021-4048)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openblas-0.3.15-4.el8.x86_64.rpm
a6629a2491ae9fac85e928c9d1397a912a9eaa5a1ced7dbb4a83560ed3be1966
openblas-threads-0.3.15-4.el8.x86_64.rpm
5afed1f25fc67c5aad9935e6655ba61da0d26a974c1b387c040fd8fecdef3e54
RLSA-2022:7640
Moderate: mutt security update
Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP.
Security Fix(es):
* mutt: buffer overflow in uudecoder function (CVE-2022-1328)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mutt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP.
Security Fix(es):
* mutt: buffer overflow in uudecoder function (CVE-2022-1328)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mutt-2.0.7-2.el8.x86_64.rpm
15b13b12c60465cd9da41f83afc017da0d515a17b91dfa14956e532e72d6603d
RLBA-2022:7641
fstrm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fstrm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fstrm-0.6.1-3.el8.x86_64.rpm
009be413cbe00ebcf5cc349e0db8d6913273bb26dec2c187860e69056b69bb9f
fstrm-devel-0.6.1-3.el8.x86_64.rpm
e5d3ee7dd9fc8a676544e1c9292a6cfe104da22e04bb79262578f31e8d939620
RLBA-2022:7642
setroubleshoot bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setroubleshoot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
setroubleshoot-3.3.26-5.el8.x86_64.rpm
edbda7d3a6ed4c6cc0cb6448ee20b063fa2da9a9732390cf0817a275b4381c84
setroubleshoot-server-3.3.26-5.el8.x86_64.rpm
98a9ec6cb83707587e8cca917a9c439c81767a814560807fc9caf01d6e24677b
RLBA-2022:7644
clevis bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for clevis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
clevis-15-11.el8.x86_64.rpm
7b1661586fc311cdbc1e9f476968c2dde04253a852c5f527d9d2435114d1eb11
clevis-dracut-15-11.el8.x86_64.rpm
0fb789c732ce81f56014c82ff1a145d917fdff04ff72eedb6cf78d365318a96a
clevis-luks-15-11.el8.x86_64.rpm
afda820f581b0fdfffd83e4c84c834ec3413291db1061d07b3d0f197bea52eda
clevis-systemd-15-11.el8.x86_64.rpm
ac473976855ebcdb18d17dd0fd52173ba7991cba4e2dcf2878ff04deed4c6a76
clevis-udisks2-15-11.el8.x86_64.rpm
85e206ef9a26491b946ac8aac5497e1c37f2e370ce1311ea4b609f1219a4c519
RLSA-2022:7643
Important: bind9.16 security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: DoS from specifically crafted TCP packets (CVE-2022-0396)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind9.16.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: DoS from specifically crafted TCP packets (CVE-2022-0396)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bind9.16-9.16.23-0.9.el8.1.x86_64.rpm
2a2f8c93e2cf8dc978845e2f946a10b46673a7b88cca2f46b4e3103374d51090
bind9.16-chroot-9.16.23-0.9.el8.1.x86_64.rpm
c85fc4eefeb37b2918f95cd2902973374f64d5d83f02a3771d1fbc574c7f501e
bind9.16-libs-9.16.23-0.9.el8.1.x86_64.rpm
21941367dbb4bbedc8dbdafe8df4e5c1beb98309d3d5062821ea31e2a7dacd4b
bind9.16-license-9.16.23-0.9.el8.1.noarch.rpm
02cf60bbbf5a798b91a297d13987547563cd82aaa7f011b8edabc8efd7ac0988
bind9.16-utils-9.16.23-0.9.el8.1.x86_64.rpm
c1c3d62196778f140ba4176cdbf89951f3ec4747e2606fb43f42cd92f6f9f33a
RLSA-2022:7645
Low: openjpeg2 security update
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for openjpeg2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openjpeg2-2.4.0-5.el8.x86_64.rpm
3f417bd20c742a615ead7114343b3dec930d6a74593f8120bb0cc89d8a45f5a3
openjpeg2-devel-docs-2.4.0-5.el8.noarch.rpm
420b2ee00501e932ee6e6a43f30918ec8359f6936a71181afcbd500f4cf1d307
openjpeg2-tools-2.4.0-5.el8.x86_64.rpm
1eeca900463ae48d084ef5a6579c884c5b641a2357ff78afb7ea6bf979206ba1
RLBA-2022:7646
libblockdev bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libblockdev.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libblockdev-2.24-11.el8.x86_64.rpm
5da174eafaf69af62408a4815a01f3dc246ef681fcc8e7014b0fce0403a674cd
libblockdev-crypto-2.24-11.el8.x86_64.rpm
2d4d820490c96a4d9c5c75b7cb3ae1520b579e609356fa336cd7fe4800f9f23d
libblockdev-dm-2.24-11.el8.x86_64.rpm
ddb1077966da4cd352a7e5054ecbd6393c5294c45a10185f794f19e1f5213924
libblockdev-fs-2.24-11.el8.x86_64.rpm
1ad19562185e8206dc5175b37b20453977bbeeaf4e69c90f0c2701f6a3297be8
libblockdev-kbd-2.24-11.el8.x86_64.rpm
cb09b43aa55feab2e48ba005abfedfb8e8bb0170aaa731daeeecea050036b1d6
libblockdev-loop-2.24-11.el8.x86_64.rpm
f99218c09d4e71cb3da31faf10c85a3e4e324fa30a2a499104bb554ee7ae9394
libblockdev-lvm-2.24-11.el8.x86_64.rpm
5987c9cd3365981b4e3f0c03f572adbedc4e6e2a27909cbc164c3f2f1b518235
libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm
95c137f79bd41a9f791c48be71008650e3aa7354ab5ac0d6cd54b5bc961cf294
libblockdev-mdraid-2.24-11.el8.x86_64.rpm
40841584b5e8ba50c0316fa6a41a6bb20e470fe8486cc8868bfd1fbf47b55186
libblockdev-mpath-2.24-11.el8.x86_64.rpm
6c11510d841ff0405a0630e37d1ed79d9f741fe85a18a6dc366a4daf7c6165e7
libblockdev-nvdimm-2.24-11.el8.x86_64.rpm
8f5f06d54c67ec053c3268a228e95c91c46741a9976adb23df6f7627ea27989b
libblockdev-part-2.24-11.el8.x86_64.rpm
979ebb94b393928e80524a055ced8c32914e3bb69fdbeb7548d61e86048b49d6
libblockdev-plugins-all-2.24-11.el8.x86_64.rpm
fd8cdb42a8c71a3313807d62340daaaa650588184e86a039197d94a44b31d7e8
libblockdev-swap-2.24-11.el8.x86_64.rpm
1a319f5063476b8af2207e8d0d8b8564ad66412886b4cf3c337e069c443b5c23
libblockdev-utils-2.24-11.el8.x86_64.rpm
c954d6b891f0140d997e1f3106e9cc023ee920288c017910fed598501e321ee1
libblockdev-vdo-2.24-11.el8.x86_64.rpm
3397635712651d00661b4f91563eb6aaaec753824b97fb4e8de64e6a17d9de49
python3-blockdev-2.24-11.el8.x86_64.rpm
00fcf1707621b8ff4a0de879d5e401b5b738a05783621ec8e85c4bfef705300f
RLSA-2022:7647
Moderate: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
httpd-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
bf0f17b753398917bd78b469b9522c1c69623c39d74e2e072785b506b5fc1394
httpd-devel-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
7e2a0eb54d1df679fb968511c68566e4577d12e5dedc8272b426a7613415bd89
httpd-filesystem-2.4.37-51.module+el8.7.0+1059+126e9251.noarch.rpm
969b64b86a34667e267ddad1ccfeedb854aee00abd1df97cff27c360b9cf96b7
httpd-manual-2.4.37-51.module+el8.7.0+1059+126e9251.noarch.rpm
96cac9b5c3a2d5e9b9d363dea0eafa48628bc52d7f5abf8fc9102c2c7baf35be
httpd-tools-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
61d0353ca9006ce117284db172b80a31bd2ef425e0337cb67bfdf1e611da8a7a
mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5
mod_ldap-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
835cfd3c56a0b13903a0ad8f0e3184664a2ba5d10eb801785b659ab2bb813b48
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
mod_proxy_html-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
7fb626480ab451a56be9818d127bf95ff3a867d94c0e6bce114562b063d08a7e
mod_session-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
54e3780fd2bc9471198a3f222cf7ff9d36e72321ae82092959bf1624c9221b10
mod_ssl-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
7b2e2dba432aa6e941a52067aac0d10e918366742756a7331fe139258a36f5ac
RLSA-2022:7648
Moderate: grafana-pcp security update
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grafana-pcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
grafana-pcp-3.2.0-2.el8.x86_64.rpm
f51b7ad4d487e5d4704112536ba57dfcf6ad0c993bd63117298c5045be1a4948
RLBA-2022:7649
hyperv-daemons bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hyperv-daemons.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
hyperv-daemons-0-0.33.20180415git.el8.x86_64.rpm
dd8a73fb9d5128b96c6aa9a9df743b3e0c66d45677dcb76cd14e8bd669f46810
hyperv-daemons-license-0-0.33.20180415git.el8.noarch.rpm
bfcda3489995f231a5c8b1a414acb58b0c74710fad37bf9725e8ba18052324d6
hypervfcopyd-0-0.33.20180415git.el8.x86_64.rpm
b83c98927e6bf767536cb0255761884c0d9c88ee0614d9652a2b3665e7263f89
hypervkvpd-0-0.33.20180415git.el8.x86_64.rpm
6ebbb520fadb104c5082bee707a22e062a3a579f6d145ee2ce81613bba565c59
hyperv-tools-0-0.33.20180415git.el8.noarch.rpm
19683e1b36236c96fa80542addde387c50505b96bea2c08cac8b3d3891603b0f
hypervvssd-0-0.33.20180415git.el8.x86_64.rpm
69cb064a0ee993002e232507b1ff8d181f3089001b8458aa7186ed717a5ce073
RLBA-2022:7650
xinetd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xinetd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xinetd-2.3.15-25.el8.x86_64.rpm
7caf679d6b941ca0c4b3fc40bb80a54c50dc631f1c6364e886eaacb25ca24769
RLBA-2022:7651
cyrus-imapd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cyrus-imapd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cyrus-imapd-3.0.7-24.el8.x86_64.rpm
037557455d8da217bdfe6df1621de585d9427f70beae4256a6ed99ccafe03016
cyrus-imapd-utils-3.0.7-24.el8.x86_64.rpm
bd6c2b4f212689e7858b86acb0e3bd1d1ad7f779b85ad3c8b4a3e2c02a249940
cyrus-imapd-vzic-3.0.7-24.el8.x86_64.rpm
c38b07ae2373e61aa5091f1649071c17374d41acb213b325fb7eb6378529c7fd
RLBA-2022:7652
oddjob bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for oddjob.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
oddjob-0.34.7-2.el8.x86_64.rpm
a481f325a915f2d704474ed8b4d1df97dd1c58fc168a511b2a1d937fb4039c15
oddjob-mkhomedir-0.34.7-2.el8.x86_64.rpm
91959c72f5382176996bd2a73d968ec84527d0ce3e79ad464d30296f0c630825
RLBA-2022:7654
rear bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rear.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rear-2.6-7.el8.x86_64.rpm
c2a6c74dc0e8d4954a23b5aff5f33444a5b2127e65f41b0bbd3e317cf66c12f2
RLBA-2022:7653
cups-filters bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups-filters.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cups-filters-1.20.0-28.el8.x86_64.rpm
f13e08457a6dd13449b5ac3d38c2d6536504d876287388fe77d00fa760d5cf3b
cups-filters-libs-1.20.0-28.el8.x86_64.rpm
891cec03132923ded16005a191ba9c86b595e647f3eba52e58aaaaf00f4d9707
RLBA-2022:7655
xdp-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xdp-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxdp-1.2.6-1.el8.x86_64.rpm
ca9a4c47c93fa78dda88d3e0877dccd474673e4b27eb0882dc7c728dc929613b
xdp-tools-1.2.6-1.el8.x86_64.rpm
3d85888491af2f38a37afd748d9e0b8c808561aae77b35e3b66433c596361e3c
RLBA-2022:7656
ansible-collection-redhat-Rocky Linux_mgmt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ansible-collection-redhat-rhel_mgmt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ansible-collection-redhat-rhel_mgmt-1.1.0-2.el8.noarch.rpm
4d3548a092ce08108d8e84f1f8b244914491b05e0bdb386afbac45244b4e93c4
RLBA-2022:7657
openslp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openslp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openslp-2.0.0-20.el8.x86_64.rpm
bee056de851dff0654790c1a354a461c5aa5f45e6cad2690ac62d6271431e94a
RLBA-2022:7659
gtk3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gtk3-3.22.30-11.el8.x86_64.rpm
29a2f90df2465bdb2e4798d90e6d43933bb34cf742747f97efd77db0832c06c6
gtk3-devel-3.22.30-11.el8.x86_64.rpm
197af38646506159cb952caccb7bcbd054ff35f7d5283ae67d730c968af02f59
gtk3-immodule-xim-3.22.30-11.el8.x86_64.rpm
edee3fe26bff0a288b5f1c754933e759991b2e77c006e02c8ee540f695a66612
gtk-update-icon-cache-3.22.30-11.el8.x86_64.rpm
c574da0954ff6ba85c0eabe58a7acbded426be845d408c57e57cb443fe560933
RLBA-2022:7658
freerdp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freerdp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
freerdp-2.2.0-8.el8.x86_64.rpm
ee604c4fd7fef6716c1d342119560a2a7b2cde11d3fb089957633db2515e6dbb
freerdp-libs-2.2.0-8.el8.x86_64.rpm
9f1ea5245ed7d523776a64a596d8bf686ece476548c7197578992d258ad228e1
libwinpr-2.2.0-8.el8.x86_64.rpm
fcd8eed3c1863160827b0cd8a4ec6b38656765537e30213bd2c2855e14f0c716
libwinpr-devel-2.2.0-8.el8.x86_64.rpm
98e2869640d82f85e40a5e5c7712e5a5fdc5ea337a44cc277f7ec3cee64dbd82
RLBA-2022:7660
coreos-installer bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for coreos-installer.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
coreos-installer-0.15.0-2.el8.x86_64.rpm
b965acad95abc501de61f10b0212329849bd0e097160287ad4d3611a37769b53
coreos-installer-bootinfra-0.15.0-2.el8.x86_64.rpm
443ab391cac10e8d56d6f1e09005da0386fbe89d4ef371cff6a50a6a4bf450f7
coreos-installer-dracut-0.15.0-2.el8.x86_64.rpm
f330db1a24ea0e10aaeeb76f70e62c3b93159c5ee68b1d5375ce89235f9f24c0
RLBA-2022:7661
vulkan bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spirv-tools-2022.2-2.el8.x86_64.rpm
4a1a23d9d2ac7da4c9bf89d16a203d55c6f6b539c82436f979eedf2e4eb03620
spirv-tools-libs-2022.2-2.el8.x86_64.rpm
4d25bc22840ed42e1e7e2e5e2cafdc808561de408112e85daa62dda183d78c53
vulkan-headers-1.3.224.0-1.el8.noarch.rpm
e19ab508f27e871a450a0da79c7a91ec51619c85a590b8f1c6eb10efdd9928c3
vulkan-loader-1.3.224.0-2.el8.x86_64.rpm
04f8daa017250796784a780b73af1def53d4e83cca26aaf802595ddbe2182910
vulkan-loader-devel-1.3.224.0-2.el8.x86_64.rpm
46b79f8228dc0a0f36bd9c52ba433c4fd204aa274b90f6a98bc58306507bb029
vulkan-tools-1.3.224.0-1.el8.x86_64.rpm
52f91b57a908e181714bba6fbb51eeddd52ae1e3e960eacb23d3ad80e797163f
vulkan-validation-layers-1.3.224.0-1.el8.x86_64.rpm
d9cfa39a9d367a4058bb95303cce3ea2e6473ff387af278c30c4226c0ea9c153
RLBA-2022:7662
opencv bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
opencv-contrib-3.4.6-8.el8.x86_64.rpm
57166933fcf4f60098b559813ff422da3f55b01077a0a6457200ea4cf49e4293
opencv-core-3.4.6-8.el8.x86_64.rpm
c552fed8cd103e91ab4f5901dbf6c9c0464c90a9b712f376731067c97b6f4fd1
RLBA-2022:7663
wireshark bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wireshark.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
wireshark-2.6.2-15.el8.x86_64.rpm
b011d4ee0d747b9d6329f622fa29b009cdf39cdd8454526aeb1a18a6b691c6e9
wireshark-cli-2.6.2-15.el8.x86_64.rpm
28750481e1ed6bcf20b13b29bd17e173bdf3be4c40fde886d3452306753df0a7
RLBA-2022:7665
ksh bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ksh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ksh-20120801-257.el8.x86_64.rpm
11dfa340af7b52321ce90b0425c10c3e90835f6b400cba4b70fa48e107529779
RLBA-2022:7666
qatengine bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qatengine.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qatengine-0.6.15-2.el8.x86_64.rpm
7e82a279e2d83cbd406ebbb2b32b1893fd63554c0c7f77e60f8c5314309c9e34
RLBA-2022:7667
qatzip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qatzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qatzip-1.0.9-1.el8.x86_64.rpm
d646b323481492a0ad52a4de12caaac8991d881b8ad4b882af159ec09c61cd9a
qatzip-libs-1.0.9-1.el8.x86_64.rpm
33c3fc3aff60b4a339db9471d2e33efe9b4748081e9d0416223fd2dcd28d8cf3
RLBA-2022:7668
qatlib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qatlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qatlib-22.07.0-1.el8.x86_64.rpm
5107cb43c0648ca8f388dc30335e064d74c738a2f21f4ef95baade1d59244b80
RLEA-2022:7669
ipxe bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipxe.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ipxe-bootimgs-aarch64-20181214-11.git133f4c47.el8.noarch.rpm
0118e505403e318795ce056e565bd8acacf6a05b3b52082eebe1b452b4ebb7d2
ipxe-bootimgs-x86-20181214-11.git133f4c47.el8.noarch.rpm
7a4f1b8be52f0b60fb7fc53bf312f2862ebdcb43b7442b8338fd5d5254a96706
ipxe-roms-20181214-11.git133f4c47.el8.noarch.rpm
b0552e3664dcce3ec599db80dcd3335add473fcff0c2a3f2d0e172bd75595acf
ipxe-roms-qemu-20181214-11.git133f4c47.el8.noarch.rpm
402d256792a02af43415b6cfc9bd1db8696705abe9cc28788f3242e1cb9e4ac9
RLBA-2022:7670
mod_wsgi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_wsgi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-mod_wsgi-4.6.4-5.el8.x86_64.rpm
ab58858a5e243f8fff7e96f7d9c5c995716545147cd4f152cfa660fad8b95d67
RLBA-2022:7672
spice-vdagent-win bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-vdagent-win.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-vdagent-win-x64-0.10.0-6.el8.noarch.rpm
e53a14bfa86f429777d1d730fe86662008a8aeee8e73fbffd23f2fc3b16e6ad6
spice-vdagent-win-x86-0.10.0-6.el8.noarch.rpm
b1814db118569b052f8164d9c00c49172ff49a87220300bdcbe768474daae489
RLBA-2022:7671
python-simpleline bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-simpleline.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-simpleline-1.1.1-3.el8.noarch.rpm
dba9336ea7e7bf54b9f0f09bec717744c20f9506638c9786e60274c1cc45b037
RLBA-2022:7673
wsmancli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wsmancli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
wsmancli-2.6.0-11.el8.x86_64.rpm
e5a175e6790a3a221f3c12f816a95fbb8d7f2b8655ab0a18269dd93ab3af505e
RLBA-2022:7674
openwsman bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openwsman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libwsman1-2.6.5-9.el8.x86_64.rpm
c91dc44a1f1b1e194acfc69be256e06b98b1fc9586790179470cdc3653ec7381
openwsman-client-2.6.5-9.el8.x86_64.rpm
3c8034aa23cff3e5b9bd6c0703da3fba9f1c519a8e44caa8946d4a0dd5c08d59
openwsman-python3-2.6.5-9.el8.x86_64.rpm
8ada5656aada9c3bc19e296c9c229b5b9a247b45684b41aa55c8c7452bff87b1
openwsman-server-2.6.5-9.el8.x86_64.rpm
c478858538547c9457032f0e016425f9a3c2015b69f70d20fc531a147f155d05
RLBA-2022:7675
spice-client-win bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-client-win.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-client-win-x64-8.7-1.el8.noarch.rpm
c98184f6376baea38a779a93d182d916df079e69871e6fcfc7fc7def6d9dc27d
spice-client-win-x86-8.7-1.el8.noarch.rpm
1c0d0e51603717d6074c596f9ea2cd6a94709153ae7d5abbfd08563e9e14d870
RLBA-2022:7676
prometheus-jmx-exporter bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for prometheus-jmx-exporter.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpm
85d52b6eb723113b6ba471b2ca26afae713997a89616d57739e7498226fdac71
prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpm
764abbe69bd693ff8794e3c9fa5fd5b609be9ba1e896ba02ed4476d2efb61dcc
prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpm
b252c5787fa070f1cad64f473a492dbbc981882ac49570b9a1b5b5bb9596a7a8
prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpm
e747522630dfee8d219dbd8794386cd774564f4cdd5b688d3e4ee255c217d91f
RLSA-2022:7704
Moderate: webkit2gtk3 security and bug fix update
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for webkit2gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el8_6.x86_64.rpm
6f9d418c7ea1f1201d9fce9c29a452dd5ff1e50186607bac1d8d5c36e9d0b081
webkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm
f264c4563e2b6ed207ecba5bad82bc211e855fcabe1756b92db6001872f5118c
webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm
857df66bf8107734cf442e7e59feab3e0d62c626e8738c46f676b57c99fa221a
webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpm
022a74acac9929975cd817c2e8820af36362c80ba18c35525aa3143c238e2845
RLBA-2022:7820
virt:rhel and virt-devel:rhel bug fix and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for
Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages
which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix:
* irtiofsd debug log's timestamp is NULL (BZ#2132391)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for
Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages
which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix:
* irtiofsd debug log's timestamp is NULL (BZ#2132391)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f
libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45
libguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
4456694874c9d7346f28a9f1afa1a3456df30b16304fe183ff42190cd9e708c6
libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f
libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd
libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f
libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645
libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
3c9d51c249abda39f7eb4c3a9e7aec28fd90a7bbebcade157e9bae228e0c99fc
libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0
libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b
libguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
0c1afa84a2ce7357193c0eae89c65ce30a9e143e7ead6c774c16371f58da4ea4
libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
e6cafc935323470c7f0fa1156693ff1fb9816931387cebcfc33057f1f535fee8
libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
f45396ca362fd4fc35b9f14babd32cfaea1321a6417308a1292f44d1224898f2
libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea
libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100
libguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
5d5c05f7f8470a00208277eb34687306aab70af2ce1bd57ac78528e631505f59
libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm
b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52
libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0
libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
ea41423cb9ccd317d1a5ebbcb070b9e1a74f99ecce9c3e5051267bb64c188eee
libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
7ed71d62ecf427822af3a0b9e20fc93f9e05bf2004fb7be9511d6ab5e9b3de7d
libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
0ce8f2e8e6dca56e8a76186d1dfa73130956079bfd6f2818c1ee50944fc0b416
libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
d0cea4e0b6167849fb7edcb91531b3716e01887bfe9faea099bd0b8c7fc51858
libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
0c0d39b5bfd236922c883c4367c39d9c711ccdace73f36ece10088d466b889de
libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
092bc77167d3a1d392f4f214a08a4eaec63d5b25c12f7f3f0850b48c2de205e5
libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
c484e35d7ad61b87ad9662109aecb110158136240c797bbc126dae3078f4414a
libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
830a30966b383cdc2ed0cf28870c8af581d8a2b1dff4d0ed3fc1b4e6ec9941b4
libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
1f37a92b9f136ee4e4fc8f9bed72ca1cf858bbde132596cd5fcb789018e40a8f
libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
97350f3e49235032387990bfadb529874b4cc8fdaa39edc6f13d69e36253b4ad
libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6df6e0e49b97c69ff5b065e574b4c9eaa08c0ae4de46832fd1dc5c8b19abe6c0
libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
e8d54db9bd04dc675d8b44bab42de599af7c56fa68d5715135c1742056a0c6b3
libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
c87e4f8cb42bcbe09ed1c043fe3d57ffd7bc2e7f5adc56814651901db5f79a40
libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
ef4b347f15c6ab94fb348337c7856ba6acad1fbd7d425486741be6a5640a73e3
libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6c4b97bcb6b615b8c2bf886459f22fe782c05d2679c56fc1808e044feb60658b
libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
087db2ba93134a2c732b4fa5fa37b3c9fc2369447398a86a1a6c10de5f467609
libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
a791d8f7e3badb26d0385db4d3c03fbc0c8c800c6f5e4b984c3fcb093ba36d15
libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
57a656c3775cd30fb0e46818c56616b2083bb5a6fc1268ef52cb2ba0bf11968d
libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
b382f68a7b9146a952801ceeadf99f7ffacd5b3cdff873278f4c5e87dcf12169
libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6233e0708101c4fab6f867a5bd7081aea83c1b813f0b73b27d2dd066424feab3
libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
cfbadecd26551afc63bb73ffff83ed1a575276d71fae78783579b7200030e03e
libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6118db5d391e5ea27aeb8131ed3f596d918706291f0cb7a0ad2df37aa7d8eb26
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
e2a47a6cd93b6be3cb6cfe5b2db5852bd9934cf0e959f37ee82ac6bbfadffe93
libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
4330e66821e29bc2d1412a0480aec1bcdc1f942a81da56d43653bfb9172d9636
libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
fd055f2146f2f2210fe413dcd3500896cfaaa4683cdd3ca9cb6d130f0eb56e51
libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
5853e8e20b37b510049a488594a5e92bfd022747013a2854fcbdcc21bae08757
libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
decc7c7175a8a8456aa9fcb8aa312d9a0aac9657b8cc8a427af79f203bcaf0cb
libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
108e8b905f821306c1a18e368b647482898b6726e56268f57f967ba8ca263ee6
lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm
eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776
qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
f53d318c4b0613a22aebf4e177ad1f9105fce5fd18dc993e0229980aafc36b93
qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
c6429b4d1d9f6ac6162a7b0a6686ed3f2e1f856b1819d953dd73fc7207946275
qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
0adb29176532c04f3da5718b171484e4116fbdeb09cda55aecca84efeb2a8e98
qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
5fcca46736dc69adb0f7ff4f057607527a15031d5a13d87446cd377dc6eefe04
qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
9625fe3e4a5fffecfa1eb5b6451dd7c5a666bd468c0032198ba9dcefd2fb62cd
qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
d587a9dbc9af15a3c4408189098dd620294b95f6673b0614fead295697e1b4d3
qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
13cb392b10b20cfae2cdc32435b6177b26180bbe18ad6108cc9af993090a6c4f
qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
5ac7b977816ce165fed7737e3aba3bab5a7150730d979f1d12fb4d1a7ba62832
qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
f4cd7b44410c2c3a1c15413d45916901c818cdd79e8bff1535c416a4a74b3d33
qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
9f1769ac46cca5dd72edd4f2d7cc088d5c10dea45ec6802835aee4b2cdb0e79e
qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
e38d06d10d96bf278ce730343fd70de5c90521a564c7b739839c1e24f78a0dd2
qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
161c40f475f3129578d666dc0e8019573443ef59be07e7559618b7ccf68fae31
qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
76329de8d248dfe414a30907f835662cc25fa1bb03823724d7a87c3f32aad717
qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
631ac3650401c6f558dff57a24626a58aa7ad05e7dc8549e8bde07f483087b02
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada
supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70
supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b
swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838
swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf
swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe
swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9
swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c
virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4
RLSA-2022:7821
Important: nodejs:18 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750)
Security Fix(es):
* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750)
Security Fix(es):
* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm
4a190f09bf708f5a45330129aa5663853fb49b007921d4bebcd2198b56ed9f65
nodejs-devel-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm
e997573653d97bb0a0566ab66f16846f7a9e5416cbbaa9c836eee72b487842c9
nodejs-docs-18.9.1-1.module+el8.7.0+1072+5b168780.noarch.rpm
eb458813c72a7d63c698cc201f1c65840d6629edfb5a88822754d698b61fdb64
nodejs-full-i18n-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm
7b243705740ff8777e283fba19ea10341b014068ebf1ec1adc6ab6ef63fe5f7a
nodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm
ec2f3e9547f189b1ac35d0ab8b0f84f81b80eb6639f17bf9a84dafea7dfe4e18
nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm
ffece635c6d640eed8fb89b76b64e4b03874e8ae7d4a1e6fba7438ba7f1c231a
nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm
0505c56e61229be002ba0b15b188bd7a31d7c3187ebadfe7e6348cf9c3f463a2
npm-8.19.1-1.18.9.1.1.module+el8.7.0+1072+5b168780.x86_64.rpm
0f5f81cecfd33ad56c588cdd18631041e491dc3098b1458aa1a064b04851bc6d
RLSA-2022:7822
Low: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: possible information disclosure and modification (CVE-2022-2989)
* buildah: possible information disclosure and modification (CVE-2022-2990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644)
* (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645)
* podman kill may deadlock (BZ#2125647)
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648)
* containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686)
* ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767)
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234)
* containers config.json gets empty after sudden power loss (BZ#2130236)
* PANIC podman API service endpoint handler panic (BZ#2132412)
* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390)
* Skopeo push image to redhat quay with sigstore was failed (BZ#2136406)
* Podman push image to redhat quay with sigstore was failed (BZ#2136433)
* Buildah push image to redhat quay with sigstore was failed (BZ#2136438)
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295)
Enhancement(s):
* [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911)
* [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360)
* Podman volume plugin timeout should be configurable (BZ#2132992)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: possible information disclosure and modification (CVE-2022-2989)
* buildah: possible information disclosure and modification (CVE-2022-2990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644)
* (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645)
* podman kill may deadlock (BZ#2125647)
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648)
* containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686)
* ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767)
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234)
* containers config.json gets empty after sudden power loss (BZ#2130236)
* PANIC podman API service endpoint handler panic (BZ#2132412)
* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390)
* Skopeo push image to redhat quay with sigstore was failed (BZ#2136406)
* Podman push image to redhat quay with sigstore was failed (BZ#2136433)
* Buildah push image to redhat quay with sigstore was failed (BZ#2136438)
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295)
Enhancement(s):
* [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911)
* [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360)
* Podman volume plugin timeout should be configurable (BZ#2132992)
rocky-linux-8-x86-64-appstream-rpms__container-tools
aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d33e11f32b7ca8bb1ab9de7144786d8b949b688760adc1785e2fe70d5f39168a
buildah-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d1f697d951572b67c4d0ab80a30722a3eda303306f5904ef8cb1d6c3733632cd
buildah-tests-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1839a75a6f2fb5593d36c7e2d36012fa706711bf29077b42426eb8858ab34ac1
cockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm
2b6ec4da8b57643e010868c767fe370c537f59dae20ec5459864a53d026a8aed
conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
containers-common-1-43.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
201e2826e656e125b7a753e73fe57cf4c4189315ddc4a4e1fc329bb45f8387e6
container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
119f90778569a22466b4a90fa278b1af63d137005aaf3aa5945f28a5514bec92
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
podman-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
a58af6159401ae01e54b33eff11fc07b6b40a20c6d09e375c6276451942c409b
podman-catatonit-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
4e36ac569c72abc680821c471ad1a26236816c0c45769c2b627f0bb327c368ab
podman-docker-4.2.0-4.module+el8.7.0+1078+e72fcd4f.noarch.rpm
3ab74a5b0f60cca22c86fd8c1f9d0b1a93d7577fe73545eefd1716271c0bdd12
podman-gvproxy-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1e0d9f6077e42fcdcd44987496509b9f68d7cc1165c49d1c5f013b100a04309f
podman-plugins-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
5af440d5ee2dab182636926e7cf4b71c62847b6be75607dd95efb5b75dbd3ccf
podman-remote-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
6aeee569dc76847d740d8863907786a80e1918abcaf6fa880a7ab58740538025
podman-tests-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d1c73fb86bcca0c43027e3bf83fd7fdf5ca67a46cd96dafae46cda06ec918e82
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
python3-podman-4.2.1-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm
2b696d0f504dd20e219ec48da145b4324efcc4ee393ebd32de98cd14f7aba3d9
runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856
skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
b2dbacf676bb36b7d618c125bba63b03b16206500f903f8ce4b76e368f16dd26
skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
8d4dda0fee2dc95c05a961422237e3ab97a7f32f0371cd7dc91c447a09ce5b0e
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm
c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b
RLBA-2022:7091
java-1.8.0-openjdk bug fix and enhancement update
This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm
745a98184ac9a5515249b7cd168a5790d2b07407b3eca941cbb9bf9400d2f689
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm
10be3aa175d2b7be220ed364679366f5b90ce479d11d65443fabba8fb5e23aa9
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm
a64f5fe29ba875659ccd0a3d6af6f3a1f5e87b0c4e5e93cbabe16cf8ed68ae68
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm
6facf44a3ef195fb6c7f66ffce323acf6eccf4f331d5b9059e0c03865fdcd5ac
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm
01819f766f0cfdf6b035db3ead2f50c9539d65fb760d89728a34771c4b44a31a
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_7.noarch.rpm
f17b77d4203cf1a819eb288008fd2080959d7dbfd894ecef89d69f0e0d023e4e
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_7.noarch.rpm
762991fd798dc9d95f9e2257ebde37ffd259e56d3bffb2c9c1a89fd16d523079
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpm
f0b9eb21a54ba79a63a963b57f7a2372954a3c88686a340713fa88332ab3ce4a
RLBA-2022:7827
ansible-freeipa bug fix and enhancement update
The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management.
Bug Fix(es) and Enhancement(s):
* [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132974)
* ansible-freeipa Replica Install Setup DNS fails (BZ#2132988)
* ipaconfig does not support SID and netbios attributes. (BZ#2132994)
* [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135753)
* [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135754)
* [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135775)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ansible-freeipa.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management.
Bug Fix(es) and Enhancement(s):
* [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132974)
* ansible-freeipa Replica Install Setup DNS fails (BZ#2132988)
* ipaconfig does not support SID and netbios attributes. (BZ#2132994)
* [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135753)
* [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135754)
* [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135775)
rocky-linux-8-x86-64-appstream-rpms
ansible-freeipa-1.8.3-2.el8_7.noarch.rpm
edf7bea18aa5aa09f08e6254dbcd806bd8c5bf373ee5bbb8c5e4e1d38b566f1d
ansible-freeipa-tests-1.8.3-2.el8_7.noarch.rpm
e453a34f04150c6379ed44a447f7a03901619c170cc5e661936d6e3a39356c70
RLSA-2022:7830
Moderate: nodejs:14 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm
401ad24969db74e1989ecab2aafb6192bd816113db6eca267893d54ec506446f
nodejs-devel-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm
a258182e176403cf51af2c6dd125924212ab63c9059b2e2a4c40506b638db5ab
nodejs-docs-14.20.1-2.module+el8.7.0+1071+4bdda2a8.noarch.rpm
ae67e51aa0aa621dc10bbf046420486aaffcff02ec89b5aee959668cedbb14b0
nodejs-full-i18n-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm
f01702069e9268a2594987a91eb54adb343b4236983b1d300c8aa032a2c0bf19
nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm
55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
npm-6.14.17-1.14.20.1.2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm
e25f3c8f2935111f4012a42737e70b79bce180b49aaeff9c720e169dc08279cc
RLBA-2022:7833
pacemaker bug fix and enhancement update
The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures.
Bug fix(es) and Enhancement(s):
* Running crm_node from an OCF resource agent's metadata action will hang
until the timeout is reached because metadata actions block the controller
(BZ#2125588)
* Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589)
* Resource agents that call crm_mon in their monitor action, such as
ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown
(BZ#2133830)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pacemaker.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures.
Bug fix(es) and Enhancement(s):
* Running crm_node from an OCF resource agent's metadata action will hang
until the timeout is reached because metadata actions block the controller
(BZ#2125588)
* Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589)
* Resource agents that call crm_mon in their monitor action, such as
ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown
(BZ#2133830)
rocky-linux-8-x86-64-appstream-rpms
pacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpm
3140cfc42a7891db48ccd246e8e9cbbbf6bd63470ca182d69d41b638bf54d33c
pacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm
98c2f138e3b705ee8a47cb1649347a579fedee8fe73edff425f2e45b9d22e96e
pacemaker-schemas-2.1.4-5.el8_7.2.noarch.rpm
a50616f73a2a2e456d3bba21b8b4892c73814cc429db6bd992bd6eecaf5c6d3f
RLBA-2022:7835
mutter bug fix and enhancement update
Mutter is a compositing window manager that displays and manages desktop
through OpenGL. It combines the window-management logic inherited from the
Metacity window manager with a display engine that uses the Clutter
toolkit.
Bug Fix(es) and Enhancement(s):
* [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mutter.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutter is a compositing window manager that displays and manages desktop
through OpenGL. It combines the window-management logic inherited from the
Metacity window manager with a display engine that uses the Clutter
toolkit.
Bug Fix(es) and Enhancement(s):
* [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746)
rocky-linux-8-x86-64-appstream-rpms
mutter-3.32.2-67.el8_7.x86_64.rpm
fd4986a6c4ca4ba62462427c6b76264a5da45a7923a1253f78ad2671a8fb5b84
RLBA-2022:7258
java-17-openjdk bug fix and enhancement update
This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for java-17-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
java-17-openjdk-17.0.5.0.8-1.el8_7.x86_64.rpm
4c83e47265fda2ce1754ddb46c2ade5c95d13e82851ae0d3a0c2ed6d69943ccd
java-17-openjdk-demo-17.0.5.0.8-1.el8_7.x86_64.rpm
ea691a070f8fcf9e1389200c0b89f2ea21ef6f4edab9af535789127fae32b81a
java-17-openjdk-devel-17.0.5.0.8-1.el8_7.x86_64.rpm
9d8b71e2adced4576633c77a2607e532e1655149b2eaa4a38f090089e83b2e57
java-17-openjdk-headless-17.0.5.0.8-1.el8_7.x86_64.rpm
7ffee64f4d6987f5a2ec5be9980b2066dd61f7f865d5e81ee88646d13a63dd41
java-17-openjdk-javadoc-17.0.5.0.8-1.el8_7.x86_64.rpm
6846aa5cd7fae8d5ff1287646c43d7ad3747b43f0a39a0cd8fbcd6060bf8c880
java-17-openjdk-javadoc-zip-17.0.5.0.8-1.el8_7.x86_64.rpm
5c4784b2b0d76728db5459e983aecf854cbc19a0e01cfc48cfd60d33b5618368
java-17-openjdk-jmods-17.0.5.0.8-1.el8_7.x86_64.rpm
cc35eda49192a3b003c507ba2364e6da75fa46d1f89e7e7c656aa42e5202cfe2
java-17-openjdk-src-17.0.5.0.8-1.el8_7.x86_64.rpm
14adfb04f91d8b7b41309a93093602f1daf21c41193d7b6834db657f22e5ce3b
java-17-openjdk-static-libs-17.0.5.0.8-1.el8_7.x86_64.rpm
aa95e8d2da7eef7c20406839ea98ea1f42af0a38e20dbeb5023d6c77d0ed3d8d
RLBA-2022:7438
java-11-openjdk bug fix and enhancement update
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Bug Fix(es) and Enhancement(s):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Bug Fix(es) and Enhancement(s):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862)
rocky-linux-8-x86-64-appstream-rpms
java-11-openjdk-11.0.17.0.8-1.el8_7.x86_64.rpm
b4b8298d97ec3a0b3729caa82149c0e482625e9c1bae71d57102330281a9c249
java-11-openjdk-demo-11.0.17.0.8-1.el8_7.x86_64.rpm
413e2059917a6cfb0de0fa9b48b638181769d8c3962e7541033b49992e4150fe
java-11-openjdk-devel-11.0.17.0.8-1.el8_7.x86_64.rpm
cc2373fa88ae86db0f9056422882b00a8aa63a784241e40484e9f67bbfd5d26f
java-11-openjdk-headless-11.0.17.0.8-1.el8_7.x86_64.rpm
d7291c0e1bada7525bb4b9d11a516f3998d2faa1f6b441cf1cb765c6d465d326
java-11-openjdk-javadoc-11.0.17.0.8-1.el8_7.x86_64.rpm
c69eaea884949a91c731e8bd382d39501f2466fa39ac40b79687e3271eb160c7
java-11-openjdk-javadoc-zip-11.0.17.0.8-1.el8_7.x86_64.rpm
203c475c5749084c9ce2838a10cc8fa4e060ce23daf07c194612b0a4c17f437c
java-11-openjdk-jmods-11.0.17.0.8-1.el8_7.x86_64.rpm
376a70b9294fdf208cba2f3a18dbb4e998f7704ae3185f4f764a5b1be53516c0
java-11-openjdk-src-11.0.17.0.8-1.el8_7.x86_64.rpm
f4e5bee82d6228dfeff59c4b3e29c4d49a89ae298983607e3745c623c7c2048a
java-11-openjdk-static-libs-11.0.17.0.8-1.el8_7.x86_64.rpm
09c1f027ff03b8fa877f02900e2aaa9fdd746ba76c94b2fbcb92c0b91dc0f094
RLBA-2022:7861
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943)
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.0-1.el8_7.x86_64.rpm
878f9d6b5c38bff3b31ad21dabd579b984b8b4cadbd09a106e9daacdaadcaa38
aspnetcore-targeting-pack-7.0-7.0.0-1.el8_7.x86_64.rpm
151c726ec77a0463322cf8e6d85228f433bf9d639fc69d2ba2a62d97afddeb4e
dotnet-7.0.100-1.el8_7.x86_64.rpm
206e2ee7237a5c0a55d1043be0537b58a162814fe44fe93f7592ca10a52e702b
dotnet-apphost-pack-7.0-7.0.0-1.el8_7.x86_64.rpm
7fa30d5707209477c273499e8c19bed4f6ea19f18ffe37d1b7d050d4855f4942
dotnet-host-7.0.0-1.el8_7.x86_64.rpm
aa043a73b66ef2e40266073351cd663c22223c3b1b4fd1f6acf6ed9c51efcf04
dotnet-hostfxr-7.0-7.0.0-1.el8_7.x86_64.rpm
421cb3357b477659fd3b7cb534ee9a3a735ff44b5a69f32e3a3088787c59a251
dotnet-runtime-7.0-7.0.0-1.el8_7.x86_64.rpm
8f9b1c50019b172719d57cde37b02dc769d3332898a710f3599ee174849b11dd
dotnet-sdk-7.0-7.0.100-1.el8_7.x86_64.rpm
0461180b438eb7121f3f141e50d7bcf1a7d3b0e271b0c099fc512c82a0c9ddad
dotnet-targeting-pack-7.0-7.0.0-1.el8_7.x86_64.rpm
25415080e2c9cf1d0ca5f3c304dc60566c490a4528aadb723ff6479feb685d54
dotnet-templates-7.0-7.0.100-1.el8_7.x86_64.rpm
21fde39f57873fea6b2bd78854959699ac14f8b88298aa0cc711dcc1b88693e7
netstandard-targeting-pack-2.1-7.0.100-1.el8_7.x86_64.rpm
b24fc1b37cf501c6ee212bbfc5b112433b475ce0292b5f164529331848c30e1d
RLSA-2022:8492
Important: python39:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-toml, python-urllib3, PyYAML, python-requests, mod_wsgi, python3x-pip, python-chardet, python-psutil, python-ply, python-wheel, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, python-cryptography, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
7a8ee5a5cd1f0de76f24260d131d89147cdbe8050e0fdd8498bba2e7a02ec868
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-devel-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
3b10a486f9f18d09c1172822d0bc10f4839819625b8485997d7ee0686f0e39b6
python39-idle-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
e549dc525b65cd3575243e24e0d3a8a0de0d8db72fc5485f889e74e7db2cdb4c
python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm
5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4
python39-libs-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
25c78438938258d4a4a38baa2ff0aeaeb5d2b0681305e03194c8a61721c44143
python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17
python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm
603e3ea442bedc2f6a2ab4f9b17eb4b50ee5bcfefdf2a90ac14eb32fdf1d3938
python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57
python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm
c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4
python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12
python39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm
5204c287450cf1579ca958d4b8e807cb70b5b7f55903604f6e8c64b9da8df019
python39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm
eb25c5ade496b7c9d8ac56a635c29813f9e7b57f108e146e4be32678bea3874d
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm
4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748
python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm
1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm
12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c
python39-rpm-macros-3.9.13-2.module+el8.7.0+1092+55aa9635.noarch.rpm
be6912750857e863edf1eab1ae17f464094587f3f9a23a6e032f92ce32cd574e
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm
2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55
python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm
fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e
python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm
a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9
python39-test-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
15257bab47c339067d514868f259751b4dc1ca12c07ce14fdb09f774d106dad0
python39-tkinter-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
c4cc624bba9ec5d36764ff31594acbe09f464a8227bb79851b38f252a8d1a33c
python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm
e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94
python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm
58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa
python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm
b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190
python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm
c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0
RLSA-2022:8547
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.5.0.
Security Fix(es):
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.5.0.
Security Fix(es):
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.5.0-2.el8_7.x86_64.rpm
475f1d6df087435fcefe313a755054f818a67bba03b9dd066bf99dcbfdd5ec8e
RLSA-2022:8554
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.5.0 ESR.
Security Fix(es):
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.5.0 ESR.
Security Fix(es):
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.5.0-1.el8_7.x86_64.rpm
f96ae8017c6b8ae8fb7e05d01518c9e16be3bfc1d8cce9ca70672b6d2387762e
RLSA-2022:8649
Important: varnish:6 security update
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: Request Forgery Vulnerability (CVE-2022-45060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for varnish, varnish-modules.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: Request Forgery Vulnerability (CVE-2022-45060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__varnish
varnish-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm
5a1fa7ed104adb107faaddafd8e877beba1351a69a607642a63c0379a383a4dc
varnish-devel-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm
ee7ce281889256348965d2ee8adbbcd754e77829762f455806fd8e514550afe4
varnish-docs-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm
de9011b3a31dc1bef73344bf0eeca380405f881f2975d3bf29ae06cc7412454f
varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm
9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e
RLSA-2022:8833
Moderate: nodejs:18 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818)
Security Fix(es):
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818)
Security Fix(es):
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm
aea785debf4481bd0e02678272a77396bbdc8dcf6b0f02d0a0c355ee25c67bde
nodejs-devel-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm
de3833917292c5c7473db9db975ae6ac53fe8887d0bf4699c0812ae1da27dc21
nodejs-docs-18.12.1-2.module+el8.7.0+1104+549f92a6.noarch.rpm
37ef414b21908c52aed4b6783d8d2102585a0fffe339215361f941dab617afe8
nodejs-full-i18n-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm
8dd89c09e0bbc8a8671c8f310147558f61655eb1147da5cbfe8de9bf1bca1257
nodejs-nodemon-2.0.20-1.module+el8.7.0+1104+549f92a6.noarch.rpm
b0c10787f8ad3c63d98c7a029cd3d668008b7b4fbdc912dead848fe65263fc28
nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm
ffece635c6d640eed8fb89b76b64e4b03874e8ae7d4a1e6fba7438ba7f1c231a
nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm
0505c56e61229be002ba0b15b188bd7a31d7c3187ebadfe7e6348cf9c3f463a2
npm-8.19.2-1.18.12.1.2.module+el8.7.0+1104+549f92a6.x86_64.rpm
5aba9b1c42407f8e82c505064fc689e153c0939e96827320a17e7d389829d550
RLBA-2022:9018
.NET Core 3.1 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet3.1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219)
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm
321a9227f7a51654049bc09e0f2ce8a754e420e11c71a9fab4bc2a456dc2eb88
aspnetcore-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpm
ef7b433a72ec8356e0bef8fcc4a48e4fa039b188abd2e815e0ef06bf31db9551
dotnet-apphost-pack-3.1-3.1.32-1.el8_7.x86_64.rpm
61ff6e071d2e85056d0211ad5d8a1983c9e10a8db1da945567f4f38a1396907b
dotnet-hostfxr-3.1-3.1.32-1.el8_7.x86_64.rpm
733b0d67480937424b1628b33545714519511b60b4266f9418c8cbcf7b00484b
dotnet-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm
ecc3c698aa2fc5ffc1a4ae5af831423e80972178883d6897dce35692e0aaf976
dotnet-sdk-3.1-3.1.426-1.el8_7.x86_64.rpm
40687d8ce0358edb1597c22c456ebc8fdebb0b9af4a6839261b1b92d1a37b77e
dotnet-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpm
e9cfa562100cd5d4ea75e21d0f6f308b00ae1303c73b4e4ccce82e70145506e8
dotnet-templates-3.1-3.1.426-1.el8_7.x86_64.rpm
2eab8aa7fc541ef65617ebdda07745ffd3f98abca35ba60dcacd00df4332ff64
RLBA-2022:9019
.NET 6.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147)
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm
40eb805b34e75308a953b764f740cffc0b52ff48354e118ee2f8c0e1a9fd2f54
aspnetcore-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm
24679a9fa18db67d5e4d5af2f59bf8419100ae01076983c95f32ba3e70edf059
dotnet-apphost-pack-6.0-6.0.12-1.el8_7.x86_64.rpm
5ae896ebac661ffda075e21ce8d41cbca61f4ea1cf93f4126b64b98adfc0f8cf
dotnet-hostfxr-6.0-6.0.12-1.el8_7.x86_64.rpm
e053fc0aa64ba6a7eb3d21bb6e152838b3cf2bbff56e956a934df59c06444f8c
dotnet-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm
c8fd6a01a6d2dcf00f64cb90b6b821ceac85408d4928ff5205836a2709a7e6d8
dotnet-sdk-6.0-6.0.112-1.el8_7.x86_64.rpm
0caf19b488f04ef0674893521e5fcd92e8680d7c8fb2aac8a6ed3ceb4c7d3fe1
dotnet-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm
7dca74b8041934891ebadf7bf016390e64745223173672b9631a7b855c50d1eb
dotnet-templates-6.0-6.0.112-1.el8_7.x86_64.rpm
67a7dc47e75c39a9743bff3cdc0551b7853024e017afc27773943f3e5445c83a
RLBA-2022:9020
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151)
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.1-1.el8_7.x86_64.rpm
7e43fe0a5c4c88b1ddcf2d7f507ad38377da00a50e66b1936097cc9d029a2c0b
aspnetcore-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm
fd7290132750d545aa8c12072861ab647811219242e5e211961a357ee86f2cd7
dotnet-7.0.101-1.el8_7.x86_64.rpm
a95b04fe3de2a4793f8cf8db2bb6e7485ab0c699784446a68a904c2dbad7446d
dotnet-apphost-pack-7.0-7.0.1-1.el8_7.x86_64.rpm
0cf19b555eb333bd7382da6c3115543948caf0925634212e8b3ce9c415d9fbc0
dotnet-host-7.0.1-1.el8_7.x86_64.rpm
99fae50921aca12abcd7cb7df97937e13193d133912668f4e10d47b6d6335684
dotnet-hostfxr-7.0-7.0.1-1.el8_7.x86_64.rpm
8ee69163ee0f44a2503eca39c62712330a04830ea711776071004e83fa3a11f2
dotnet-runtime-7.0-7.0.1-1.el8_7.x86_64.rpm
9afab5eab6fbcfffadfb298c1abcdeb421a48d3dd3778e68b1e05d1698ed9905
dotnet-sdk-7.0-7.0.101-1.el8_7.x86_64.rpm
840928e1999fa87024dd8309803d3392288dfa6c08b7aa80fac6940fe14fd14e
dotnet-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm
fa4ccf679be8704480c144cba45ed10f2c7b3679c42b0440ecc5a98f32cf0f5e
dotnet-templates-7.0-7.0.101-1.el8_7.x86_64.rpm
868aa99c208a5ee4098322b5142a27c51c0a9e093092a9c6601cb32a556fbe9b
netstandard-targeting-pack-2.1-7.0.101-1.el8_7.x86_64.rpm
f0fcc000efcb027874d095cd43fd9210fd8f2f5e61d40f2190bdf833506ed278
RLSA-2022:9058
Important: prometheus-jmx-exporter security update
Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target.
Security Fix(es):
* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for prometheus-jmx-exporter.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target.
Security Fix(es):
* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
prometheus-jmx-exporter-0.12.0-9.el8_7.noarch.rpm
7f0ee106105d94ea781c5708ae94636470835a481955f86d8287decc606eeeed
prometheus-jmx-exporter-openjdk11-0.12.0-9.el8_7.noarch.rpm
d55d78db5fa0b4a9613c03980a7acc56d80f9da749c0038b6a035945813827f8
prometheus-jmx-exporter-openjdk17-0.12.0-9.el8_7.noarch.rpm
744f60f7d304e56fcc61d9350522f83e20f744c834e2c3d04bc5f9c20133bbfa
prometheus-jmx-exporter-openjdk8-0.12.0-9.el8_7.noarch.rpm
3de1b62ba2631039862963f1827e5faf5422b5c65aa0afd8c07337e3cba96ffc
RLSA-2022:9067
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.6.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878)
* Mozilla: Use-after-free in WebGL (CVE-2022-46880)
* Mozilla: Memory corruption in WebGL (CVE-2022-46881)
* Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874)
* Mozilla: Use-after-free in WebGL (CVE-2022-46882)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.6.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878)
* Mozilla: Use-after-free in WebGL (CVE-2022-46880)
* Mozilla: Memory corruption in WebGL (CVE-2022-46881)
* Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874)
* Mozilla: Use-after-free in WebGL (CVE-2022-46882)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.6.0-1.el8_7.x86_64.rpm
34955a1b826608022b8a34be29ca7e0fc0a075a4a22577ba07aaebaf3b9b814e
RLSA-2022:9073
Moderate: nodejs:16 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* minimist: prototype pollution (CVE-2021-44906)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* minimist: prototype pollution (CVE-2021-44906)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm
9627a638967cca454e0eb74aadfba8c320a4f90aff79b91ff116fffca8858675
nodejs-devel-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm
8f759716abc41be055e7d194521e5b8c294942f9a4d69cc8b7fdd2011ccafead
nodejs-docs-16.18.1-3.module+el8.7.0+1108+49363b0d.noarch.rpm
e4cad5a20aadf5c90d0fd2bdbb03f5e769a587f3760049b0bcfeb4ccd84a491f
nodejs-full-i18n-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm
299c1e5c4de5ad93ac8947a3ff0a1e96cd9f1a4f7f3c4022b0adbf6e287e42fb
nodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm
7cfdc2a79280af0253fe192f0b797d38da309b280564776c073ff1d43ed0eee1
nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm
b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75
npm-8.19.2-1.16.18.1.3.module+el8.7.0+1108+49363b0d.x86_64.rpm
63e6c5dbb05c4244de9d5ebe69fccb1c9ddff7b735d232b69d4237db460e5ab8
RLSA-2023:0016
Important: webkit2gtk3 security update
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el8_7.1.x86_64.rpm
b66f4a20f2cfa416c253e59f5abdae4d60ab0c8eb6fa108b62e5dc437ab2063f
webkit2gtk3-devel-2.36.7-1.el8_7.1.x86_64.rpm
80c833250fea9c202b88609c6b4ab83d58dc8c614c4ae61a711f0625e4c82053
webkit2gtk3-jsc-2.36.7-1.el8_7.1.x86_64.rpm
4e1275424c38905ac892ce8c1c0da21f05575d77cc349c53d2ef10e38b11aec2
webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.x86_64.rpm
ebcdca510922906cce63a30a560158cc97a434cc1187796aa7a6ca34006f7ac5
RLSA-2023:0050
Moderate: nodejs:14 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* minimist: prototype pollution (CVE-2021-44906)
* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* minimist: prototype pollution (CVE-2021-44906)
* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm
56b0c87890dd9e9563794ebf5b65af30a92acddc18d7ae8c378a704621d1946d
nodejs-devel-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm
17d8ad3686b58b35212ce357b7ce43e5fc656bdec8d101186f00e5a411b730ac
nodejs-docs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.noarch.rpm
d3c7996c0f56313a8aa1a7de5476ea69d6f54a8ec33eba74fb619a49a009de35
nodejs-full-i18n-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm
8f0511b89a54ea41b1e6e274cdd6e243a084b083d0edfe2d9ddfa5d55b37c2ad
nodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm
7cfdc2a79280af0253fe192f0b797d38da309b280564776c073ff1d43ed0eee1
nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm
957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c
npm-6.14.17-1.14.21.1.2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm
a472fd1bc022b9a378a5db241fda34d0fc6c16d234ec9801494fd3c3c32e79af
RLSA-2023:0079
Moderate: .NET 6.0 security, bug fix, and enhancement update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13.
The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458)
Security Fix(es):
* dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13.
The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458)
Security Fix(es):
* dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm
19cd947e3adc70c742d707df2cb6d5002f3d6ac755bc76cb2de3e0967810c3ff
aspnetcore-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm
e92089de7ad5c684dc22fd190cadc07b0c50a97ad4c82c1d63b0f57b435104e6
dotnet-apphost-pack-6.0-6.0.13-1.el8_7.x86_64.rpm
428b8d78d564a4e70047245b632fdf13b7056b1092fb0f5ca3e9edbe8f6ac64e
dotnet-hostfxr-6.0-6.0.13-1.el8_7.x86_64.rpm
1efcffd0ba52bafde6dfab411848e1254daba7bfec6e409a9c16ef31d3305084
dotnet-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm
0e2b60eb3232918cbc31eb82b3b894b49307ceeb33d8c99b72780cc8ea4c114c
dotnet-sdk-6.0-6.0.113-1.el8_7.x86_64.rpm
1473d96fd6aeef8aefb3aa4a131ec9b1e20504d940aa8976d055d24aa85078b6
dotnet-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm
513d42eed786b52bac7a89debf53982b79f9c6c97df7dfb8aa82696e464697d1
dotnet-templates-6.0-6.0.113-1.el8_7.x86_64.rpm
8f3a7f3e4b65d6772d56ce60ec525958af78c523c41799386a585c1df0f52edc
RLBA-2023:0081
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466)
rocky-linux-8-x86-64-appstream-rpms
dotnet-7.0.102-1.el8_7.x86_64.rpm
e095f2d0625ef0686b6ea540ca45ac81f23bfc9153b5bd7203d31c27453a6298
aspnetcore-runtime-7.0-7.0.2-1.el8_7.x86_64.rpm
2b42f45d82b387cecbe3b41339bcd839a3bbbd0c8194a333a2a7db656bde81ba
aspnetcore-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpm
bd1b9b7f2c4bd7939c8f6322eae6aa599a18da3f560b2662ecb1a88db6671fed
dotnet-apphost-pack-7.0-7.0.2-1.el8_7.x86_64.rpm
2c0e7c8657f597286fdbcb586b1ee995b4f3803c22cc704106a01cded0ec0af0
dotnet-host-7.0.2-1.el8_7.x86_64.rpm
8a4b1cbdf55add0651ee4fd080ac818067fb824fad3178069ed5c337cf2e0347
dotnet-hostfxr-7.0-7.0.2-1.el8_7.x86_64.rpm
ce335e7036bf94cc18dc46791b19a44dd51bc2242377448e7df0bb324f51a42a
dotnet-runtime-7.0-7.0.2-1.el8_7.x86_64.rpm
6f9a221cb96bfc8a8b3f5f62cfe7ca30ac568c07ff53d47a12c67f8ac97fb3c1
dotnet-sdk-7.0-7.0.102-1.el8_7.x86_64.rpm
3c283655f110b4aa7485baa93ae12f0d3de144d1beb0d7de2d61ab034d611608
dotnet-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpm
53ad722510b3b550ac22e53223f07d2e60a856009a55011a38e66c109ddbd5ca
dotnet-templates-7.0-7.0.102-1.el8_7.x86_64.rpm
d2dcf7c46309ce7ef4006d7dbba0c28b4d1a44c2da56ab9936fd71d6ccb608e7
netstandard-targeting-pack-2.1-7.0.102-1.el8_7.x86_64.rpm
7fd06fac7c6ed0309f2bd4fa26ea6bbd890e3be7cb59638a13fe9c46ba9cd7ee
RLBA-2023:0084
stalld bug fix and enhancement update
The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system.
Bug Fix(es) and Enhancement(s):
* Stalld is running in unconfined_service_t type (BZ#2126494)
* Rebase stalld to latest upstream version (BZ#2136559)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for stalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system.
Bug Fix(es) and Enhancement(s):
* Stalld is running in unconfined_service_t type (BZ#2126494)
* Rebase stalld to latest upstream version (BZ#2136559)
rocky-linux-8-x86-64-appstream-rpms
stalld-1.17.1-1.el8_7.x86_64.rpm
c87a345a98e19f757a1d558cbca24f977cd2fbbdb2017d78e9c02f7567f3b292
RLSA-2023:0087
Moderate: usbguard security update
The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature.
Security Fix(es):
* usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for usbguard.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature.
Security Fix(es):
* usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
usbguard-1.0.0-8.el8_7.2.x86_64.rpm
bead5d977d07d2d41fabef3a978ed0f2989c063e606ea9a758a1faeb5f65e7a8
usbguard-dbus-1.0.0-8.el8_7.2.x86_64.rpm
749989aad3eb094437083a29d3bd008e9931e285c123bece253553ab47ddb502
usbguard-notifier-1.0.0-8.el8_7.2.x86_64.rpm
2bfaaafc8666861af9200e1252999f34c139c92a668575b7f2d1c5bbb0549a0c
usbguard-selinux-1.0.0-8.el8_7.2.noarch.rpm
41b4556682f318713d2a783e5c2c86715f238c6048f5bca6f74726471a5b70fb
usbguard-tools-1.0.0-8.el8_7.2.x86_64.rpm
dcb2b90d6dadd791ede0fdede5e3dd072b8b11c883bba4b0a38f149f88574108
RLSA-2023:0089
Moderate: libreoffice security update
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Macro URL arbitrary script execution (CVE-2022-3140)
* libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305)
* libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306)
* libreoffice: Weak Master Keys (CVE-2022-26307)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libreoffice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Macro URL arbitrary script execution (CVE-2022-3140)
* libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305)
* libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306)
* libreoffice: Weak Master Keys (CVE-2022-26307)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
autocorr-af-6.4.7.2-12.el8_7.noarch.rpm
a2acbc1046337231a24999cd37fca96944da05e00544367f6bb6685b9ef1e1dc
autocorr-bg-6.4.7.2-12.el8_7.noarch.rpm
8f097f4746b09367ed9215cd586d5e8795dc5bf32a7c1b46138503b2c0cae56c
autocorr-ca-6.4.7.2-12.el8_7.noarch.rpm
8f4ef440119488e8ecb3a6ef7cc30427c27aa29ad90b2f57f2e535f4e5654f0b
autocorr-cs-6.4.7.2-12.el8_7.noarch.rpm
f32e6488318c1e13d9c8b00b6e6a07fbe5d1b3cd8ec2fd5c53e6e675bebb0b75
autocorr-da-6.4.7.2-12.el8_7.noarch.rpm
15a6ff3f93665cbeb9c58eb2f41630c27081af31c8cfcdf02cb4e0e827d823de
autocorr-de-6.4.7.2-12.el8_7.noarch.rpm
c9049d95f09fb038b7c5b390b53f1f275ee55e690e233e8db0ae2516c237caaf
autocorr-en-6.4.7.2-12.el8_7.noarch.rpm
3226adb17ce830be21ef7a8cb76a6fa138ed07ac3ee3fc2fa6c7623382fc7cfb
autocorr-es-6.4.7.2-12.el8_7.noarch.rpm
7c07b45d1978064c299b7027e783aa6bcf0511c9e2fffadf38907ec784d97d0c
autocorr-fa-6.4.7.2-12.el8_7.noarch.rpm
86e067b3b4d491a3cee20596a983118d992d7548720014b056aba89c176f0e9e
autocorr-fi-6.4.7.2-12.el8_7.noarch.rpm
ba1197204009a896f2d00633361eef3bedb2db8f88cd134c306f71353680ecc1
autocorr-fr-6.4.7.2-12.el8_7.noarch.rpm
6fb38927571c258117c3166ed00555b4624d4e03499f6d53c38f1b8352ce975a
autocorr-ga-6.4.7.2-12.el8_7.noarch.rpm
3928db67a6161adac5625d5b815f475df203b35d335651624de12f2014cb77a8
autocorr-hr-6.4.7.2-12.el8_7.noarch.rpm
6a4e0fb720ef6c25064a819aa7da27feb6e93c6dbed892958ad6d0048af2350c
autocorr-hu-6.4.7.2-12.el8_7.noarch.rpm
8d1fcb8bb5c7ed28f58140aeda31176861b3b2a7f9106deb1e396933c0f2dac3
autocorr-is-6.4.7.2-12.el8_7.noarch.rpm
d3a16592f86ab18412bc59649326709c07a8f3feae441be87a3fa92a1b624c1f
autocorr-it-6.4.7.2-12.el8_7.noarch.rpm
2e6910004b3d74422d0482f70783ce6f0c72528871890fbdd917140322f6acf4
autocorr-ja-6.4.7.2-12.el8_7.noarch.rpm
e2a63c2b2951b1abeabe02057bc45ea35fc13e100e620c74df1c85fda513372d
autocorr-ko-6.4.7.2-12.el8_7.noarch.rpm
29b26f830640b56aaeb8d9cc772dc896f35c0aab32948ebe1e7b091e62b25f8f
autocorr-lb-6.4.7.2-12.el8_7.noarch.rpm
7532ef199db910cce2bf7766bd973545101ef54e32056f214659e237407d0a04
autocorr-lt-6.4.7.2-12.el8_7.noarch.rpm
05dddfda6a539fde5906ac149733916a83a456975a0664dfc02d4f3dda78e353
autocorr-mn-6.4.7.2-12.el8_7.noarch.rpm
df06c38efe4cb546f78d3769a2c773b90089307ea864f4f0f9159af7b5264af2
autocorr-nl-6.4.7.2-12.el8_7.noarch.rpm
d09a924042e4ee0e08a8c16f4e26f2cc27af118c85f6eeed02680171aa7c9b15
autocorr-pl-6.4.7.2-12.el8_7.noarch.rpm
a0a658eab1ca333565965b6400e231ec428b6a8be4689c2a484272da4a43b844
autocorr-pt-6.4.7.2-12.el8_7.noarch.rpm
a4c941ce560fee4df7f6af856aa915684ce447bdc5caf252122901cba0764427
autocorr-ro-6.4.7.2-12.el8_7.noarch.rpm
6bd463ffb1a2a3fa4988ac2c045739768146ce156aafff7a3ad10898d6109a2c
autocorr-ru-6.4.7.2-12.el8_7.noarch.rpm
906dd6c07b6d03f5c4a50be1080c2e6b091cd854a91afef30f030fc9a4e4eb01
autocorr-sk-6.4.7.2-12.el8_7.noarch.rpm
93da6f2d360f64e6cb94c3bc344a75432aafee2c1bbde6db0202eacd70cd2bfb
autocorr-sl-6.4.7.2-12.el8_7.noarch.rpm
287d5111718e8deafb4fb98aa0155f8aba062d013527a6817bdc03d4e05fb8aa
autocorr-sr-6.4.7.2-12.el8_7.noarch.rpm
af0214216223c081b5afa1473d2e01991e6afb903cc9646511ad3b86efdac632
autocorr-sv-6.4.7.2-12.el8_7.noarch.rpm
da1c4be215f13bf761c26f36c506b8aec974c7ba070d50f5ebb7f4a0656cefca
autocorr-tr-6.4.7.2-12.el8_7.noarch.rpm
2bac7674a1755ed6d618c79e1cc9fba6fd127fb39487bc366aa6d33184abebf5
autocorr-vi-6.4.7.2-12.el8_7.noarch.rpm
4cdd2ec0475100c58257073a7e6c361bd84903b37f74d05b47e5c1596c03ea2c
autocorr-zh-6.4.7.2-12.el8_7.noarch.rpm
02a5fb4ae36ae7931a8eb7c60d04a60839923203aa9bbffd1916a1818927326b
libreoffice-base-6.4.7.2-12.el8_7.x86_64.rpm
9deebcb58ac4783324552f21a1f2f403c46efaaf2c849b29bbffd55cc149f4b7
libreoffice-calc-6.4.7.2-12.el8_7.x86_64.rpm
45f20bd885d9ea95ad3d38da587efd34ab8566aae1fc16b9edd8b799efe6b081
libreoffice-core-6.4.7.2-12.el8_7.x86_64.rpm
3cbd9785ee4477918182a0d4b8771efcc1d520d53dc900c0318a29804204a9c8
libreoffice-data-6.4.7.2-12.el8_7.noarch.rpm
55fe5fa4565a7232047d81dc1d8d473643cdd9fce3c448fcdb2ba6d5a0b9669d
libreoffice-draw-6.4.7.2-12.el8_7.x86_64.rpm
da2bf1fe25abbc8e25f9a27f00a70e09d77b385673f280252b6cfeda0cd0eccf
libreoffice-emailmerge-6.4.7.2-12.el8_7.x86_64.rpm
5f909c8f53dcab427922a6fc30fabac33790535014bcd5c1e3c1fa3788e293e2
libreoffice-filters-6.4.7.2-12.el8_7.x86_64.rpm
90208aa5a9fb3dff1e62632a77c50cfe9f1c89b014821bf24cb9937006fae00d
libreoffice-gdb-debug-support-6.4.7.2-12.el8_7.x86_64.rpm
c1057c33b91da23d108669763b6f62c85628bd14806d4ca8360acabfb372c2a0
libreoffice-graphicfilter-6.4.7.2-12.el8_7.x86_64.rpm
b2f5c65f1f9e81f470b062510beae2623009f6f0a3e531f6091c54e26cc6bda4
libreoffice-gtk3-6.4.7.2-12.el8_7.x86_64.rpm
31f275dfadd60e75590b981f5e2e3d350ca435eebb744f252af0449475bd3db1
libreoffice-help-ar-6.4.7.2-12.el8_7.x86_64.rpm
03fe1c78cc0fed63f87e2b58b02a94360ccda0a533cd603ce90b28ffd3c057a8
libreoffice-help-bg-6.4.7.2-12.el8_7.x86_64.rpm
fdbdfcd0a4a4e575d5f655a7ceaddac1ca11fb33c3e83d5f7c8b913f22d97e6c
libreoffice-help-bn-6.4.7.2-12.el8_7.x86_64.rpm
d8a96b6f2015428cefa02cfdff90902e5ae27554f0be3164696b09ea50870ce4
libreoffice-help-ca-6.4.7.2-12.el8_7.x86_64.rpm
7179140afd77d3875e0d7c9ecd43e19a654ef96fb595ffca3f59c319a6d320e7
libreoffice-help-cs-6.4.7.2-12.el8_7.x86_64.rpm
3d0747ad197014f6ba2587c7606896fb34d877a51f6f9af6915427c63393a362
libreoffice-help-da-6.4.7.2-12.el8_7.x86_64.rpm
4f0d8defeb48b46dcb66115009dd6261449ac7460fd7bb83b9d0c2e963661e36
libreoffice-help-de-6.4.7.2-12.el8_7.x86_64.rpm
5fd82a98933a3c13395abf683e16582005f6ceaeed874da10a5584b584e4050a
libreoffice-help-dz-6.4.7.2-12.el8_7.x86_64.rpm
061daffcf62d23b770309154ebc96c19cc8abb0efae134b87db778fc29b223ee
libreoffice-help-el-6.4.7.2-12.el8_7.x86_64.rpm
905d4b9c9ad8867b4ce77b46854e59cb419cdb71aed4156ebd130c8e7320f9b4
libreoffice-help-en-6.4.7.2-12.el8_7.x86_64.rpm
63abd46aff7062d541a9f7e153f8a7b4b5386fd77fb3e9ac6b8c401582bfd79a
libreoffice-help-es-6.4.7.2-12.el8_7.x86_64.rpm
1c85f4ffba87630dc09ccadd412dc0ed175478979946ef297a58a1bb656a30a0
libreoffice-help-et-6.4.7.2-12.el8_7.x86_64.rpm
f4dbf53da1e2d0d0720616421abbcdcfc883b358d903e580ebed80d16c28a7eb
libreoffice-help-eu-6.4.7.2-12.el8_7.x86_64.rpm
775d73a53772925ee49bf373319613ac438a1f1129fdace2c7de5ac5911639ad
libreoffice-help-fi-6.4.7.2-12.el8_7.x86_64.rpm
bd195ccc3acc49c1d308eec2c61be26235758c7f4d095b92692ce3330fba6121
libreoffice-help-fr-6.4.7.2-12.el8_7.x86_64.rpm
e36bbcac8772045a802c2c3da20c842fb38bede9034866b92a0ab60bf8085705
libreoffice-help-gl-6.4.7.2-12.el8_7.x86_64.rpm
cf44888c78e8b61c7d611bf573987395e9bb24c769aa5c0a39590aa52db4834f
libreoffice-help-gu-6.4.7.2-12.el8_7.x86_64.rpm
0964e9568867d77881795baaabf001b6b1b83cfc545ad6656281f3e7ed2352d3
libreoffice-help-he-6.4.7.2-12.el8_7.x86_64.rpm
2019265a6a8c3f1fb76433e67772bd156628f247a7065ac4ee814f671b3a87a5
libreoffice-help-hi-6.4.7.2-12.el8_7.x86_64.rpm
550c3ba6e15ba8a62da4e5f958ec8d20984b0623a6198eb30e51c6cb17c56bcd
libreoffice-help-hr-6.4.7.2-12.el8_7.x86_64.rpm
e07ca69bea41a1a569a8401f609c5a54f549388222785ceca143578b8a987bb2
libreoffice-help-hu-6.4.7.2-12.el8_7.x86_64.rpm
32104e85d1d031346f887858c704e16d70190ec07fb7555ddeed1adbf8b4f271
libreoffice-help-id-6.4.7.2-12.el8_7.x86_64.rpm
07a8b6ef05bc1a755c7d3e520d0bbcf97c6ea1e79e81a42f71e5037379b8aefe
libreoffice-help-it-6.4.7.2-12.el8_7.x86_64.rpm
b71f395d01167807bdbd5002e72533eedcc5fece8194d5e88dd6e938781d36e1
libreoffice-help-ja-6.4.7.2-12.el8_7.x86_64.rpm
d838bd3b65267a5ad627fc7dd5c30475a87087eeb8cec473dcff61a652ba883b
libreoffice-help-ko-6.4.7.2-12.el8_7.x86_64.rpm
9f16281ca9e6b11a806965017526ee8de81302d5292db4f0a183e61e5a4225bb
libreoffice-help-lt-6.4.7.2-12.el8_7.x86_64.rpm
df83459ed931fb894b00b7982486dddf4b56b76c53ac4155ec6bb639ebfb2fd9
libreoffice-help-lv-6.4.7.2-12.el8_7.x86_64.rpm
d9f30c2d7bbea6f8781a95f323822eba6cf5f131df607db0fb994969487e5950
libreoffice-help-nb-6.4.7.2-12.el8_7.x86_64.rpm
9ca2b4619438b7641e4c9d0abc5953c443b4a9560859f3802df03ac89d8c2bf2
libreoffice-help-nl-6.4.7.2-12.el8_7.x86_64.rpm
656922d1e3e46d135682be6c0217e5838d4e52a47efaf9c53845a4afb206de14
libreoffice-help-nn-6.4.7.2-12.el8_7.x86_64.rpm
df201fc5e2502d02a02df4c764d56ff8e0c3278f54a4621f0827c8f5c9cab9a0
libreoffice-help-pl-6.4.7.2-12.el8_7.x86_64.rpm
140c982b96d38129606fe56e2261d8f0ae0ed185370bf7789ccd89d4970d15f5
libreoffice-help-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm
a45a07329a4cf98a0764bb99741585c406b1772d8f5be084b4308f8a75cad4a4
libreoffice-help-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm
eb226155b12d7226a5f0c0b48eb4a98286b5bbc22c0e57b5284acbc518144975
libreoffice-help-ro-6.4.7.2-12.el8_7.x86_64.rpm
fccc471b6ee0475dc03a207ae980e6dd6ed74e0734e60a255a4484ce8966f347
libreoffice-help-ru-6.4.7.2-12.el8_7.x86_64.rpm
390774ed5168088441725a2b5e7eb34e8626d66867b5980c421911831e977e3a
libreoffice-help-si-6.4.7.2-12.el8_7.x86_64.rpm
4094a72260b9c4bd81bf99ff29b977e2a5e87677c94fe3d5393de0b6cf3b2c5f
libreoffice-help-sk-6.4.7.2-12.el8_7.x86_64.rpm
e4bf9168efcfb7d0ecb9ee06356f99c2e75ef4e2efede5cd203f57bec12c4f66
libreoffice-help-sl-6.4.7.2-12.el8_7.x86_64.rpm
de5a992db120952cb0f0b613680ba963859f360f0120e7069ca482b154ebe1a9
libreoffice-help-sv-6.4.7.2-12.el8_7.x86_64.rpm
e62ba73a3ca1b85f88b7841e433966a4dab2b8df1c97284c8ba9f2e926cf1011
libreoffice-help-ta-6.4.7.2-12.el8_7.x86_64.rpm
249b6a093b879d4cea82077a601fee34f28550ac80614f91bbc477f77b3cde16
libreoffice-help-tr-6.4.7.2-12.el8_7.x86_64.rpm
4bebcd0b5d9c03d0fa2d7ce9183fcfa23734c370e829ba059bdf2f42aabf50d5
libreoffice-help-uk-6.4.7.2-12.el8_7.x86_64.rpm
b3f2b9baef677289e1895e22a5d0260d5a96dcd98110ce697ae60367a64c5c77
libreoffice-help-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm
aeb00838fb4028809963aa331b5bdd4780cd4ae0aaadd485dcbb5bf9d0868bda
libreoffice-help-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm
252db31dae8a5646f2beb4bed1d7d45452adadcd40122ebc7c3860d89db30372
libreoffice-impress-6.4.7.2-12.el8_7.x86_64.rpm
67be3a38ec41a6a2a601c6581065badf857931b4c4913778dd308ba92026a849
libreofficekit-6.4.7.2-12.el8_7.x86_64.rpm
b6bdbc45d9331f47f98f51365a3319370c23504399231f50c0621b5a2edd6fd6
libreoffice-langpack-af-6.4.7.2-12.el8_7.x86_64.rpm
988d4bb624e4092d22428ba3c02418a8daf433889d326f9442b2c17432efba12
libreoffice-langpack-ar-6.4.7.2-12.el8_7.x86_64.rpm
b7d0ea249c8860ca81b86340caa2f478d74b592db6a65d78c2299cd49392975c
libreoffice-langpack-as-6.4.7.2-12.el8_7.x86_64.rpm
9cce1c70933c751dd20d1a544fbaa0478291b6cb12b906b3f199cfa68f27b034
libreoffice-langpack-bg-6.4.7.2-12.el8_7.x86_64.rpm
cc813cecf999bcb5328f6c513ae04b04ef3733c601c503b917ef58ec6b1d0e0e
libreoffice-langpack-bn-6.4.7.2-12.el8_7.x86_64.rpm
d022d597fe34c30fe08a21759530fcd70cdf22ecf6134bb0c49831dd492cdb6c
libreoffice-langpack-br-6.4.7.2-12.el8_7.x86_64.rpm
b5cc2916adb880104a19c834aa5b78ce82b6d3fdd5bc8db8a4e9fd4547dbb41f
libreoffice-langpack-ca-6.4.7.2-12.el8_7.x86_64.rpm
67853fb62255bcf3402bf99bddb7146187f9ffe7ed15359a26171beb96ed0682
libreoffice-langpack-cs-6.4.7.2-12.el8_7.x86_64.rpm
ff597264ac48be32cfeb88e4f3f6f0cd2bc4b919e2b8ca72ab4fff490e726671
libreoffice-langpack-cy-6.4.7.2-12.el8_7.x86_64.rpm
f167869e5da9c0f90cf7863afd4c3108aeb232d25c24e069477acc6105735b1e
libreoffice-langpack-da-6.4.7.2-12.el8_7.x86_64.rpm
71dff527ec52f21588c691391242da382f280eff6d3d2a58aebb5903e576afb2
libreoffice-langpack-de-6.4.7.2-12.el8_7.x86_64.rpm
7fa65109052fc759a641b02af8f0c62872d801f8cc7cc10cd78cf323bce336a0
libreoffice-langpack-dz-6.4.7.2-12.el8_7.x86_64.rpm
0fa381039a2d67ccd8c7b99b8a0e9a6d80cf3a683742a31366ff84b3584d863e
libreoffice-langpack-el-6.4.7.2-12.el8_7.x86_64.rpm
f835835d16e9840a1965d89fcc2866de00260d0dd60835c10e9cb17e6c5a85de
libreoffice-langpack-en-6.4.7.2-12.el8_7.x86_64.rpm
2ec84959ce5836675aa81ad37aca5d28b8aa1d6ff1221605d24b74f61fd0919b
libreoffice-langpack-es-6.4.7.2-12.el8_7.x86_64.rpm
34cb6e5d14a5d01f304ec9305da161db14d817c44cc03032235df8997dbf8d4e
libreoffice-langpack-et-6.4.7.2-12.el8_7.x86_64.rpm
9d067670e2d1e873b76164c19d4c64883c11ee6c84da0968bf28f3e59ead02cd
libreoffice-langpack-eu-6.4.7.2-12.el8_7.x86_64.rpm
5d1041d87c60aa7a925569fdade1d024b6eac454bc6f9a3289a3e659f6ffa5f3
libreoffice-langpack-fa-6.4.7.2-12.el8_7.x86_64.rpm
2daad575be18ab653d9c941c50f93e1ca3d0e58215b02b98a628639649be0ac1
libreoffice-langpack-fi-6.4.7.2-12.el8_7.x86_64.rpm
ec659e9d5b7e6cdba759a28a157f1c0df8daaefbd10e091097b73faaf7a6b3f9
libreoffice-langpack-fr-6.4.7.2-12.el8_7.x86_64.rpm
edd7b8db2de740f9f6cb4dd98582a662ffbad17c750ddac737d2e5c5e023db9f
libreoffice-langpack-ga-6.4.7.2-12.el8_7.x86_64.rpm
851999159c382c1b90712630287801476a7e9d263374523bb77f9cbf6fa81df2
libreoffice-langpack-gl-6.4.7.2-12.el8_7.x86_64.rpm
979da47e05ad699f615140ff8023ea06bf9111f9904f1293803dcf79b2d58384
libreoffice-langpack-gu-6.4.7.2-12.el8_7.x86_64.rpm
1c278eb3f5a666c5ab131a702ec45df4afca8ab843dc482f014a470a755da3ba
libreoffice-langpack-he-6.4.7.2-12.el8_7.x86_64.rpm
7a49ecc4b338b44bc9a1735c732fd235c27b44e7975501a176738d47ae5ecaec
libreoffice-langpack-hi-6.4.7.2-12.el8_7.x86_64.rpm
a8f1719030de272608a23246c6b570baec60ec9226eda53121be1837f7394775
libreoffice-langpack-hr-6.4.7.2-12.el8_7.x86_64.rpm
cf01d61302e7a2be6894af3ad56aeef65c0684f293ce33dc5b0299621b4a1928
libreoffice-langpack-hu-6.4.7.2-12.el8_7.x86_64.rpm
db1590dc81257b73a5ece23a5a1b5b0d84fbc04358c9f449e5ad6c163d0fe09c
libreoffice-langpack-id-6.4.7.2-12.el8_7.x86_64.rpm
d25e6f6b4cca141b5c095803714a386db9a3ff4dc7681ffeeb82510a42f313a1
libreoffice-langpack-it-6.4.7.2-12.el8_7.x86_64.rpm
c533b032b03631ad895b6b25a6ba2c4c80f2e2b9569f57f105c73bc01d4834ae
libreoffice-langpack-ja-6.4.7.2-12.el8_7.x86_64.rpm
f80e02f8ef9b9a2622f4331ddce869eed199bf9840bd883b356233c0a3d3d88b
libreoffice-langpack-kk-6.4.7.2-12.el8_7.x86_64.rpm
e8b0d4061c628d08444a9f5aa8b9335d04e5d5a9e2f7b38454e586f91e673ae5
libreoffice-langpack-kn-6.4.7.2-12.el8_7.x86_64.rpm
270d35513dd77f54c0d1ca36211595616122ff259ac05a2620a3f9925bb9aa13
libreoffice-langpack-ko-6.4.7.2-12.el8_7.x86_64.rpm
9283ba31d93a13b3f55377a470dc1de640fcd206c336eb5e519e51abb81f4cab
libreoffice-langpack-lt-6.4.7.2-12.el8_7.x86_64.rpm
0f7c47353e9ab31a8fb5458ba201ec9f94cd1011478fb367ccd68febf35eed3d
libreoffice-langpack-lv-6.4.7.2-12.el8_7.x86_64.rpm
7195b5abd97ca239e1d3864c82283abdd8e04881af0b3492ba1ef85cd19a7d54
libreoffice-langpack-mai-6.4.7.2-12.el8_7.x86_64.rpm
2fb567b2c0480151158ef5cc67f7ec04bf74400103609688f21c5622f7b97d7c
libreoffice-langpack-ml-6.4.7.2-12.el8_7.x86_64.rpm
7cc4b7f6788ebea37e668fe237832a8a66a6d442421edd8d6229d109d9ec7ae4
libreoffice-langpack-mr-6.4.7.2-12.el8_7.x86_64.rpm
91c115e543b49a5e78530f17c379e25b5cf9c78d7c93d9df2291e374d432a1b0
libreoffice-langpack-nb-6.4.7.2-12.el8_7.x86_64.rpm
581bd3d33b559812190568278625c2c39b4320d8d7fe74a85f01cb5eb87225f1
libreoffice-langpack-nl-6.4.7.2-12.el8_7.x86_64.rpm
20bdfb91d94dc101ec3d9bc2721ffbffd997fc9132119fa27db0b4ec06326769
libreoffice-langpack-nn-6.4.7.2-12.el8_7.x86_64.rpm
3016cb44ef0366306cb0078aac79e7f0a0c0206c575306c9008145d66ee95b80
libreoffice-langpack-nr-6.4.7.2-12.el8_7.x86_64.rpm
db77dc0b8ec143e88acdc36da1d1bbb9e4084170010e03e2bf58b79c9d29ed8b
libreoffice-langpack-nso-6.4.7.2-12.el8_7.x86_64.rpm
3155dd4c34722016ddd10eeafc9a24e81c1cb879e88b61c8223d3f4b84fdae96
libreoffice-langpack-or-6.4.7.2-12.el8_7.x86_64.rpm
f4a92984a0239b5b27e5668681ca50a0f49e356eff6f03432c30d07d4a277e97
libreoffice-langpack-pa-6.4.7.2-12.el8_7.x86_64.rpm
a76a68ec57ad97c6ac55c66508b85034731ff9ac6e4ddd68170c74eb1996abea
libreoffice-langpack-pl-6.4.7.2-12.el8_7.x86_64.rpm
0e3273e0b23351a66d89d1b92906ef57dfdd8eba202391c7c3a84de0ca41296b
libreoffice-langpack-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm
c26e0a1df1c5978da0157481215ac413a68f0e0b434334e79d3e87f050e98c56
libreoffice-langpack-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm
76f0e47cdb1a1a74d5bebf594514dab49d7df026e3a38fce97905f0845327560
libreoffice-langpack-ro-6.4.7.2-12.el8_7.x86_64.rpm
392226e87c926f15bccdc29363d14c5eddcdb85d266dbda11f36fd5e9432d5e1
libreoffice-langpack-ru-6.4.7.2-12.el8_7.x86_64.rpm
cd343cc7d2863559f675b94dbad89757e754d5461e82120d8175ea044ecf9e37
libreoffice-langpack-si-6.4.7.2-12.el8_7.x86_64.rpm
deed82170b53eded2a2aa0c1d60837f073643ec999000c7ce0adc765b3ef6d77
libreoffice-langpack-sk-6.4.7.2-12.el8_7.x86_64.rpm
ea1f596b1a278d77e25da670aaeb8216e7cd1b6292844e56fa9ab38d34a59882
libreoffice-langpack-sl-6.4.7.2-12.el8_7.x86_64.rpm
cc206c8173612f9bb5b535c3328b54306b4833937c6fafeb21b16eded49a7bf3
libreoffice-langpack-sr-6.4.7.2-12.el8_7.x86_64.rpm
b042a537c159401f41ef2e0126653ba8d024b6576dc51ea2a5be99b552591152
libreoffice-langpack-ss-6.4.7.2-12.el8_7.x86_64.rpm
314ab9d62b5f2ef1507ec47263b0814cea690d1d667e7a9fd475e651c2d469e3
libreoffice-langpack-st-6.4.7.2-12.el8_7.x86_64.rpm
19da6a8cae53dddf989aa0c8e80a6dc0cb984705171c1d3620fc7d1679f0ee4f
libreoffice-langpack-sv-6.4.7.2-12.el8_7.x86_64.rpm
be6a63714af0510293eb3948795f94187a9e00c3776a7c91d56ece689da948a6
libreoffice-langpack-ta-6.4.7.2-12.el8_7.x86_64.rpm
bae0263723972988cd74c2a2007794067ab952d28e0fd551388e3ba37d5ec795
libreoffice-langpack-te-6.4.7.2-12.el8_7.x86_64.rpm
0815ac0b02309c801410f56820727d1c28461270a2fd72912b3bae3012ebd403
libreoffice-langpack-th-6.4.7.2-12.el8_7.x86_64.rpm
5937680a0666d69f4da85e0191a0ea83c9d09a8ffe87eb37005bc985539326d1
libreoffice-langpack-tn-6.4.7.2-12.el8_7.x86_64.rpm
9b510f83317401bbdbc8c69e7f4da8f16ebff05609a43e39c3a6daa14d735d2b
libreoffice-langpack-tr-6.4.7.2-12.el8_7.x86_64.rpm
44df604dd9e2db643afbdd09cadb46e467e4d5590ca7093c36649c1905c61a1a
libreoffice-langpack-ts-6.4.7.2-12.el8_7.x86_64.rpm
16bf5c549b119d19cc564f05ab68486ca081f0e9aaa4532055464e65c079d30a
libreoffice-langpack-uk-6.4.7.2-12.el8_7.x86_64.rpm
c3bef6a2f758a0d5699fc0be420705186cdbdf81b168b067233ec51269083c24
libreoffice-langpack-ve-6.4.7.2-12.el8_7.x86_64.rpm
23f86455843a306a63e0a33bd3bb1507ca273020fbeecb9773f20d891a0c4576
libreoffice-langpack-xh-6.4.7.2-12.el8_7.x86_64.rpm
692659385202977ef41b5fcbac8e5a15d08f171857881e4b7e705c96a932034c
libreoffice-langpack-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm
a1ebd7b525df5d4a043a61559927f8395f2b3d0787e939a1017fa08fb851ea92
libreoffice-langpack-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm
1bae9af8241b3121500874b11585917219e7e869436d1812a188c5bc31d7177c
libreoffice-langpack-zu-6.4.7.2-12.el8_7.x86_64.rpm
ba355fe119f5c58816bcf23497b6641c519847deafc51a29cd896b5768abefd0
libreoffice-math-6.4.7.2-12.el8_7.x86_64.rpm
f37a4dbcdf9be4062d951074c8f4c7e1b225db426320fbb23b2eb79d8e09d21e
libreoffice-ogltrans-6.4.7.2-12.el8_7.x86_64.rpm
877458794cb0df1f0fb61d3ad42a0438f7598474b1203d1fd62e1ddb55983fb6
libreoffice-opensymbol-fonts-6.4.7.2-12.el8_7.noarch.rpm
a23e251ac634daab48bc8affc4b2f86afebcb56cd8669ebccbc0138a8977023f
libreoffice-pdfimport-6.4.7.2-12.el8_7.x86_64.rpm
3275b3a571322c4ec901e81348a05f9a2904d493752cf9362c1c2c5bec3051db
libreoffice-pyuno-6.4.7.2-12.el8_7.x86_64.rpm
f21111acc9a9675d026cb4b0f9de7c61626e41263ae84dcacb261213fcb15e64
libreoffice-ure-6.4.7.2-12.el8_7.x86_64.rpm
5d5a232e7d047d4916fff8f25dcd7eb1e006f67ab3dce3360cb13b3bf0176884
libreoffice-ure-common-6.4.7.2-12.el8_7.noarch.rpm
2fbcb645e02e306e13308bedee3b63ee75c65750ae227d02a2fec1bb95120bb8
libreoffice-wiki-publisher-6.4.7.2-12.el8_7.x86_64.rpm
9e7273ad2d9312b23c505ab5a5012b56a6dfde9950999f0c3b5ee648644072a9
libreoffice-writer-6.4.7.2-12.el8_7.x86_64.rpm
85547a305424608f8050c5276bd51f33c6e06cb67a288d36d1296d3475c2fd76
libreoffice-x11-6.4.7.2-12.el8_7.x86_64.rpm
cf0552c2b966545f00c5731c45675c250650b86e64e0ada61e86610347dabeb5
libreoffice-xsltfilter-6.4.7.2-12.el8_7.x86_64.rpm
690cb561854811ecb4df05a9e2ba6100eb826f141cd9f32b5fce436b914b1a43
RLBA-2023:0091
idm:client and idm:DL1 bug fix and enhancement update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035)
* Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050)
* vault interoperability with older Rocky Linux systems is broken (BZ#2148255)
* rpm -v ipa-selinux produces warning (BZ#2150243)
* ipa-client-install does not maintain server affinity during installation (BZ#2150246)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035)
* Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050)
* vault interoperability with older Rocky Linux systems is broken (BZ#2148255)
* rpm -v ipa-selinux produces warning (BZ#2150243)
* ipa-client-install does not maintain server affinity during installation (BZ#2150246)
rocky-linux-8-x86-64-appstream-rpms__idm
bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm
615d759274eb3f3f8c28657012cfec65b67d8a47fbf38b897955cec7bdde1495
custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce
ipa-client-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
b08c20bbe1ddb56b9a845e76ca57d91289061d67f2956ea7ee44fa3891564691
ipa-client-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
87209f819bc410977be2fa83c5f0c9910664df40eb1aec1e65ba0e418d102d47
ipa-client-epn-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
d4104096325d2375fab854ab7c562dd7613429b1c06608829bbf3322d63930c5
ipa-client-samba-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
62e6bb5cf85e591fa9fef34727767c0d6797b68424c1df291a4e318683d7486c
ipa-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
b496333e37ebefa19ca28f1b164a48520fc238fd40d1c7018ad7b47a6c456e72
ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm
e273335ad4d42c167d380d2367e199f7b7df5b251a42c3fea602770a842f11d2
ipa-python-compat-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
d80c8881358e6d76f7ad4e1f4d76d8553951cd1c897b87baa0d5d2c3bc8e5875
ipa-selinux-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
56fe377a8c0e3f967d3c9e1d83ce2dded61834b1fd1775151b2e21cced39ee1f
ipa-server-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
e4104c83e28300dd34f62a6690fa552cc6ad508ae449b8fd903612c566f1cff7
ipa-server-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
5191bd7ac871cd910d283a40e4fcfaf91798c1c57735e0e590e3e4eb175b4038
ipa-server-dns-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
9f41755796d71148e825ac0b799bb2f49d4ca25954bcfcce7246ea03fa8e8307
ipa-server-trust-ad-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
f1263ee2cc3474f99aaf58d505cdb4fed7528bf191c4536c0d4f8c95b8825ab6
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm
24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3
python3-ipaclient-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
b580f064a347e161cb2311b81d764f0ed89c565ff596e28b749d3000e8c7569e
python3-ipalib-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
7c780868b2fa76e2ae544cead2fb817bf49cc11de7411cfa31677e30ff8edd9d
python3-ipaserver-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
7849ebb2a2aba9c753b23802e8b6d0941bb899261761909ecd33df6e1549ee4e
python3-ipatests-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm
e970ca6b367982e7a0a22590564f05ca9f640fc2148d1afcca14f16055038d90
python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpm
614fd471d5b1912f23791f8b533172d92d1c6b27d504b4a900180f83d7e8c37f
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm
c5f6dfd01f04862214fa2f092a4574889d903e9a081cae92ead60cc020557baf
python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535
python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm
3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0
python3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm
94698890dc8f5935b11ac8d3e2cd070ed0095cbff39670a6a09638b03045452a
slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm
b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2023:0093
gnome-settings-daemon bug fix and enhancement update
The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings.
Bug Fix(es) and Enhancement(s):
* Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-settings-daemon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings.
Bug Fix(es) and Enhancement(s):
* Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962)
rocky-linux-8-x86-64-appstream-rpms
gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm
12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94
RLBA-2023:0092
fapolicyd bug fix and enhancement update
The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system.
Bug Fix(es) and Enhancement(s).
* statically linked app can execute untrusted app (BZ#2137251)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system.
Bug Fix(es) and Enhancement(s).
* statically linked app can execute untrusted app (BZ#2137251)
rocky-linux-8-x86-64-appstream-rpms
fapolicyd-selinux-1.1.3-8.el8_7.1.noarch.rpm
abcda5f83019703a5b94424fc5d890f8738ff16df740b7dd445d2b9301485dfb
fapolicyd-1.1.3-8.el8_7.1.x86_64.rpm
df7e09dfb8ada037f0b86b5514bc92c5160a6005016fb8f7c293e1960f071ef1
RLSA-2023:0095
Moderate: libtiff security update
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)
* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)
* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libtiff-4.0.9-26.el8_7.x86_64.rpm
731d996009cf80a502bbdfbbe30647ef6e0bfbdd3f66554f9f48181308f6f50a
libtiff-devel-4.0.9-26.el8_7.x86_64.rpm
25376cf67f42de475ae2ef2dcd44e7f27195cd1da1bf8e87927cec11f2a04fb0
RLSA-2023:0099
Moderate: virt:rhel and virt-devel:rhel security and bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for
Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages
which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176)
* VMs hung on vnc_clipboard_send (BZ#2148504)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for
Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages
which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176)
* VMs hung on vnc_clipboard_send (BZ#2148504)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f
libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45
libguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
4456694874c9d7346f28a9f1afa1a3456df30b16304fe183ff42190cd9e708c6
libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f
libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd
libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f
libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645
libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
3c9d51c249abda39f7eb4c3a9e7aec28fd90a7bbebcade157e9bae228e0c99fc
libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0
libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b
libguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
0c1afa84a2ce7357193c0eae89c65ce30a9e143e7ead6c774c16371f58da4ea4
libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
e6cafc935323470c7f0fa1156693ff1fb9816931387cebcfc33057f1f535fee8
libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
f45396ca362fd4fc35b9f14babd32cfaea1321a6417308a1292f44d1224898f2
libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea
libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100
libguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm
5d5c05f7f8470a00208277eb34687306aab70af2ce1bd57ac78528e631505f59
libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm
b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52
libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0
libvirt-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
b9ef5d92b48763563bed303770260432928ebcf2644488ae404bb74cc990a15d
libvirt-client-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
ce89204be0bd94f46016523a96a5b389b42edfb1f04ef2ba1689bb05a5f911a6
libvirt-daemon-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3c2ee70a5dfdfafc14132ab8c1da3137cd2c36a4b283e33cfcba41a4c8a924dd
libvirt-daemon-config-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3bbec6e9b75d574eddd90a32fe68cf134e78eac5bf68d3bba1d7403da60fc624
libvirt-daemon-config-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
7467b42dd7c33d8cdeeb8a170c514ac0fdf35eebd3ab435926003cdcdbf60df8
libvirt-daemon-driver-interface-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
25787b85f42279a7a61c2267e81f2232668dbdecf49cbb5c4d70b8a96bf39d54
libvirt-daemon-driver-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3b6628a226e05e3c523bc8339df005e46743aa3c6763f8155b6160f5e91aa166
libvirt-daemon-driver-nodedev-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
ec35ee6d270ef5590cbc5be2742753e2e6ed38a55d2b41a1abb8473d8ae89682
libvirt-daemon-driver-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3c311b6cbc8d7d7b0be31e792b5c7bb93abd77cd7b997004d28b7d96b73680ac
libvirt-daemon-driver-qemu-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
5b20d7d9542e3cd825eb9fdceae64234fdbfe6f62a2b53876f10a7e5ccbdd361
libvirt-daemon-driver-secret-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
623bd9705a5d7e75633710957002c53e941cc33728959c4d4a8f948173e8108f
libvirt-daemon-driver-storage-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
b8a434b2b8ff4852d9cdde198f94ec1543a2c667dbd6ad597982940f20855f0b
libvirt-daemon-driver-storage-core-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
68f20d69d3aff90fcdd916be2fcd9610030bd42c906f481df249e3e6a42fe8a6
libvirt-daemon-driver-storage-disk-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
fe835c82f15c31348503730b4b4e57b85829152e9c0d8b58dc2a48231b4c942f
libvirt-daemon-driver-storage-gluster-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
add36e2a88b056a3fe1ca77c9da9f8029962bd7179cb5e138c02e097697d9c89
libvirt-daemon-driver-storage-iscsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
9186d8c082047bbfa659071f508a90374ca06563ff98973a89659630d4c44d2e
libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
fee3b3f22d8c449e4e8e4f319a8f167af737d249942f18b380838caec7e14351
libvirt-daemon-driver-storage-logical-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
e36dcf2ac32139fe7c3ac8b3fb23d3bfa0cecddf1c6be2bf5b35675964d1038f
libvirt-daemon-driver-storage-mpath-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
b4894c09aa627a04ace291333e127be2c75f3b31973dfd587cb3782543176b9f
libvirt-daemon-driver-storage-rbd-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
a7c64cd57ef47df61152c1c9993f16452b532e64f81ca56d95b872546cac88a4
libvirt-daemon-driver-storage-scsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
d8875d26478fbcea076efa4e89d4f75af2d3f086608613e9f13984c3fd3b6beb
libvirt-daemon-kvm-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3c1c5073aae25e492ab9f6421542564e1dc6b52bb005d39a865e39695355476b
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
libvirt-devel-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
69d009e43bf2e2c7c755d75a87e473493860fac49398b681c245fe4f9681cd9b
libvirt-docs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
663c0e30efd09e486901471d7d97cd20e7bc3e247e31a12b50628c52ed3719da
libvirt-libs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
718445c64a09e6ac9c9212279808804c8a25a2b826f130e9baf9c4c8a40f6928
libvirt-lock-sanlock-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
136bb6f44e439667a04e2ab2748e53990861904b2c7ad6dc2d0686a24af9bb63
libvirt-nss-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
88f45182a3be869343f5dbe202488c5b25250b5f9ff44755a152877868175cd2
libvirt-wireshark-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
1a86899f54ca4946dc2aeca213014b6bfb7549e1fbda3bf63aaacce2c38da254
lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm
eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776
qemu-guest-agent-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
3e138b0caef20c972d92060520af3b08a1518c82f5ca8b17b3f5b7b471570d43
qemu-img-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
651d72ca540d04b24dc11018280dd00e4c031b45375b309bd428f0232f29332b
qemu-kvm-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
17c16353ba08ac5c95435a0a2ab3f9b810f1527f9cfed3b4a2a6eeb3fae7d723
qemu-kvm-block-curl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
98c6b056792d932a19c11652131dafe24b0d08c2d97554b884bab625769dc9f1
qemu-kvm-block-gluster-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
f7042d9588143e625436adc1f3816824ac1789a702f9cc616b22eba51a56b6ea
qemu-kvm-block-iscsi-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
a722b24823c0f1b17b36541665e27dc84baad2c510014626ff634e47bea3b649
qemu-kvm-block-rbd-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
e9c4de50d97764c921d79310ff6424d158c9c36434e7c49c374b1792a7327198
qemu-kvm-block-ssh-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
82cfea9ba87ec3e13349e52154a44f554f40091a06d56dd80dfe70f41a9aef51
qemu-kvm-common-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
b326ed3e1cfdb993752f5e44abc7d0a49d45cc4184ae6a8a78a513195457a3b4
qemu-kvm-core-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
fd293f5bac296f23c3f05498709c2b157829277249d99d12bc2dbd981da1b9bb
qemu-kvm-docs-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
bab4c84407fd9367dfe99eb8c738315d880e57cdea467a03bd6c8774cb5f190e
qemu-kvm-hw-usbredir-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
893ce35525c4fb2096c4e55ac749b5e5d90a608c8399b126b0b123dbfd3fbe83
qemu-kvm-ui-opengl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
ba95df516f1a674f91291cd9bacea148e341b71ad4d3edec266f8dbbd17b3b9d
qemu-kvm-ui-spice-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
06cdca54b6dc044056cb4b127704eeffefdf5264eedd57e6c89812f339756088
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada
supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70
supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b
swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838
swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf
swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe
swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9
swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c
virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4
RLBA-2023:0102
nmstate bug fix and enhancement update
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* nmstate verificationError on OpenshiftSDN (BZ#2128555)
* kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698)
* Addresses configured at different order than specified at state (BZ#2149048)
* fail to create many veth interfaces (BZ#2150705)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nmstate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* nmstate verificationError on OpenshiftSDN (BZ#2128555)
* kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698)
* Addresses configured at different order than specified at state (BZ#2149048)
* fail to create many veth interfaces (BZ#2150705)
rocky-linux-8-x86-64-appstream-rpms
nmstate-1.3.3-4.el8_7.x86_64.rpm
9963e8fdf78582885c9e319141a036c2be07928e6fa6fb28aa3fafe17ea0fda6
nmstate-libs-1.3.3-4.el8_7.x86_64.rpm
b5fff4e8d7d1b685e45fc80c8ca93c92e1a1a469c94f58e707044b71ad0f8fab
nmstate-plugin-ovsdb-1.3.3-4.el8_7.noarch.rpm
bed1142dcd60f7ef45d0a97b62b1bb15d781e1e6b42dc491ab045940156529fa
python3-libnmstate-1.3.3-4.el8_7.noarch.rpm
7086da0fa75e219045f9601ad661b7d75c84fac7527009e8be80d58d41b0ffab
RLSA-2023:0113
Moderate: postgresql:10 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for postgresql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgresql-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
b5778e3c960ecbf1c282ae148a86bfeb5a8f7703cbb13259a35734462e5154f0
postgresql-contrib-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
312cce0ec240fd7f0cf098d08c895c5d07e85d3d503acce17782878be5f0b533
postgresql-docs-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
9573d11bb8b959f146b64a9e99357def762484c8db8863e2c5db2cdcd2b59ab6
postgresql-plperl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
8824a8921b5af548c5bba5be9934a9bdda71a115ef6f2e29b40db5dfb9733cf7
postgresql-plpython3-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
2d7b8151757f6b5457e7abed902a33208f721b8e109592daabeab886094c796b
postgresql-pltcl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
a169e67733e21d3c80e7fca6a54ac834ec2b89cd37a4c4681f92c9e67660d860
postgresql-server-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
67d43533117445da9b60e89fb6e107491d9d3948bb6280032cea8a8097bd7e46
postgresql-server-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
bb1d784e73d49c3aa92583d77247412b2002d6bea658258db9fc8471cbd2542d
postgresql-static-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
360192b1246b3462f2c05b04991a80ca8b16e1a736b3e672e5ecae64f7e44168
postgresql-test-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
37fff25b576ac9319660475eb135c592f227c4fbe1ea142cf59f497d46d03efd
postgresql-test-rpm-macros-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
736329addee977b43c340be5e022888d76f657f36187ee6671446e8ea27f32f0
postgresql-upgrade-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
37cdc4fb9262b144f50b09476d2650147bbcdca92b540b55359e5b00ead4f660
postgresql-upgrade-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
577e4c656a2c95372939bfe9b2e0902a17a5ec2e8e1a12d40ddd84947e680398
RLBA-2023:0115
container-tools:rhel8 bug fix and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es) and Enhancement(s):
* [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294)
* The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171)
* FailingStreak is not reset to 0 when the container starts again. (BZ#2149775)
* SIGSEGV: segmentation violation on s390x (BZ#2150416)
* SIGSEGV: segmentation violation on s390x (BZ#2150428)
* buildah: ubi8 sticky bit removed from /tmp (BZ#2152017)
* podman: ubi8 sticky bit removed from /tmp (BZ#2152027)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041)
* podman gating test issues in Rocky Linux8.7 (BZ#2154403)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es) and Enhancement(s):
* [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294)
* The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171)
* FailingStreak is not reset to 0 when the container starts again. (BZ#2149775)
* SIGSEGV: segmentation violation on s390x (BZ#2150416)
* SIGSEGV: segmentation violation on s390x (BZ#2150428)
* buildah: ubi8 sticky bit removed from /tmp (BZ#2152017)
* podman: ubi8 sticky bit removed from /tmp (BZ#2152027)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041)
* podman gating test issues in Rocky Linux8.7 (BZ#2154403)
rocky-linux-8-x86-64-appstream-rpms__container-tools
aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d33e11f32b7ca8bb1ab9de7144786d8b949b688760adc1785e2fe70d5f39168a
buildah-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpm
9f0c8864b500eadd5916215775f4378bbad990f39cda2b4247d11721b0db555d
buildah-tests-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpm
457b0e8e2753f67ab411239d353bfb70f9cbe5ff92064182824159d43231bebd
cockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm
2b6ec4da8b57643e010868c767fe370c537f59dae20ec5459864a53d026a8aed
conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
containers-common-1-44.module+el8.7.0+1122+04a7498b.x86_64.rpm
6354760e20840a090eec3a3222a796c67849c5fe6910c3fda36aafedb764f763
container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm
6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
119f90778569a22466b4a90fa278b1af63d137005aaf3aa5945f28a5514bec92
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
podman-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
74f931fd657a10723ac15ef27d2397fd89faca721ad7fe60c194623d8a199c84
podman-catatonit-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
9e61420bc7d316ea9a7177590cb1c40f1cefeef5a32867bf5f3efc68f5b78bc9
podman-docker-4.2.0-6.module+el8.7.0+1122+04a7498b.noarch.rpm
a62b5178722e0eafc533c22556109a27b4112c027f6c36c519ca214d068b30f8
podman-gvproxy-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
83da4ead1d4252fa4e7a371dcfe027d2c9238e66df135ba4e4085660f990a9c0
podman-plugins-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
b960dcc969cd8fbdc34056dab7aaaa0c952f6e1276b4320a5fac779f7f76bb9d
podman-remote-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
17133a616cd92572e037cffb207203389c6dae38052742912719b1c678834dbf
podman-tests-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
71ec468e01f86958f0ea70ce32eb9b514c56b445b8a0ef370fc4817aa1c66fa1
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
python3-podman-4.2.1-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm
2b696d0f504dd20e219ec48da145b4324efcc4ee393ebd32de98cd14f7aba3d9
runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856
skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
b2dbacf676bb36b7d618c125bba63b03b16206500f903f8ce4b76e368f16dd26
skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
8d4dda0fee2dc95c05a961422237e3ab97a7f32f0371cd7dc91c447a09ce5b0e
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm
0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b
RLBA-2023:0117
virt-who bug fix and enhancement update
The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate.
Bug Fix(es) and Enhancement(s):
* virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124812)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-who.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate.
Bug Fix(es) and Enhancement(s):
* virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124812)
rocky-linux-8-x86-64-appstream-rpms
virt-who-1.30.12-3.el8_7.noarch.rpm
6742c5b921bd198cb398e575a267d856ce18f5d8a20669a08474a676542ba175
RLBA-2023:0118
gcc-toolset-12-gcc bug fix update
GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix:
* __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131)
For more information about usage, see Using GCC Toolset linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix:
* __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131)
For more information about usage, see Using GCC Toolset linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-gcc-gfortran-12.1.1-3.4.el8_7.x86_64.rpm
03e13ea95319e3d645ea2f2775cc0ccea2621e466ff5c74dc010e167a98048ff
gcc-toolset-12-libquadmath-devel-12.1.1-3.4.el8_7.x86_64.rpm
338c60ca232485761495e5da958d652b5330b1ccd65d3e261b5cdc9f5762fce1
gcc-toolset-12-libstdc++-devel-12.1.1-3.4.el8_7.x86_64.rpm
ee54399f0565380b7b194f11584e5d6ebdd7101e200810af5c47bade1dc57be3
gcc-toolset-12-gcc-12.1.1-3.4.el8_7.x86_64.rpm
9b5f7a5010bc4cb9dabfa48d27f209c3f6e963269738c66b6f08326099b0b2b2
gcc-toolset-12-gcc-c++-12.1.1-3.4.el8_7.x86_64.rpm
781f245ccae0add23839d4278b321cf5b9d0ae2e5b331bb91855c52aa1947ca9
gcc-toolset-12-gcc-plugin-devel-12.1.1-3.4.el8_7.x86_64.rpm
2baf7899cb43579f8e5cb74f042fae21115f7efc0b92d5299d67139aa34d7f85
gcc-toolset-12-libasan-devel-12.1.1-3.4.el8_7.x86_64.rpm
a586e52094f104dc0a73fecf7e362f0ac2ac152cf6ebddffc4fda259e67caee4
gcc-toolset-12-libatomic-devel-12.1.1-3.4.el8_7.x86_64.rpm
66c0661ce6dba20c42cb9fa1cf04c1822b105a5b7d6ff0f6df06d2c4b617c397
gcc-toolset-12-libgccjit-12.1.1-3.4.el8_7.x86_64.rpm
9d16c50238884ed4b02b99e704d75852304956efd5727bb61c37336de641c021
gcc-toolset-12-libgccjit-devel-12.1.1-3.4.el8_7.x86_64.rpm
41b25f295df072de2e028e63b8f80b0988197a44b02f7c977384f8f1ac902c74
gcc-toolset-12-libgccjit-docs-12.1.1-3.4.el8_7.x86_64.rpm
76c1ec66d911cfa17ec5fa210e59646b66681be32b85f704b1a1bd36d341aa3d
gcc-toolset-12-libitm-devel-12.1.1-3.4.el8_7.x86_64.rpm
9801969984b980d98355a12aa4f3ac935473f916ebaaba28e876b9d499a10aa9
gcc-toolset-12-liblsan-devel-12.1.1-3.4.el8_7.x86_64.rpm
d09572b0ab246d1b0e908639d8499c93b9e5c75f4c6918829cdc4c927fdb074b
gcc-toolset-12-libstdc++-docs-12.1.1-3.4.el8_7.x86_64.rpm
4042323654ab887b49ad764815f849518606ab569f15867dd48761efeae307c7
gcc-toolset-12-libtsan-devel-12.1.1-3.4.el8_7.x86_64.rpm
6a1892832e34258a7f2d07f12f091240d29e0ed1eee3a433d738f8a4ca43e005
gcc-toolset-12-libubsan-devel-12.1.1-3.4.el8_7.x86_64.rpm
ef5b84a88e6a7c18168f2e18e87c4d42a142826522d4e84f422fa7f8528e887e
gcc-toolset-12-offload-nvptx-12.1.1-3.4.el8_7.x86_64.rpm
f66d3ad97d0c2fd035b402ab9e21022acf0564d0f18dfb5591ad39d6ca369bb4
libasan8-12.1.1-3.4.el8_7.x86_64.rpm
307361224e4fb47633ef6951e403bd7c322357d3065bfada304232c528b02c74
libtsan2-12.1.1-3.4.el8_7.x86_64.rpm
a8195ff5331c531630c0fb049bdd7f2a741caefa72995441f20c09490e3eea79
RLBA-2023:0119
tigervnc bug fix and enhancement update
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Bug Fix(es) and Enhancement(s):
* x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tigervnc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Bug Fix(es) and Enhancement(s):
* x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915)
rocky-linux-8-x86-64-appstream-rpms
tigervnc-server-1.12.0-8.el8_7.x86_64.rpm
cf3ab5e942cc1a5e393cd9e5acc1d0e8ed1397ff53ef65b75081e509de13b400
tigervnc-1.12.0-8.el8_7.x86_64.rpm
ff93f0dcd4015fd3f3006b4acb04bd9a67b5a63a1131811eb98155fe8010cc68
tigervnc-icons-1.12.0-8.el8_7.noarch.rpm
b48a3f840827e234acbfed0abb08ad08a13cecab1183f3522f442cb6387a1ef8
tigervnc-license-1.12.0-8.el8_7.noarch.rpm
1e5413dc3b70ecc8c912f59c64120131619ce041aab3322a3bde31acedf58b27
tigervnc-selinux-1.12.0-8.el8_7.noarch.rpm
5c869e831f1586662bd5d95602fda5a00a9f83da96ee9fd1327494a391c8c724
tigervnc-server-minimal-1.12.0-8.el8_7.x86_64.rpm
a28d235028fbb8d31fc91e6e498973f686176edfabd61b2f47094464c7e042a7
tigervnc-server-module-1.12.0-8.el8_7.x86_64.rpm
27655616e55c29e91a07a8bc0fa7fd8d77df71f03c1232ca7dc95cf1ebd0c267
RLBA-2023:0122
ansible-core bug fix and enhancement update
Use python re to parse service output instead of grep
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ansible-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Use python re to parse service output instead of grep
rocky-linux-8-x86-64-appstream-rpms
ansible-core-2.13.3-2.el8_7.x86_64.rpm
acab7391f2aa87d836824ce414bb373fb1bcfe619db49a8976f24c74e4a988b6
ansible-test-2.13.3-2.el8_7.x86_64.rpm
bea3cd7956329c0cf0e6cb9a4a588d1a50d1d838a73e86bae4b2ba1281ded275
RLBA-2023:0125
sysstat bug fix and enhancement update
The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity.
Bug Fix(es) and Enhancement(s):
* There is no option `sadc -f` in sysstat. (BZ#2153422)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sysstat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity.
Bug Fix(es) and Enhancement(s):
* There is no option `sadc -f` in sysstat. (BZ#2153422)
rocky-linux-8-x86-64-appstream-rpms
sysstat-11.7.3-7.el8_7.1.x86_64.rpm
d210af3b0b24e1bf4fc87bb15608fe57d20a25ab637e8d0864e4754ec7e9bc54
RLBA-2023:0126
hyperv-daemons bug fix update
The hyperv-daemons packages provide a suite of daemons that are needed when a
Rocky Linux guest is running on Microsoft Hyper-V.
Bug fix:
* Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hyperv-daemons.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The hyperv-daemons packages provide a suite of daemons that are needed when a
Rocky Linux guest is running on Microsoft Hyper-V.
Bug fix:
* Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255)
rocky-linux-8-x86-64-appstream-rpms
hyperv-daemons-0-0.34.20180415git.el8_7.x86_64.rpm
b91f33dc859fed5149f7b43190a8faa33098b35a50f6c5b132f836f261dceea0
hyperv-daemons-license-0-0.34.20180415git.el8_7.noarch.rpm
812a72780a3d0fc19c399dbaee8b875bd908e69ed8baf4e0be87b822d97f50bd
hypervfcopyd-0-0.34.20180415git.el8_7.x86_64.rpm
ca77af9b558f062a22f512e0ed57c043f3f00e20980dcfd13165d6ee8f23458d
hypervkvpd-0-0.34.20180415git.el8_7.x86_64.rpm
61994e50a0a399493965113fcfa8751c50af20eb85daa469a447ac7de4a598f4
hyperv-tools-0-0.34.20180415git.el8_7.noarch.rpm
c3162949f7f1502cb6fa41f01885ae317db7b864c5b9fdff0436454bc2430d69
hypervvssd-0-0.34.20180415git.el8_7.x86_64.rpm
2224846553a41b8b982cec8989b766d76875fc6cc4b0c6186becd0f71b406bdc
RLSA-2023:0171
Important: dpdk security update
The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.
Security Fix(es):
* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dpdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.
Security Fix(es):
* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
dpdk-21.11-2.el8_7.x86_64.rpm
22ca5300970c260c52b0ac7bbb1867cbba7b37cfacc18d0345188740cf1486a9
dpdk-devel-21.11-2.el8_7.x86_64.rpm
669089120d28a19848e177ff43b5195e44a34fcb44ff8fd94a61c121366f2278
dpdk-doc-21.11-2.el8_7.noarch.rpm
3e9b40443c42f8992bdc96064f4d90af5dc0e936e6ac17eddb4f385a855311c0
dpdk-tools-21.11-2.el8_7.x86_64.rpm
d7744abc8e0a9411d5f0356a5d727b4d04e7644d7e37e524e03c92d676eabf7e
RLSA-2023:0192
Moderate: java-17-openjdk security and bug fix update
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010)
rocky-linux-8-x86-64-appstream-rpms
java-17-openjdk-17.0.6.0.10-3.el8_7.x86_64.rpm
e9e7771e03089060558746cbba588207ae8eb9cc34e47e325025055dc20fc931
java-17-openjdk-demo-17.0.6.0.10-3.el8_7.x86_64.rpm
56ecebee6f99d42d0e8387ea87d0d09981712b6709aed998190cc8bc3b9d3c86
java-17-openjdk-devel-17.0.6.0.10-3.el8_7.x86_64.rpm
04cf59b2a2441495ca5d0f4076bb9cc7b5891649361009470aa723efcd58174d
java-17-openjdk-headless-17.0.6.0.10-3.el8_7.x86_64.rpm
74bb8ea1814f2a4229c0720451f2f21cf0c82e14ad5edae44b223dc42ee63b0b
java-17-openjdk-javadoc-17.0.6.0.10-3.el8_7.x86_64.rpm
6c6b0e7c4e618fb98c586eee72ef86342a6570e01776db4fcea08267afad09a2
java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el8_7.x86_64.rpm
1d269804aa7f62145a3591d94dfc51416a3776e123868e1e0cf26671965f99af
java-17-openjdk-jmods-17.0.6.0.10-3.el8_7.x86_64.rpm
116c46fa6b3ab8119f821a2051d1d261baec9e2f69fc04d5b6706f8ad5a6ee2b
java-17-openjdk-src-17.0.6.0.10-3.el8_7.x86_64.rpm
66123b657e97f8e17488451422f7665b99684c4c7fac04d453b90f99d36e485a
java-17-openjdk-static-libs-17.0.6.0.10-3.el8_7.x86_64.rpm
a50a6f999802c4e741f2b8a2e0387de74a5dc76f1fcfe70abced24fe988b7cee
RLSA-2023:0200
Moderate: java-11-openjdk security and bug fix update
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797)
rocky-linux-8-x86-64-appstream-rpms
java-11-openjdk-11.0.18.0.10-2.el8_7.x86_64.rpm
18caaa5e464fc13acdb83da92d7c3b53e8db27105452dd287ca7e09e19fe73ac
java-11-openjdk-demo-11.0.18.0.10-2.el8_7.x86_64.rpm
707064838c229e1146437aa01c8c3ccfed3f8d69b0d25a27f268cab3c08e4c3e
java-11-openjdk-devel-11.0.18.0.10-2.el8_7.x86_64.rpm
fda01db703e1d2bd2ed4aea3246fffde8fe63cda80f7721463e2f408cebd765c
java-11-openjdk-headless-11.0.18.0.10-2.el8_7.x86_64.rpm
54403a144e1cab8e5928f3737dcf8a0a4bd030b13e533c6e40c1a34cb355b1fe
java-11-openjdk-javadoc-11.0.18.0.10-2.el8_7.x86_64.rpm
0e874d5fb7bd8dab939a6d1aaecb4fd1b19be7bd04db32a0dbdef2f891f3ffb5
java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el8_7.x86_64.rpm
73c7ec6923bedeb6894a69ed0d6c0b2aeab5491140cee92596c1101f1a88e661
java-11-openjdk-jmods-11.0.18.0.10-2.el8_7.x86_64.rpm
be5f0e58cf493c61ce58e2bb1bfa51e602d9eb28dd93a40bc1e8e448a5ce9dc1
java-11-openjdk-src-11.0.18.0.10-2.el8_7.x86_64.rpm
7ba5c173af6b4e35d477dc83f7807c4edd9bf0e7955ba4c08add6361c69ebd36
java-11-openjdk-static-libs-11.0.18.0.10-2.el8_7.x86_64.rpm
a649cac5b71ff161fc487f3d548fa87d8b4d4fdc52f6408f04c222b9214dde86
RLSA-2023:0288
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.7.0 ESR.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.7.0 ESR.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.7.0-1.el8_7.x86_64.rpm
12dca0ca292da0d77916e0a6f49faa74bf5100d6cbc63ea1d71d0a6c8d00e4d0
RLSA-2023:0379
Important: libXpm security update
X.Org X11 libXpm runtime library.
Security Fix(es):
* libXpm: compression commands depend on $PATH (CVE-2022-4883)
* libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)
* libXpm: Infinite loop on unclosed comments (CVE-2022-46285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libXpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org X11 libXpm runtime library.
Security Fix(es):
* libXpm: compression commands depend on $PATH (CVE-2022-4883)
* libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)
* libXpm: Infinite loop on unclosed comments (CVE-2022-46285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libXpm-3.5.12-9.el8_7.x86_64.rpm
ab919e52846cb18cae305efedecf9d19fc6b679f6ccf024467ca77f763bd289c
libXpm-devel-3.5.12-9.el8_7.x86_64.rpm
f8bb3f4c75ef5a7e0d73e6d9774990eef9da575028c0e36cdcad25389c127c96
RLSA-2023:0446
Moderate: go-toolset:rhel8 security and bug fix update
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Internal linking fails on ppc64le (BZ#2144545)
* crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for delve, golang, go-toolset.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Internal linking fails on ppc64le (BZ#2144545)
* crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313)
rocky-linux-8-x86-64-appstream-rpms__go-toolset
delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
be45db0ede57b9a9918c621811a3aaffb944f36ae3770ac645652983d9c3e4a7
golang-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
8603fffe30255d5b874e1ace361b73ff274824c1be47c5464935479de82601eb
golang-bin-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
cfb35da59fa55edb3068ce3421338462b997fb411f465feeb7911c2bab26eb24
golang-docs-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm
9e547f95eec6ffd22d9b5d3228f79071a73669ae38504dd6a88f6cf535034def
golang-misc-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm
98ab11139193f6c3d5450fdd71d42f292d2c89654fcea60960fcd8ebd1ab0ad4
golang-race-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
2368396421ed2c5be2dd5c94f8ab071b2422e9602e160ed5c0982611f5938b05
golang-src-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm
5e065b3f60812a5dcc497c556258037b1ccec24238c81cf11e4e1c14a7ffc084
golang-tests-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm
1dd2f5d01b4577af7d7090cd308dd1d8b1e58470fdffd801f4b84ec5b5ea96d6
go-toolset-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
6e6d2cb6025b922df55b69d54f8b40a5881b26e5c467f75f896e3bf93165e6d7
RLSA-2023:0463
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.7.1-1.el8_7.x86_64.rpm
fe994e04fe4e95089fae7ddca1706ebccc59912375901c75c119d626178200ca
RLBA-2020:4718
aide bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for aide.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
aide-0.16-14.el8_5.1.x86_64.rpm
cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa
RLBA-2021:1808
clevis bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for clevis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
clevis-15-11.el8.x86_64.rpm
7b1661586fc311cdbc1e9f476968c2dde04253a852c5f527d9d2435114d1eb11
clevis-dracut-15-11.el8.x86_64.rpm
0fb789c732ce81f56014c82ff1a145d917fdff04ff72eedb6cf78d365318a96a
clevis-luks-15-11.el8.x86_64.rpm
afda820f581b0fdfffd83e4c84c834ec3413291db1061d07b3d0f197bea52eda
clevis-systemd-15-11.el8.x86_64.rpm
ac473976855ebcdb18d17dd0fd52173ba7991cba4e2dcf2878ff04deed4c6a76
clevis-udisks2-15-11.el8.x86_64.rpm
85e206ef9a26491b946ac8aac5497e1c37f2e370ce1311ea4b609f1219a4c519
RLBA-2021:1934
mod_auth_mellon bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_auth_mellon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpm
4e2af6902d8948be02387c6a9ce5db3423f38ce4f60913a06e463b6ce72e7b87
mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpm
7b1ffed1c79ced0755d2f174d7e67f5d933ad0cc601c2c11f0010cadb54fdc3a
RLBA-2021:4247
abrt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
abrt-addon-ccpp-2.10.9-21.el8.rocky.0.x86_64.rpm
5ee629b2dfe6da1292ba48a1ddcadb9a5fdfb979fdd83099bc50cad4641d1cc7
abrt-2.10.9-21.el8.rocky.0.x86_64.rpm
4ca848af1c32062ac9b90bae1cd4a1c01d6a865d1dd63826b88c30a3adf6998e
abrt-addon-coredump-helper-2.10.9-21.el8.rocky.0.x86_64.rpm
112aaf826cb796f829d006f3eaefcd3233ee4ce96668fa543ba7c8b3f0dbe07a
abrt-addon-kerneloops-2.10.9-21.el8.rocky.0.x86_64.rpm
94a71406aead2da319c9552db798d8a7806fc8f5cc3164b69ca2718d894dfb6a
abrt-addon-pstoreoops-2.10.9-21.el8.rocky.0.x86_64.rpm
2f6a3f38e08fceca19cff8c252cf4b141e3be530480a2521f90ec2d2578fa2c2
abrt-addon-vmcore-2.10.9-21.el8.rocky.0.x86_64.rpm
366cb174ca0120fbd00f243b5bd83dd9052096d51db307805079e8cb3a90d110
abrt-addon-xorg-2.10.9-21.el8.rocky.0.x86_64.rpm
b3dc7d6e6e4a33c4973231ff25e888cb32371846962411641d3460b438f7ec69
abrt-cli-2.10.9-21.el8.rocky.0.x86_64.rpm
334b657d7240155d9864880cf4cef67b74efd775d4227f276e67bad5dec4fd1c
abrt-cli-ng-2.10.9-21.el8.rocky.0.x86_64.rpm
4d168d7ebe5a74cbd850cc605756c2d86e5aa82a2af8aabec1d3a2e339d78e79
abrt-console-notification-2.10.9-21.el8.rocky.0.x86_64.rpm
fcb189060ef963e226a2b8923b9fe76394e4991d0e254becefe1f389a707ba56
abrt-dbus-2.10.9-21.el8.rocky.0.x86_64.rpm
e7d2887ba2fd8cdc93e57060c72fd46a288d9716236da90ab8713d9029b71a3d
abrt-desktop-2.10.9-21.el8.rocky.0.x86_64.rpm
c78976d5bf0c77e0b77154aad0ac4090d567bc9cef6100cbadf993a36920c2b2
abrt-gui-2.10.9-21.el8.rocky.0.x86_64.rpm
2c4ae5e3e0f6adcc902dae5eb2446d2cec7acbb0fb9678f7b8e8da3cd234d586
abrt-gui-libs-2.10.9-21.el8.rocky.0.x86_64.rpm
a6d1295d2465947ced80cb78e665d6776c5c0286d03a2587267fa8e94ca986c2
abrt-libs-2.10.9-21.el8.rocky.0.x86_64.rpm
27e4e0818f02c70f3e48301bf8207987a4ed22b6677152a9a81a392adcb43668
abrt-plugin-machine-id-2.10.9-21.el8.rocky.0.x86_64.rpm
791ab7a14fa6a55bd2a4399b1825a67fdf918128e55e375c67994ed5d34e26f4
abrt-plugin-sosreport-2.10.9-21.el8.rocky.0.x86_64.rpm
7a63914d9526e7d6100c91fa14aef1064ca9ea59725be17d18d94fcbf9b1a607
abrt-tui-2.10.9-21.el8.rocky.0.x86_64.rpm
dbc9d102f654163ec08b5d34381c36b2b9b12c9edb72615d472bdef0d638865c
python3-abrt-2.10.9-21.el8.rocky.0.x86_64.rpm
f8ffcab298928db5b191a820fb31b01a3843521f4372ff711fcbbe9fe51ade67
python3-abrt-addon-2.10.9-21.el8.rocky.0.x86_64.rpm
2626a7d26f1a525796bc5a4a2a26634a579357a36c1d69f8df797153454dc8cf
python3-abrt-container-addon-2.10.9-21.el8.rocky.0.x86_64.rpm
e1d2344320275136cb943025c4df9bcbd51f5feb97bdce9015ce06fb38849021
python3-abrt-doc-2.10.9-21.el8.rocky.0.noarch.rpm
f4bb18000e5345149bdf78267d6d1dfd1947fcab62f66c2f1e6f21b2553085bb
RLSA-2022:7070
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.4.0 ESR.
Security Fix(es):
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927)
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928)
* Mozilla: Denial of Service via window.print (CVE-2022-42929)
* Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.4.0 ESR.
Security Fix(es):
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927)
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928)
* Mozilla: Denial of Service via window.print (CVE-2022-42929)
* Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.4.0-1.el8_6.0.1.x86_64.rpm
aa4a64a6c0ff90a5258aa86aeeac315fdcb81a784e8308fc90dd393415542e94
RLSA-2022:7190
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.4.0.
Security Fix(es):
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251)
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927)
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236)
* Mozilla: Denial of Service via window.print (CVE-2022-42929)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.4.0.
Security Fix(es):
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251)
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927)
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236)
* Mozilla: Denial of Service via window.print (CVE-2022-42929)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.4.0-1.el8_6.0.1.x86_64.rpm
d93cc63434e71cb0382a5d749f1d03ebb223967aac8e90377764b005d8b0b483
RLSA-2023:0208
Moderate: java-1.8.0-openjdk security and bug fix update
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910)
* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910)
* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595)
rocky-linux-8-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.362.b09-2.el8_7.x86_64.rpm
f3f3e5d43c714c292338655d64120f56e0458bd17d277521d2e63a069d2649e2
java-1.8.0-openjdk-accessibility-1.8.0.362.b09-2.el8_7.x86_64.rpm
d9963e64a08609dd914326a9f0fc3feb67b7f54635a609ba8212afac72ad52f7
java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el8_7.x86_64.rpm
3a6f8d6c9bb0e787948318bbcdac0c69249056b296abce7237c977bbf1befe2d
java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el8_7.x86_64.rpm
b2ac3e7305bc865c7225ee004394e2ddc8fdacf8b804ca0f5ff14d4b0ba074a0
java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el8_7.x86_64.rpm
4033ab8d78a462dd4edcba2a5908b47dee03b2a8b112eaa6f1f46d55c333cae5
java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el8_7.noarch.rpm
faa16af4cabb6f1c12b3c280cc0b0f3933802386268b20e734150fdf7a1a2664
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el8_7.noarch.rpm
ac11250119463f45f90401b0563633a9f252fea39e761a6dfe7e49526e7b1de0
java-1.8.0-openjdk-src-1.8.0.362.b09-2.el8_7.x86_64.rpm
58b5c066c073e979b3277b0f56a0925d40762970e99bfab0d4f51de97d4e09f5
RLBA-2019:1957
python3 bug fix update
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756)
rocky-linux-8-x86-64-appstream-rpms
platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpm
e061be87d99f859fe7cac6853a43d7957ecc17ea0ded870b5850a4f24224df14
platform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm
588192663a8a3e778eadad56f14130aef027f3871a811e207c8c7a8771ac9649
python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm
c70ef43afe7f308fb8412fe1fe36a7c555cc62e2ae5a26ff9afa96618997353d
python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpm
d5c856183b44e0e8769cc862ad7cc38d3d220ae3238d6bb3213baa7c6c0618db
RLBA-2022:0315
glusterfs bug fix update
Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
Bug fix(es):
* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593)
Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glusterfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
Bug fix(es):
* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593)
Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages.
rocky-linux-8-x86-64-appstream-rpms
glusterfs-api-6.0-61.3.el8.x86_64.rpm
4245c2155884aaea53a2fc2f47de6963d11dc63c14e860a4fedd4c8711ccfcc5
glusterfs-cli-6.0-61.3.el8.x86_64.rpm
74338514784fd16f87af53856fe909b14bf953837b22c2077051132190540f6e
RLBA-2022:2006
python-pip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pip-9.0.3-22.el8.rocky.0.noarch.rpm
65271a7c3eca9c50250011cda76b6f71dd6d16e467d477bdb7463815f3c72616
RLBA-2022:7739
sssd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sssd-idp-2.7.3-4.el8_7.1.x86_64.rpm
3c6c95405c3b4e996b6bf4f2cc6485b989ea323907be522fad24fe0c3956679c
RLSA-2022:7790
Moderate: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bind-9.11.36-5.el8_7.2.x86_64.rpm
21abee84a89028d14ce98980aa383f28918bde55413fbd9e0cac50b19fb800df
bind-chroot-9.11.36-5.el8_7.2.x86_64.rpm
c0145d2d72c77b41ddd899f6cfbe5f616b0b9dff9c142767a31144375e78e082
bind-devel-9.11.36-5.el8_7.2.x86_64.rpm
09a84b9fa5fad18116b216c46c47aed57687a4836220f1efe46ccfab229322be
bind-libs-9.11.36-5.el8_7.2.x86_64.rpm
91e2c3e97c80d3bf7889b9a54a56b5023f0f836b5ff90fa0d9d89c57daaa7dc0
bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm
1076cfd8cf8a54db16a2bd8ad4afac3af11af0c7b64efca9f099001be25abac7
bind-license-9.11.36-5.el8_7.2.noarch.rpm
6962b9370b7289b60f13dd744a4686cc326e572e0d78146d05bb2d185cc25609
bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpm
e92594606ed4e209aeee470bdbbb0f914407eaacbaaf51287dd0b87d2c11f9e2
bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpm
ff6eeac2c720aa70d0833d6f67674797320f7a604bd0e89d7e3b104dc218a09d
bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpm
ac101cab9169d403cb52c7102ccd5464f7bd937c8433402506275a1888b2f367
bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpm
f4b183526a9aa05136adbb5e85f751d999d7890304108ba2398bf1d7c6c15684
bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpm
dbe7c50b37b95e2cd134a1985e23e9c31573b20a06870e7e81280c52f78a7cf8
bind-sdb-9.11.36-5.el8_7.2.x86_64.rpm
0c54ec1aa90b2dbd9db277762b9c87e5c203662c7e9fb4e4f339fd5d0e508127
bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpm
4b1f0cbc1fb7fb538f4dfaffd41e20b56067054ab12452ead829aaeadfeba5f1
bind-utils-9.11.36-5.el8_7.2.x86_64.rpm
32150af88921ca072ecb2c37e21606693effcba9264fbe9b9acf52fe11a5df5c
python3-bind-9.11.36-5.el8_7.2.noarch.rpm
b218709131629d02a30d045c0bcf541ee2262bbd083d07b35e263675fce0703e
RLBA-2022:7832
python3 bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages.
Bug Fix(es) and Enhancement(s):
* python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages.
Bug Fix(es) and Enhancement(s):
* python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436)
rocky-linux-8-x86-64-appstream-rpms
platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpm
e061be87d99f859fe7cac6853a43d7957ecc17ea0ded870b5850a4f24224df14
platform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm
588192663a8a3e778eadad56f14130aef027f3871a811e207c8c7a8771ac9649
python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm
c70ef43afe7f308fb8412fe1fe36a7c555cc62e2ae5a26ff9afa96618997353d
python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpm
d5c856183b44e0e8769cc862ad7cc38d3d220ae3238d6bb3213baa7c6c0618db
RLBA-2019:3504
bacula bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bacula.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bacula-logwatch-9.0.6-6.el8.1.noarch.rpm
3016564651a9da24f61d8c4aa305a02824a187c9091bc1681a52d10a6832d067
bacula-client-9.0.6-6.el8.1.x86_64.rpm
c346095d229f1528a36c8a82ceb7da20dba9df90e898cfeed6675b8f84030554
bacula-common-9.0.6-6.el8.1.x86_64.rpm
d74736d715f0460f6e99bbb53a8b294d73322d79b44f72aff61cf67b6fd9368f
bacula-console-9.0.6-6.el8.1.x86_64.rpm
328188f833994e665854f6e9dac0318f0d5b3b173cf61e99c9e90db263d83f1f
bacula-director-9.0.6-6.el8.1.x86_64.rpm
223f0598bccfe7f7f701accdfb7ab1319b8dd5e2cb0fba0f3af8c019116e29d5
bacula-libs-9.0.6-6.el8.1.x86_64.rpm
c807cfdfb40d327febd118a75b5b28cbecbca8a646b5a374043b48c0f29d51d4
bacula-libs-sql-9.0.6-6.el8.1.x86_64.rpm
c72d1f9187711a8d0a2db2d266bfcb3becd60a04f626f95604e68ed4bd9fef60
bacula-storage-9.0.6-6.el8.1.x86_64.rpm
086250c48ad4da8f952c482078834afc9e206ed6a51d07011e34cca7c7994f72
RLBA-2020:1362
.NET Core 2.1 and 3.0 bugfix update
This is a bugfix that fixes some issues in .NET Core 2.1 and .NET Core 3.0.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet3.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This is a bugfix that fixes some issues in .NET Core 2.1 and .NET Core 3.0.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
03b09603d78a15dc7eba4508d4f9834f441d2a3b832b9f005870a5142c1da8dc
aspnetcore-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
80d6ad709313d91d603c9381cf205260c7bcd17bf47ee5bde3dc1576e762d8ff
dotnet-apphost-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
80b4decbb49a7acf692aa1a600e111e3f4ef7bc71cbe210da7e5ca674b84e559
dotnet-hostfxr-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
e7fe9237eddaf12854c060c75672919cbb6e254d1db07b90aba09261a939ee71
dotnet-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
24ae1890686f4b846d5a6de6bcf5901f72e998785e38b444c716b76be73fbfac
dotnet-sdk-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm
1e1712cf06699de75847284e234a4fc543a981e1d29adc4126d70c1d18be53c8
dotnet-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
cfd5643b251f02203de9ae5c584d349f43645b586ae8d4438b6507ac21c1e8b2
dotnet-templates-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm
98baacba1ce69bc37424dc56bacf75b27d3dbdeff537c94f5912c02fe6724ea6
RLEA-2020:4672
autogen bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autogen.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
autogen-libopts-5.18.12-8.el8.1.x86_64.rpm
e75151160d3fc3958dce91ffb51953b00e93a8cb3cb5a43b7f93bf59fad00ca0
RLBA-2020:4734
libblockdev bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libblockdev.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libblockdev-2.24-11.el8.x86_64.rpm
5da174eafaf69af62408a4815a01f3dc246ef681fcc8e7014b0fce0403a674cd
libblockdev-crypto-2.24-11.el8.x86_64.rpm
2d4d820490c96a4d9c5c75b7cb3ae1520b579e609356fa336cd7fe4800f9f23d
libblockdev-dm-2.24-11.el8.x86_64.rpm
ddb1077966da4cd352a7e5054ecbd6393c5294c45a10185f794f19e1f5213924
libblockdev-fs-2.24-11.el8.x86_64.rpm
1ad19562185e8206dc5175b37b20453977bbeeaf4e69c90f0c2701f6a3297be8
libblockdev-kbd-2.24-11.el8.x86_64.rpm
cb09b43aa55feab2e48ba005abfedfb8e8bb0170aaa731daeeecea050036b1d6
libblockdev-loop-2.24-11.el8.x86_64.rpm
f99218c09d4e71cb3da31faf10c85a3e4e324fa30a2a499104bb554ee7ae9394
libblockdev-lvm-2.24-11.el8.x86_64.rpm
5987c9cd3365981b4e3f0c03f572adbedc4e6e2a27909cbc164c3f2f1b518235
libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm
95c137f79bd41a9f791c48be71008650e3aa7354ab5ac0d6cd54b5bc961cf294
libblockdev-mdraid-2.24-11.el8.x86_64.rpm
40841584b5e8ba50c0316fa6a41a6bb20e470fe8486cc8868bfd1fbf47b55186
libblockdev-mpath-2.24-11.el8.x86_64.rpm
6c11510d841ff0405a0630e37d1ed79d9f741fe85a18a6dc366a4daf7c6165e7
libblockdev-nvdimm-2.24-11.el8.x86_64.rpm
8f5f06d54c67ec053c3268a228e95c91c46741a9976adb23df6f7627ea27989b
libblockdev-part-2.24-11.el8.x86_64.rpm
979ebb94b393928e80524a055ced8c32914e3bb69fdbeb7548d61e86048b49d6
libblockdev-plugins-all-2.24-11.el8.x86_64.rpm
fd8cdb42a8c71a3313807d62340daaaa650588184e86a039197d94a44b31d7e8
libblockdev-swap-2.24-11.el8.x86_64.rpm
1a319f5063476b8af2207e8d0d8b8564ad66412886b4cf3c337e069c443b5c23
libblockdev-utils-2.24-11.el8.x86_64.rpm
c954d6b891f0140d997e1f3106e9cc023ee920288c017910fed598501e321ee1
libblockdev-vdo-2.24-11.el8.x86_64.rpm
3397635712651d00661b4f91563eb6aaaec753824b97fb4e8de64e6a17d9de49
python3-blockdev-2.24-11.el8.x86_64.rpm
00fcf1707621b8ff4a0de879d5e401b5b738a05783621ec8e85c4bfef705300f
RLBA-2020:4842
anaconda-user-help bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for anaconda-user-help.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
anaconda-user-help-8.3.3-1.el8.rocky.3.2.noarch.rpm
12cf830d8c06d8c4a5f9de5f032ec9d3f9fb74fc87c8996c6a0d913e1076a2fb
RLBA-2021:1864
initial-setup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for initial-setup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
initial-setup-0.3.81.7-1.el8.rocky.x86_64.rpm
b0679fe50c82447897f0c44b29a54a9a9687350456cd7ee3cc275ad7190c2efc
initial-setup-gui-0.3.81.7-1.el8.rocky.x86_64.rpm
93a078d2f9570a23ba553f45d203254502708391e176eab4ebefb876761e70b1
RLBA-2021:3240
.NET Core 2.1 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* BUG_TITLE (BZ#XYZ)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* BUG_TITLE (BZ#XYZ)
rocky-linux-8-x86-64-appstream-rpms
dotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm
a4d8e71402fc6bd36ccae8ba4395eb873b0f3c784db09d3084e6ca440cda925d
dotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm
cbfff6de30501753f7e3e22633e6bb2b79f127fe1aa3852be5f49569a0197f4c
dotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm
b01ae5a57232950f63cd3847d35e22abbbb6ed9546f798908e4f2c4f5e491649
dotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm
c366fad3118e4a8e74178c05148f40faaf4f058e720a4bf78926f6713b259deb
RLBA-2022:7462
anaconda bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for anaconda.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
anaconda-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
14306fbc0585ea126092684577dd78c997a03dda55f075c5e860447729b820ad
anaconda-core-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
a72b8c6d78e2df066d85d66436287bbe54e8681c738df026216680fcef5620a3
anaconda-dracut-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
decf0a6c4cf9205f0d5b7cf816b59d941dbf6989e5918b3fc267de57407d8869
anaconda-gui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
b489cf953ec8e843d54407de768f8a265835e8ece54f30de57de15722dfee29f
anaconda-install-env-deps-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
62f966ca820588e7047171e4cce1ac7bd5b15f0da633f9fd83afc77b9fe82ff5
anaconda-tui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
bebe596166ed2e9ce70c6108d011b8fab5e168af9a5b1e61c0ba387755736b14
anaconda-widgets-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
ef49cafda3feb4032b7c9d025ebc15ada7809a5c0e0394b0094ecfcf039a4dfd
RLBA-2022:7563
scap-security-guide bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
scap-security-guide-0.1.63-4.el8.rocky.0.1.noarch.rpm
b2a48fdcce6aecf0fc3e03ba450c2e5cd7e5d11b7d8d0409e62b4607e1d39d3e
scap-security-guide-doc-0.1.63-4.el8.rocky.0.1.noarch.rpm
456dfa8d08ed0c210c6fc9c61c2614d08184c63be5b90e949e285044c11b8cb4
RLBA-2022:7573
pacemaker bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pacemaker.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpm
3140cfc42a7891db48ccd246e8e9cbbbf6bd63470ca182d69d41b638bf54d33c
pacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm
98c2f138e3b705ee8a47cb1649347a579fedee8fe73edff425f2e45b9d22e96e
pacemaker-schemas-2.1.4-5.el8_7.2.noarch.rpm
a50616f73a2a2e456d3bba21b8b4892c73814cc429db6bd992bd6eecaf5c6d3f
RLBA-2022:7576
WALinuxAgent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
WALinuxAgent-2.7.0.6-6.el8.rocky.0.1.noarch.rpm
26ca415b8dd49908429e9eb6083d4021e9e59e6a5b4a104551eb5e1233819458
WALinuxAgent-udev-2.7.0.6-6.el8.rocky.0.1.noarch.rpm
289a7a9eaaa0b08fed39797e3dcff0ca31e1803de199982638d47f7c716002d4
RLBA-2022:7588
lorax-templates-Rocky Linux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lorax-templates-rhel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lorax-templates-rhel-8.7-1.el8.rocky.0.1.noarch.rpm
fafa48c90f1691b8b0d7a11db3797202891ebbb40141c69153116989d570ca53
RLBA-2022:7635
openscap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openscap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openscap-1.3.6-4.el8.rocky.0.2.x86_64.rpm
a9c8fcf39e5a3c78777fd13e99ab9e9068ef7bc27f2e6a31d44a653e8a82af4e
openscap-devel-1.3.6-4.el8.rocky.0.2.x86_64.rpm
797332aa46d047b77da8e2aeed59d299e90093423d0b5cc36537180d4c0bc7ec
openscap-engine-sce-1.3.6-4.el8.rocky.0.2.x86_64.rpm
096db4413ec320ccc6b4b90a8e61a5e060e6bd03fb54a67eb454f348812a6dc0
openscap-python3-1.3.6-4.el8.rocky.0.2.x86_64.rpm
2029d8040215779088eda229a66dd9d8c62f21a263e1c2347a228f4f41dc0312
openscap-scanner-1.3.6-4.el8.rocky.0.2.x86_64.rpm
b7434cd2d2fa7a294c62d1ffe0573d2c156d108cdab0f98d30c02253cceef8cd
openscap-utils-1.3.6-4.el8.rocky.0.2.x86_64.rpm
2fb8149ec7f11aec5578c45ba7e146d7e149bc57faa6822371a661cd0acb6bb6
RLBA-2022:7831
osbuild-composer bug fix and enhancement update
The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients.
Bug Fix(es) and Enhancement(s):
* osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for osbuild-composer.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients.
Bug Fix(es) and Enhancement(s):
* osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532)
rocky-linux-8-x86-64-appstream-rpms
osbuild-composer-62-3.el8_7.rocky.0.1.x86_64.rpm
8262e7655a6fcb6b2d662e008a04b7dd6cd220d068a5b5cc6bf988c18aab8ae1
osbuild-composer-core-62-3.el8_7.rocky.0.1.x86_64.rpm
94dc3d530421be596cf771a39fae7c08cb7e0b07ef95c95904f6ced4fc08ecb6
osbuild-composer-dnf-json-62-3.el8_7.rocky.0.1.x86_64.rpm
e2bb916e89a9eb86f7d8bcdf96038cf6085cf44f3040692cecb55cf4a96131df
osbuild-composer-worker-62-3.el8_7.rocky.0.1.x86_64.rpm
77c71158f924058584b2df864b8224a5e5f39b0d1a0361a9f87bac257a257184
RLSA-2023:0606
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.7.1-2.el8_7.x86_64.rpm
397c7a3d617f303fa340ad25ca56e7a82e592fcd0ee0b605fc3c7f7cca736eb7
RLSA-2023:0610
Important: git security update
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: gitattributes parsing integer overflow (CVE-2022-23521)
* git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for git.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: gitattributes parsing integer overflow (CVE-2022-23521)
* git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
git-2.31.1-3.el8_7.x86_64.rpm
9220dd3b23a10da6bb25972c39c0fb7b3c7c15b73e364a3f81d87a795a29b9b7
git-all-2.31.1-3.el8_7.noarch.rpm
92c2733e6f2b2645563181303f32f3b2d5a188a7778c8fd4dc8faba73d8fc36e
git-core-2.31.1-3.el8_7.x86_64.rpm
20674b16cc56df61db92841fbd59588ca24fd21806c703c808cb44ecc4fcc770
git-core-doc-2.31.1-3.el8_7.noarch.rpm
4678360948f2e508f9ab7c4b00f80544d20933b3fb18756e6de86f5e7f3ce4b3
git-credential-libsecret-2.31.1-3.el8_7.x86_64.rpm
69ec8410420bc70ac0dbb562dccfaed5e5ed1fd82b11a629eccc839268483144
git-daemon-2.31.1-3.el8_7.x86_64.rpm
9357f576178574808fe508bd81ff93896917981e7b757c1fe814d39768307c5f
git-email-2.31.1-3.el8_7.noarch.rpm
b34c1136de772988f05da4d6b1f728e055e7e664d644110e539af54d32c1cdd0
git-gui-2.31.1-3.el8_7.noarch.rpm
a2a35410f875c09789a0eb2fe5df9aa2f50ccff2358eafa95a27723b28c31375
git-instaweb-2.31.1-3.el8_7.noarch.rpm
3ed7d7cbaff42c2730ad0c2253188f5fbd539093dd6ec17b9af8f1c6263f0ba0
gitk-2.31.1-3.el8_7.noarch.rpm
7647f119c5e1fb3d7b1057b7e21e7a680ad70788929ed67e9b8d31abde6e514f
git-subtree-2.31.1-3.el8_7.x86_64.rpm
1cac01052d2d6fe529ac48eb17744ff28fb715cff5adb010892a8b57c50585c0
git-svn-2.31.1-3.el8_7.noarch.rpm
e7ffdb663725cab152b5eafd635a6bc5cf01e4cbd5c3c096d333d41317f36712
gitweb-2.31.1-3.el8_7.noarch.rpm
9bdac44d92e84e6e95ad7e57e44ed9974e875ae07c4d16cede18b0a22504364f
perl-Git-2.31.1-3.el8_7.noarch.rpm
8ce9eb777428d346828044559ded2afa7b0f05ad5fb1037d1eca7e5933f549f8
perl-Git-SVN-2.31.1-3.el8_7.noarch.rpm
cdd3d630ad5e75fb3c470197cd865f9a75ecb1e06ebec2047937f0544d5d0683
RLSA-2023:0662
Important: tigervnc security update
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
tigervnc-1.12.0-9.el8_7.1.x86_64.rpm
4c5a4f86b80bf7056ddb8958cfe88bf79f4dec20a575de0e2cafef9515696da6
tigervnc-icons-1.12.0-9.el8_7.1.noarch.rpm
1e7a585b86d309435f29652a9fc2f9a1e07c0797336ad4cc9c31221fc52d76a2
tigervnc-license-1.12.0-9.el8_7.1.noarch.rpm
ae82f5bcd77a8bb854d780e344b39c468503cef8767de5e1a114d6c13317173f
tigervnc-selinux-1.12.0-9.el8_7.1.noarch.rpm
82279d622f3b7172cde9cfa37e5ed89a4b5f0734e293d0f4c662ed67983bece3
tigervnc-server-1.12.0-9.el8_7.1.x86_64.rpm
7dff90cc4f543e04b61fee3f36d80e84a1e9c4adc6b5ecaf9b0761c87d4af68e
tigervnc-server-minimal-1.12.0-9.el8_7.1.x86_64.rpm
9ee941199be3911ecfa7e203ad129d6292653a77032950edc91b07afa2259ecd
tigervnc-server-module-1.12.0-9.el8_7.1.x86_64.rpm
d12a5a5e1a1258f6e3eeb25acfc8d1c1013a6470d300bcbd232cd3a138aab396
RLBA-2023:0783
.NET 7.0 bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3.
Bug Fix(es) and Enhancement(s):
* 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z]
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3.
Bug Fix(es) and Enhancement(s):
* 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z]
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.3-1.el8_7.x86_64.rpm
20884c95c3afd7e70d88c2f8f8eac26a0bb8e897cba25df6ec8e09dd208b1884
aspnetcore-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpm
5a3c338518ec311c7dfcdb9270e18deb939be1d94433ea3011d93f1428143271
dotnet-7.0.103-1.el8_7.x86_64.rpm
d3477447a067a18b36414603d7b523732a183752f8aabdb393aef93fbc31c813
dotnet-apphost-pack-7.0-7.0.3-1.el8_7.x86_64.rpm
990241696c3ca0502378577dd827ee5c384ba879251d7c931c38e17d04430b29
dotnet-host-7.0.3-1.el8_7.x86_64.rpm
c062a02e6fb5bcb5278b7d51d10ea2e4dfb458e26b0640c0162ccb9f59bfa53a
dotnet-hostfxr-7.0-7.0.3-1.el8_7.x86_64.rpm
68a035d80d6084f2a4ccec5ccb69c6e78f0fec825405c60edf1c27cfbbf3875c
dotnet-runtime-7.0-7.0.3-1.el8_7.x86_64.rpm
2fa8101d8215618813e9ba6b2c184944084f046d5267ffc7f898a83a454a2b0a
dotnet-sdk-7.0-7.0.103-1.el8_7.x86_64.rpm
9861a45dcab2dc661af7ab31eecfdb79f08a56b60236cd938fb28038241f83e5
dotnet-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpm
4f2929540b08ed3f22ea26382f07cb2eb865fbb1025021c9357bb038c012360e
dotnet-templates-7.0-7.0.103-1.el8_7.x86_64.rpm
187896b19f8a806dcd357ca1e720e92e93bd5436531f71fecc5679f5f682f186
netstandard-targeting-pack-2.1-7.0.103-1.el8_7.x86_64.rpm
dceeaab4ed466a0f86ea384ef902e4676aa83653aa6e7ac708694b9de89b57c1
RLBA-2023:0784
.NET 6.0 bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14.
Security Fix(es):
* 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z]
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14.
Security Fix(es):
* 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z]
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm
d927a4505fdcad23195573f6d52c80434f5b4a621449aa24f516c9fe811239c6
aspnetcore-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpm
370d95f0e7be0454313071af1368521fbe6731df7e916787f93c6356c6d298e7
dotnet-apphost-pack-6.0-6.0.14-1.el8_7.x86_64.rpm
f8bec232847567d9a518812b09dad2c46e721dda2a6b0408ee6aedd93f4a4e81
dotnet-hostfxr-6.0-6.0.14-1.el8_7.x86_64.rpm
eae9ca989c5f4371de03757903e575490f006ace86b401c6cd138a43f0d3a071
dotnet-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm
25c974c86d5834beba5c58fd787b021f792c2b994514b7373749acf5c84aeff4
dotnet-sdk-6.0-6.0.114-1.el8_7.x86_64.rpm
8b6f7fe708e0d43d3c23a47f58a7ee148b609532c4403337c00d9d9854919635
dotnet-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpm
60e6b60fde9cbd89bfcb3ff099e9491e38ade49488d2285cfc50a3f06e736b2b
dotnet-templates-6.0-6.0.114-1.el8_7.x86_64.rpm
7d68bed970785a9e9640e7f78e1d18b8e409c5763b25ead6eca982b665122d4e
RLSA-2023:0833
Moderate: python3 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)
* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)
* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
platform-python-debug-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
936765318cdb96d7a45dda4bf78149a39f9f22d22573c9f4c8ac0a938145df70
platform-python-devel-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
f146e3879b706ef315779f3c166be4390e5e8d1b7955d3f4a03c9bc13f29f4db
python3-idle-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
aabcaa0d5666f67972bf5b0a6fb6d43497eda585884c7e3596d5f33bb17da541
python3-tkinter-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
be68cdb65121707231fc3458a0d199b5792b1a43d51f45bbfc0ea153972e8e0f
RLBA-2023:0836
OpenSSH bug fix and enhancement update
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Bug Fix(es) and Enhancement(s):
* backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Bug Fix(es) and Enhancement(s):
* backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732)
rocky-linux-8-x86-64-appstream-rpms
openssh-askpass-8.0p1-17.el8_7.x86_64.rpm
14a7425e79ab4665d925887de9418eac2d157d1cbddbdc1ce45ec08f67abbf65
RLSA-2023:0838
Important: samba security update
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
samba-vfs-iouring-4.16.4-4.el8_7.x86_64.rpm
ae778fc011fcc31ac814544fdfa17454875fd044ee944a6492c570f6d4321ef2
RLSA-2023:0808
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.8.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.8.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.8.0-2.el8_7.x86_64.rpm
1b1d59a6021a0ac5ca295d1b120d2176cb87a73cba1bb35262a2d55dad536301
RLSA-2023:0821
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.8.0.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.8.0.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.8.0-2.el8_7.x86_64.rpm
3f2e6dee35aacbaec3ad880cb84c1c8b020b26d9bb82d5a4fb1845efaa5a8809
RLBA-2023:0829
scap-security-guide bug fix and enhancement update
The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the
Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable.
The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2168050)
* DISA STIG: SCAP kerberos related findings after realm join (BZ#2168054)
* file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2168057)
* audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2168060)
* Rules concerning audit check for content of specific files, and not /etc/audit/audit.rules ( ex xccdf_org.ssgproject.content_rule_audit_immutable_login_uids) (BZ#2168063)
* The stig rule xccdf_org.ssgproject.content_rule_sudo_require_reauthentication fails due to space in in the "timestamp_timeout" value (BZ#2168066)
* Some rules have proper STIG references but they are not part of STIG profile (BZ#2168069)
* Two CIS Level 2 Benchmarks are listed in scap-security-guide under CIS Level 1 Profile (BZ#2168072)
* Update Rocky Linux8 DISA STIG profile to V1R9 (BZ#2168075)
* Rebase SSG to the latest upstream version in Rocky Linux 8.8 (BZ#2168079)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the
Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable.
The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2168050)
* DISA STIG: SCAP kerberos related findings after realm join (BZ#2168054)
* file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2168057)
* audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2168060)
* Rules concerning audit check for content of specific files, and not /etc/audit/audit.rules ( ex xccdf_org.ssgproject.content_rule_audit_immutable_login_uids) (BZ#2168063)
* The stig rule xccdf_org.ssgproject.content_rule_sudo_require_reauthentication fails due to space in in the "timestamp_timeout" value (BZ#2168066)
* Some rules have proper STIG references but they are not part of STIG profile (BZ#2168069)
* Two CIS Level 2 Benchmarks are listed in scap-security-guide under CIS Level 1 Profile (BZ#2168072)
* Update Rocky Linux8 DISA STIG profile to V1R9 (BZ#2168075)
* Rebase SSG to the latest upstream version in Rocky Linux 8.8 (BZ#2168079)
rocky-linux-8-x86-64-appstream-rpms
scap-security-guide-0.1.66-2.el8_7.rocky.0.1.noarch.rpm
dfd5eb2341faf8bd344febca1e8f956ce8c4b8166ceaf62de578ec14f3135927
scap-security-guide-doc-0.1.66-2.el8_7.rocky.0.1.noarch.rpm
759b5bb60fe3c23980c8f6d86623dca109434f3cff6d589d290c2df3bb643373
RLBA-2023:0843
fence-agents bug fix and enhancement update
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es) and Enhancement(s):
* OCF Timeout occurring on fence_ibm_powervs (BZ#2136203)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fence-agents.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es) and Enhancement(s):
* OCF Timeout occurring on fence_ibm_powervs (BZ#2136203)
rocky-linux-8-x86-64-appstream-rpms
fence-agents-all-4.2.1-103.el8_7.1.x86_64.rpm
fd7953a814d1018b0e42b1e216a639834e3dd22ea130d089be5805d15ef03970
fence-agents-amt-ws-4.2.1-103.el8_7.1.noarch.rpm
8c00ccea26f7b360ac09250aa2b2af0172c71fe2a42969dd04e977e239af31dc
fence-agents-apc-4.2.1-103.el8_7.1.noarch.rpm
90dafd27ef4ef6dc99f86ca6e72acb76560dc191c212b82fbadb92b8f58a72cb
fence-agents-apc-snmp-4.2.1-103.el8_7.1.noarch.rpm
95d84cc1cba8737941dec24ac541b16e2e5375e9ee45d1da49febdb37c6db9f3
fence-agents-bladecenter-4.2.1-103.el8_7.1.noarch.rpm
9f7a7df06ae78995cf11e04e74e5d73adaabe0fdd923ee3b7df0480e53df2de9
fence-agents-brocade-4.2.1-103.el8_7.1.noarch.rpm
362cafe82034539c42cf1c377107f8db5679ee8a44ad30c45b77237ca33df60c
fence-agents-cisco-mds-4.2.1-103.el8_7.1.noarch.rpm
0ea69bd61343e42aeee408fc8f0028cb6f8873b7d14e2f3cad2d44e7c3c6cc81
fence-agents-cisco-ucs-4.2.1-103.el8_7.1.noarch.rpm
33d31ee82644f04f2edb6d7916547c4ba1eab1ad9f0a9f68b91a82026a4fffa2
fence-agents-common-4.2.1-103.el8_7.1.noarch.rpm
0a009c76338e52de26effaa57065835fe75e4fc9c863e0f552a686338f0efdeb
fence-agents-compute-4.2.1-103.el8_7.1.noarch.rpm
2bade70a59ea019236552e56dfb03904650903bfc297506bd9d6077af1d89811
fence-agents-drac5-4.2.1-103.el8_7.1.noarch.rpm
4821543523adcd5f17f652cf838bbc741942f8887c0c3b9e27f934fd3360e12e
fence-agents-eaton-snmp-4.2.1-103.el8_7.1.noarch.rpm
076412f8793f721e3be4bc4bfe162f93be81bea014aa23535516ac37f97c4074
fence-agents-emerson-4.2.1-103.el8_7.1.noarch.rpm
8022b609fac6fbece70d9fcb70cc8fcbfa43f99cb117433dc3d280798f4d4f74
fence-agents-eps-4.2.1-103.el8_7.1.noarch.rpm
1f8736221f4dcfd87c19c217c5be485a1481917887896cece3bd1cf0d592f3a9
fence-agents-heuristics-ping-4.2.1-103.el8_7.1.noarch.rpm
295d65e78509d881d8ae6890a99ec1de078d4e66a8a9472e82a583fec763495a
fence-agents-hpblade-4.2.1-103.el8_7.1.noarch.rpm
2119227ac9586301e70369923a3b7e24a82f31b60e1c65127892eb07f26b7fd6
fence-agents-ibmblade-4.2.1-103.el8_7.1.noarch.rpm
cb72d5809305a8a8129cf6652c598c9b9805bccac54c3c080e45e344c80eaa07
fence-agents-ibm-powervs-4.2.1-103.el8_7.1.noarch.rpm
85d4ef0da70ee8437ecb256f39f05c5ec2b1b3bc2cf89671a046a460f15e1a05
fence-agents-ibm-vpc-4.2.1-103.el8_7.1.noarch.rpm
1ed9adee37de6f6db948ef4b16a40074f467387f43054ce54028d8ed01ef33db
fence-agents-ifmib-4.2.1-103.el8_7.1.noarch.rpm
1d27672002dd97ead87796e5feba88df86700a7e258d6ab0c48e117c885cca3b
fence-agents-ilo2-4.2.1-103.el8_7.1.noarch.rpm
adb8b31244de569051d719a7e4bde474a81210eef6f736105957065c6c568a34
fence-agents-ilo-moonshot-4.2.1-103.el8_7.1.noarch.rpm
57063d203d256fb552fd11731243d282dfca7da542292f18317dc249c17f6fc7
fence-agents-ilo-mp-4.2.1-103.el8_7.1.noarch.rpm
bcf444b0f41d2feb3833dc22f1a5993aed51d24eb961f6cbcf0536a1d5112f15
fence-agents-ilo-ssh-4.2.1-103.el8_7.1.noarch.rpm
b0d0ecb30a3941c270e47fc358dc8c3c59949e488b5e6b50e5573373cea0afd6
fence-agents-intelmodular-4.2.1-103.el8_7.1.noarch.rpm
a56a98693b50a91d89299ebc7663092c550c458d2cd0b53c8f5f9e7234440cfe
fence-agents-ipdu-4.2.1-103.el8_7.1.noarch.rpm
ae32c1a30808ccbd570d8352691086866cad26aa9c7b34536c37461a19ce8d35
fence-agents-ipmilan-4.2.1-103.el8_7.1.noarch.rpm
aecb4472fe7983ffa2b314871f95b72458ae6eb3a91e681a060754bfbae8d131
fence-agents-kdump-4.2.1-103.el8_7.1.x86_64.rpm
4ef7ebf360d2bc40d249815edb9c60da50420afd71c487d801e573d4d522af8d
fence-agents-kubevirt-4.2.1-103.el8_7.1.x86_64.rpm
c645f7046f2fc92b441b236b56c855fd575372cb776da360689b69b7fcbe39c0
fence-agents-lpar-4.2.1-103.el8_7.1.noarch.rpm
3e6fa201fb147a29a11c6cb9cabdf204789f65c38f0986af3f62486509f9fb8a
fence-agents-mpath-4.2.1-103.el8_7.1.noarch.rpm
e69b95d914b5a3d2da79a18b839560db1fc5ea429dbe7b2635d9a7493063b0c3
fence-agents-redfish-4.2.1-103.el8_7.1.x86_64.rpm
16124371e7bb5cdde13c6119951db9c727e54c288a6f162652daa83b84e6485c
fence-agents-rhevm-4.2.1-103.el8_7.1.noarch.rpm
730b7a0e703ffacf8e7a46a31192504e3d9b969cf73e9b4c3240424133cb5e17
fence-agents-rsa-4.2.1-103.el8_7.1.noarch.rpm
8c9e7388cdb186c0a929f90152424cc656cb047754dec4bd9f4ed9598895b4c0
fence-agents-rsb-4.2.1-103.el8_7.1.noarch.rpm
ae8818ff67e5e22ce7f1daffaf9cbe82e38e404ab921f39116d2d55824d94dae
fence-agents-sbd-4.2.1-103.el8_7.1.noarch.rpm
bbefee58de8b0123277ab7dd840ea7b5b0b8c429ad8b8b6a7585a20fdcfb2d08
fence-agents-scsi-4.2.1-103.el8_7.1.noarch.rpm
cae0b470d289a9f373ba7c53133c2f0c782909e32b121775c7821c2ad7dccc41
fence-agents-virsh-4.2.1-103.el8_7.1.noarch.rpm
b635844fdf91ff808687e3ff6071d9c34f1b3b641692277545161ccccce807d6
fence-agents-vmware-rest-4.2.1-103.el8_7.1.noarch.rpm
d4f044661287872b3a854baa1818a2c66e6446c1aa3acd010b5bbec8e5456a83
fence-agents-vmware-soap-4.2.1-103.el8_7.1.noarch.rpm
8602fa3a0fa16cb9535b32f0e959318bd53357413745c7e1cd995ab09956a998
fence-agents-wti-4.2.1-103.el8_7.1.noarch.rpm
e8b3d2554bf7e50b9e4119c3cbd5ceb43d727db31bed5a4234e682f7a1e4482b
RLEA-2023:0844
rpm-ostree bug fix and enhancement update
The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es) and Enhancement(s):
* backport support for embedded container whiteouts (BZ#2137905)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es) and Enhancement(s):
* backport support for embedded container whiteouts (BZ#2137905)
rocky-linux-8-x86-64-appstream-rpms
rpm-ostree-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpm
58edfffc0deb83ae4499df770ec2d8f7c7126b75615307b9246819de1d1eeb4f
rpm-ostree-libs-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpm
e9a5fa26ad94103ea70bfe9b3d6c82039db3147038a94928421ccfe0382249f7
RLEA-2023:0847
new package: synce4l
The synce4l packages are a software implementation of Synchronous Ethernet (SyncE) for Linux.
This enhancement update adds the synce4l packages to Rocky Linux 8.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for synce4l.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The synce4l packages are a software implementation of Synchronous Ethernet (SyncE) for Linux.
This enhancement update adds the synce4l packages to Rocky Linux 8.
rocky-linux-8-x86-64-appstream-rpms
synce4l-0-3.20221122git9564b5.el8_7.1.x86_64.rpm
bfdae57b13b96b443cf813ad967fdd45216584224fa2a62bd784e381dbe3e97c
RLBA-2023:0846
cloud-init bug fix and enhancement update
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux-8] Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153182)
* systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' [Rocky Linux-8] (BZ#2165945)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cloud-init.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux-8] Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153182)
* systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' [Rocky Linux-8] (BZ#2165945)
rocky-linux-8-x86-64-appstream-rpms
cloud-init-22.1-6.el8_7.2.0.1.noarch.rpm
e14a2aa19017a32ea6cb0c568e931b3fdac42723ded7ab6e824a57f0ad16ae4c
RLBA-2023:0850
openscap bug fix and enhancement update
The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* xmlfilecontent probe produces invalid OVAL results (BZ#2165577)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openscap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* xmlfilecontent probe produces invalid OVAL results (BZ#2165577)
rocky-linux-8-x86-64-appstream-rpms
openscap-devel-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
2cf728720a489353054d40208ba2298f96bc649ade04f328db4453354795ce41
openscap-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
dc61ffba6cc1eaf9e2c857948c37f08c0e1fa454e895ec96d172ba06d96f7b25
openscap-engine-sce-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
a187a038fd7436227918dabb52df651c0272b35bc50b81fd28d69e6ed08a596a
openscap-python3-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
fc91a15732cdd4561ae0de5f24a85e59347850a74524b1efcca309f3d6388db9
openscap-scanner-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
09a40ab8c899174530eb2115924db3aa5c71c3e0f65298153231cb6caec42608
openscap-utils-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
66a7d268a5991f28f987610e3644e4ab2bce8d90ba00afb6388ec0c297de31d5
RLSA-2023:0902
Important: webkit2gtk3 security update
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK
platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK
platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el8_7.2.x86_64.rpm
c410ef75cde5b474c951e88b5af678d7329e45b5398b030027a8d9926e1f59b0
webkit2gtk3-devel-2.36.7-1.el8_7.2.x86_64.rpm
56013ee1adfad7620077622994baeed9d5ee9d37df76deebac40daf867cdd342
webkit2gtk3-jsc-2.36.7-1.el8_7.2.x86_64.rpm
a7cf015c6fee90412e38ae998b3fdb4880e637f1945f5c597b9c17b04ca08361
webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.x86_64.rpm
daa94962eaff4bb9e002007e3ebbf9fede3a7b27599909e079bf4207d140bf82