RLBA-2019:3337 perl:5.24 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl perl-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm e83074c6d1b50c55bc3c15d5da135053bee0f6f3ff53fa0a2d6f1f8fb787a7eb perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93 perl-Archive-Tar-2.30-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 284a79810b19a9cc9c3baf11a16a9d6bcf6c8e4d1f13f9384480488f2f718d37 perl-Attribute-Handlers-0.99-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 0636a55550eddff58de3540236644796ab56a39f5fcf67d4a91cd0dcb394fbae perl-Archive-Zip-1.59-5.module+el8.6.0+882+2fa1e48f.noarch.rpm e20635f433b25577eacbeb27f98f0ac28fef90437eebbd960658d4a24088c516 perl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpm b5b1b87db685204860ad90cc43b8ee94f9cd71824431bd6a81b8363c5e751e33 perl-B-Debug-1.24-3.module+el8.6.0+882+2fa1e48f.noarch.rpm bd8f4c31ca0f3cabadc5a2e24587956f1ab00aa76333ea37e66a416a9f6d4166 perl-bignum-0.49-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 9190d287b3e7aaa44eb4e779e2bc19a5ecf96f1864d0c9b279c7d8a7c4812357 perl-Carp-1.40-367.module+el8.6.0+882+2fa1e48f.noarch.rpm dccd9a98c08525485362d24c2486a8ac01dad4b452b16c3324a0d917e71520e7 perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm 69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6 perl-Compress-Raw-Bzip2-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm 285386224d4aa4525a133a6a6c4b479a06db450c6a76e2a8f5ed0009abd37dc6 perl-Compress-Raw-Zlib-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm fed8bc594c15c41171ff9ff943c9dde016664afd8b97b19241cb6ce9665fbde6 perl-Config-Perl-V-0.27-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 41f99ce395d4284c7a06f40922d1de971503c243b2f5d018837d443fcb60e4f5 perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500 perl-core-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm d20f7d7462ee2663c847590332337ce4103f31c021c59e4911fc750389ee62e0 perl-CPAN-2.16-2.module+el8.6.0+882+2fa1e48f.noarch.rpm a96fde87471eb57269591b9b8fd112e7d9978f96d52713de169b37dfc0c2dc9c perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94 perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm 37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215 perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67 perl-Data-Dumper-2.161-5.module+el8.6.0+882+2fa1e48f.x86_64.rpm ff07ac2ea84d231b230395335bf20e610d754b1a4c0c3dacaedd8bb86d91d36c perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm 401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b perl-Data-Section-0.200006-9.module+el8.6.0+882+2fa1e48f.noarch.rpm 1bb421e4908d5f52b6f38dea6809d38f1ac8057128d9fc21fe11188451298ac4 perl-DB_File-1.842-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm 8bc4d236b809bc1ef3d87c8219c6bf5fd62320104fa54e0298cfc2af9a8b9e85 perl-devel-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm f0b3d906c537e8ada3ce00380d0db5fd2df04fafa02a969d7659f3196b5df7b2 perl-Devel-Peek-1.23-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm bd584a99e03a5acc7bc60c935bc43a8943d2debdb23c63d1c2058e3cb704fc52 perl-Devel-PPPort-3.36-6.module+el8.6.0+882+2fa1e48f.x86_64.rpm d7269e7ae9af14bd81f9c6e981dcd4b81a07759111ce4705e62cdddf1f80210a perl-Devel-SelfStubber-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpm ef98672b390a5ed26def8de37e81a543eb214ea09770ae98379db5af70b8bc17 perl-Devel-Size-0.81-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm 7f0c0405c0c9a1a9076ea4cead8daedb86a8b06d940f39f0cb48ee943c2de1b7 perl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 497e2b909674fed7b47c3dfa281121621efded7d05d019363aff9bfad4c1a527 perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm 457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91 perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm 4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3 perl-Encode-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm 10ff1f22fe59a1c62d0215cebe4436d920b31d0135be7ee841d8b977c607f125 perl-Encode-devel-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm f61f2d035346d60eb831ea5660545fb9051fb1959b1160602adeab91772510ff perl-encoding-2.19-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm 229ce0ac9b24ddc49cbdcb788fbc64849c999ed1d744b49a405c76499f5a4acb perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm 843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297 perl-Errno-1.25-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm da0174efbb99d46acb9cc7ecabe0c10c1a5a875af8040c820755de40eed4dcca perl-experimental-0.019-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 9057e0261573517c85781348b4d2cb8d3a1522980ef1548506d1259993728a26 perl-Exporter-5.72-1001.module+el8.6.0+882+2fa1e48f.noarch.rpm 640f84061e21c1881be61afc0264b2d9f9681d317f58c8a82d33bb0f26e32e9c perl-ExtUtils-CBuilder-0.280225-367.module+el8.6.0+882+2fa1e48f.noarch.rpm df0fddc4918eade6922c99d172232f0a89556eaccfdff8bed0b1247b380861fc perl-ExtUtils-Command-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm 6bcde0c83687dba9c5731ed9addb899d2b102e20c7a48bc0e74db44255064657 perl-ExtUtils-Embed-1.33-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 8ca65427b1b0ef2e3c4ba78a8c62b5ca0256a5732b681e498fff04313ff4ac5d perl-ExtUtils-Install-2.04-368.module+el8.6.0+882+2fa1e48f.noarch.rpm b5be07c68ab2d7222f93cb1b4b153e8735c0c7fab052cc58ef40d9fd5834d30b perl-ExtUtils-MakeMaker-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm d1439b57adf1a41553d1c4818116fedd7cdb8026caf683ee03dd1bdea0a05a1e perl-ExtUtils-Manifest-1.70-396.module+el8.6.0+882+2fa1e48f.noarch.rpm b3b1da48caf33d90c0c386b8dec4848ef8419ea7b78e30c1a4910f16c2ce24c7 perl-ExtUtils-Miniperl-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 17ad27e28b05f97412df3db417462ad1319ed74cbc0d5b00542e8b35b3a55695 perl-ExtUtils-MM-Utils-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm 4a1b1652fe395144d4a6e8879c1b314d7e82a02dadc76367d09501be5a82c386 perl-ExtUtils-ParseXS-3.31-369.module+el8.6.0+882+2fa1e48f.noarch.rpm 514e9ba445971d6e061774f14c67ffe43e36099ece3c6619277a2322ff61e6db perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180 perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpm fc532cf1d81ed8b642813f397665294f4b8e78cbfa9aaff012563de356187cc4 perl-File-HomeDir-1.00-14.module+el8.6.0+882+2fa1e48f.noarch.rpm fda4476417d93399ec4af2afeec4e9b1fc145b913a01e63e0f2b350e6050cfbe perl-File-Path-2.12-368.module+el8.6.0+882+2fa1e48f.noarch.rpm 8dfe4ca93128cc7e0bdee3bb4d617db8be88ad57ec68a8465e8cd952722b4cd0 perl-File-Temp-0.230.600-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 00e4e7af6fa79719621397585031e86ec8b6732b2ee66ef694661dd9fb6617f2 perl-File-Which-1.21-4.module+el8.6.0+882+2fa1e48f.noarch.rpm 359a13c2dd09d047216f4221342f03bc931b794ae10ef9fa2f581cdbec9d78af perl-Filter-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm da4649b1e9d6198f6cf271a2a12b413213360f8c23195b56cf04c1c46605b767 perl-Filter-Simple-0.92-367.module+el8.6.0+882+2fa1e48f.noarch.rpm 043d08f0ba63f36d37e824045f8d1527543539afcfdd3e76715d4f8692489afc perl-generators-1.10-10.module+el8.6.0+882+2fa1e48f.noarch.rpm 53ab16cc2a6044d1b17e0c0ecdf61a32fb5a55ac4e0c8a33999300a9af3a81ee perl-Getopt-Long-2.49.1-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 9b2d450c22271b97710023e5bd6799362b2071600ae3421139aa954315778900 perl-homedir-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 20c3934967025b7449d03f473c126be299bf344a3cb7a89d13e3bc5ba5807ef9 perl-HTTP-Tiny-0.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 26124777a662b13fb7b1bd2c12a0b47af496171934fa72c4e56ecd0f5418196a perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be perl-interpreter-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm aadf024cd62728f0b5d6cf682f154052bb5061e2104ef310edbfe694fad7b9a0 perl-IO-1.36-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm e50d1ac803c655e12334a2819eb42033fdfb4cee41dc7a59c973347a423f6711 perl-IO-Compress-2.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 553ca203f0ff324bc6e32a382669d210fbe6f05151a6fa40b6b5344196675152 perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm 1a865597d7d0da824043c62c50cdd0d3fa02e1f9e1e3420b743a4cffa03d0b4d perl-IO-Zlib-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 85bbbcab465bd31e491cd9a0fb205ca696fb58569eb78a5319afd1b4745a6a71 perl-IPC-Cmd-0.98-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 14a99731e6faca7f2a4e3771d7968bf2646b349fc4c45788217610b9e2308683 perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpm 0785aa352684de2b27e973a2414cabfd1f60ff94cb9b1c8f1595b8a773d74ecd perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524 perl-JSON-PP-2.94000-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 0ab2463181d845a62f04b6985721910f312723fef221e029224182e0478c19c6 perl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm b721a1d996c4455e7c4973dbe7740cc31e3f6956124c2b3bd9ad8005c98e5f3e perl-libnetcfg-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 347323fb832698830bcbf389d3e9cbf86ea251b2430cce64bf418b28a9f45cf4 perl-libs-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm 53051c9ca3d71fb202526a756dc8d9f240a0cf5b5477be5e3a8102d1ee19bd03 perl-Locale-Codes-3.42-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 3674177ef43bc31a15199981f415d0a64eba50134b84af2bd7835cae3e662975 perl-Locale-Maketext-1.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpm 0bdd201a2fcb9b4df608cd0e0d02d32868f4b8ed373b306f0fe62031713a0f6a perl-Locale-Maketext-Simple-0.21-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 464ed59f395cff9befc5bb71a535266942390fab93beea98df2678bc6ae40969 perl-local-lib-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpm ee01c2a5964360d8c3efae128ea244e7eebeb8809b7a091608e55f9d001ebbaf perl-macros-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm 22489b71c4137851c982c6f9c1217fda53481c70eb8636a1f9a0f45382140372 perl-Math-BigInt-1.9998.11-6.module+el8.6.0+882+2fa1e48f.noarch.rpm 5928a5b278077fd041d2ee403e2c796d7f0b6c0719d75db15a648bdf76a577ce perl-Math-BigInt-FastCalc-0.500.600-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm 77bfeccfb00e64cdf5142dd9006801f920e846f3b2e568afac2f3c36712bfbab perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14 perl-Math-Complex-1.59-404.module+el8.6.0+882+2fa1e48f.noarch.rpm e72c5badcef6a51d7769b2cb353ac86496cf77a3a37e30f65c576708a5ef6745 perl-Memoize-1.03-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 8ddaeeb2d7a2aecb961c6eefa7bc45ee75e2c2dcb4f599ee9044b77c4469eb7a perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3 perl-Module-Build-0.42.24-6.module+el8.6.0+882+2fa1e48f.noarch.rpm 0fc01d5f4ede438c698eddaac008f01a9983aa39e8eb585511a312e1a9c44d47 perl-Module-CoreList-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 3f2b62b4468b39ef7c1cf12d611d7dca112376fdd6130a5db6ac7d1476f0b73e perl-Module-CoreList-tools-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpm df905b45a1a24edb447c3ff41b22ab73d708ac22128e1629df328ac3e60b4427 perl-Module-Load-0.32-396.module+el8.6.0+882+2fa1e48f.noarch.rpm eae9feee13e8b09cc4bec0529baeb08651b1c0707d974dd9aa9c3c8f4a119301 perl-Module-Load-Conditional-0.68-396.module+el8.6.0+882+2fa1e48f.noarch.rpm 0bc3a979cc4c3892dbbd4373caeba39b6ea3e12a3734118fb20bc1751a25d89b perl-Module-Loaded-0.08-404.module+el8.6.0+882+2fa1e48f.noarch.rpm df6478817929681dcf95beaa9bd2da1d6b35dc9728cb24085a96aa1dba10368d perl-Module-Metadata-1.000033-396.module+el8.6.0+882+2fa1e48f.noarch.rpm 1d53b887d0f64d9bcf8a541c76876100b0886ced233535ac9aea4664cafeafe5 perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm 3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691 perl-Net-Ping-2.43-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 48c19749f3d1a19180378962e2883b4e40f0baf2d2e1ce3ae19c682d0e461952 perl-open-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 7e66f3227759c812a979237952494ca14ff148b8afc2e64a86f6ae404849c6b7 perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm 4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737 perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm 04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm 658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f perl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpm 030735bc0b0a45c4329c3cff957df2bc31efcaf85e8a83ac14caaf7590278bbe perl-PathTools-3.63-368.module+el8.6.0+882+2fa1e48f.x86_64.rpm 2693dc95ae0325e1a3d4a3060f240cd5c33d5b034375fbb20fdd8e5e96e9bfba perl-perlfaq-5.20180605-2.module+el8.6.0+882+2fa1e48f.noarch.rpm e8764f56dcd784fca14835ab33e6056f2b4a4c92ef4d7ad9f6e2b7c25c39bd5d perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpm 9233f630e519b178b9d2554a6567fa54427edb910b2305affe3fd505c3eebdaf perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437 perl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpm e9edbfc3c8c01620a652dd1dabfdaf9aaa6f8b245ffdc98aaa49d59185f5016a perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8 perl-Pod-Html-1.22.01-404.module+el8.6.0+882+2fa1e48f.noarch.rpm e4050c1f33ea491db07baf1974013c96be37dc5efaa9a6be23340da0a51cf5e2 perl-podlators-4.09-4.module+el8.6.0+882+2fa1e48f.noarch.rpm 29b22dc38352b948d730769d4bc38c15d4d1a8d4d969c3c2c4e0c6209399c440 perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5 perl-Pod-Perldoc-3.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpm bdac88f236f4f4db3eb4c8e71ebdd29d572378b20cbfd077802e86630b657516 perl-Pod-Simple-3.35-396.module+el8.6.0+882+2fa1e48f.noarch.rpm 2488759ef34438ee82b327f160c9539f94aa10cdc19ed411622d4fa9f72beaf2 perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpm 8e0adc72bb11846ec003cf0b3d8a7fda73b819b12cb4cd1f83cb74372e7e1917 perl-Scalar-List-Utils-1.48-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm fc1755cf3306991660dc714ed4428f42d5055e65ff409ebdb9ed01e0451f83c7 perl-SelfLoader-1.23-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 263e65e005eff2a90f456fbe0989a44f48b7cfb8c27fcad1f38a18f3f9b9a825 perl-Socket-2.027-4.module+el8.6.0+882+2fa1e48f.x86_64.rpm 4957d55fb4afbc9b8bfd53e52932fcbc61472182ba93e76e000be9141cdf261d perl-Software-License-0.103012-5.module+el8.6.0+882+2fa1e48f.noarch.rpm a4de15d34e598d0d3f877c4396134528358d8d044d1786d5ef9cd5997f45478b perl-Storable-2.56-369.module+el8.6.0+882+2fa1e48f.x86_64.rpm b40848f3bfc8f7f78cc797f0d2b9387f6686e1e4bdd543774bc1039d32221718 perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpm 75489ca0ff106abbfe0c4bcae3fed2348adfeba22114e664f4d4f000f43d3f08 perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7 perl-Sys-Syslog-0.35-398.module+el8.6.0+882+2fa1e48f.x86_64.rpm aeb828691fd72e80c959c29712d6989e47e7a4ee532113ef5d8af2a4d668493e perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpm 94c51f36928bb91516b6f64205a2589ac0da63b50f1b2fe2b39b8dd3e89cdb57 perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253 perl-Test-1.28-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 053d533f0d4a2dcc82a0675168afcdef3de0c819236c0127015c185bc2945da6 perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc perl-tests-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm f728f0cd0b1d5e021a6e8d7e6a27c49f2d8a2c900ed7ef44e4afa1537dd4bafd perl-Test-Simple-1.302086-2.module+el8.6.0+882+2fa1e48f.noarch.rpm a5b3a0a2ec4099e806960de4795d19e6a75f7323ba8ca18dfc7e90738c7c2fc4 perl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpm a66f0ac7400eb036108d48bac612d9b6e2f35cb1c252f7f0cb16e7a5f1e062ce perl-Text-Diff-1.44-4.module+el8.6.0+882+2fa1e48f.noarch.rpm ca1bf7d5197ada4c75b68880287b665215f1f02b28bbed2dc6b56096abd5e131 perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm 21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5 perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8 perl-Text-Template-1.47-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 33c43f91218da0bab13f9d42ac8d4b047a9a37e430c0060ad40e798a23e1a0de perl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm e3e8703e0c6628e7814fe4c7533d995643a929b4fbb931708d6e22729b694f6e perl-threads-2.21-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm 1e401a335988d10338dd37fc210ca1d6f9b38bca6aa896eafb69c2f8603ae9b1 perl-threads-shared-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm a3c6831646ca262f9aedaa0ef74d51f7f4ade5e3d62e235582b1cddda68f75bb perl-Time-HiRes-1.9753-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm d24075c8ff8a0eaf7d28f5a430bfc91d96b7f1875d7ff046bf93a3d263ef775e perl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm d7d4e67d3dad8f5cf8721b9842d490a23b2d2db38e107fdb785b5b84045aa8a4 perl-Time-Piece-1.31-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm 587332904508887dd5a957a4e1fca0c7b4e52dc8b2218c0a9dc393932442eaf7 perl-Unicode-Collate-1.20-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm 6bb30ea26f566eba828e5f687184ce837c8022ed48283249cb18f0ca335c981c perl-Unicode-Normalize-1.25-1001.module+el8.6.0+882+2fa1e48f.x86_64.rpm 1de5e218c8b65c6fc046e64f0d8bb05a338d949f95ac08a80b186db0e8dd98ad perl-URI-1.71-7.module+el8.6.0+882+2fa1e48f.noarch.rpm 1929e6de9956a54147a75c3101490f580e7b998c2bb12e15338346aa8d64af12 perl-utils-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 8971fb7943ab5fde05ecd601620877b37be8fdd306fed43ca1957206564845c0 perl-version-0.99.24-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm 0c78542fc30ceb5037a15225340896dfd25299c82a912dcfc025d9fa1638202b rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLBA-2019:3522 perl-DBD-SQLite bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-SQLite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 RLSA-2019:3553 Low: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gdk-pixbuf2-devel-2.36.12-5.el8.x86_64.rpm b8c8dddf847d45a247134741a359ee1bacb5f9ba572049535b170e93aaa535f0 gdk-pixbuf2-modules-2.36.12-5.el8.x86_64.rpm 4214f8cd9b483725dc3fe2413aa4b3d09eb9af33258c25da75aa099c7f2d2b90 gnome-desktop3-3.32.2-1.el8.x86_64.rpm ff7c272d2f8933f9583907ae692b65a3913d5beca8984b42c653d0b4b7200dcb gnome-desktop3-devel-3.32.2-1.el8.x86_64.rpm aedc70d3417a92959036b96aa11ef6789b39e7fd39254469cce07643fb66fcb5 libpurple-2.13.0-5.el8.x86_64.rpm adf778e01f5416a5dd127aca8da244dde19f30bca81ab690f5e0d4b6e6bbb558 pidgin-2.13.0-5.el8.x86_64.rpm 3884e426334ed867c8a62430e84cb727129b779cac36a5a160cef24189c0d7d9 RLBA-2019:3621 libidn2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libidn2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms idn2-2.2.0-1.el8.x86_64.rpm 1033e6e8663d25b8a67fe1bc623022b9dbe46c3677bdd57ff7479dcb702a478f libidn2-devel-2.2.0-1.el8.x86_64.rpm ea3c362189034cf785e27fe49c99adfad0d9ab6ce3b64cca0d1f83ecdf4182a1 RLBA-2019:3634 blktrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for blktrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms iowatcher-1.2.0-10.el8.x86_64.rpm 0e31b9e5b1600fe8941c67d4afda394165313bf883ee0768e631d4b6bce031d1 RLBA-2019:3667 mtr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mtr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mtr-gtk-0.92-3.el8.x86_64.rpm faca355f3c563059601dd8095f35d64f15265083e44d83f1fd6422a5113e5f52 RLBA-2020:1759 newt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for newt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms newt-devel-0.52.20-11.el8.x86_64.rpm d5f84c2c76587117c782bcc6b998816c981f9d7102facebab9febcea01982c89 python3-newt-0.52.20-11.el8.x86_64.rpm ae6af49eb197e57b1fef79a1ebf0057691e4c62c80abd173dc4392ce787b23ae RLSA-2020:1766 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms baobab-3.28.0-4.el8.x86_64.rpm 56f8a2293c11e3f19dc2cb0d4ca2dec49a6ef365db7e2962024faedbb6bc3a59 clutter-1.26.2-8.el8.x86_64.rpm 0a20b879448dc466b4b6969e4ea17f96e4260f34f75586dfb3bb4ef311f1eb04 gnome-menus-3.13.3-11.el8.x86_64.rpm 06cbc8d95bf63fee450c6c8368cb9fd644756a71a24abfadeedc40a59a32da94 gnome-tweaks-3.28.1-7.el8.noarch.rpm 71a35489c56519f5a85f06df899d7690c42006e1d2263ae5f7d07cff106600e7 RLSA-2020:4436 Low: gnome-software and fwupd security, bug fix, and enhancement update The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. The fwupd packages provide a service that allows session software to update device firmware. The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2). Security Fix(es): * fwupd: Possible bypass in signature verification (CVE-2020-10759) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for appstream-data, libxmlb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. The fwupd packages provide a service that allows session software to update device firmware. The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2). Security Fix(es): * fwupd: Possible bypass in signature verification (CVE-2020-10759) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms appstream-data-8-20200724.el8.noarch.rpm 2c9a720f54ff898448f86098e789fbb45759d5eef43a9f5550e27ce194baeca0 RLSA-2020:4451 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dleyna-renderer-0.6.0-3.el8.x86_64.rpm 2f9749efc99a8d58051088a6503a0cc20f300275bfd73733af25a7108587b0a8 frei0r-plugins-1.6.1-7.el8.x86_64.rpm ecd0c1309283d96d8cbfd04092ae07b3fc18f873e531deabad44ecc116dbe33d frei0r-plugins-opencv-1.6.1-7.el8.x86_64.rpm 4af320468f53f2f48fd47dfb7759901d8bcd03d00c3c231cdb7e7f11f0e082a4 gnome-remote-desktop-0.1.8-3.el8.x86_64.rpm 6895a3d7cc1c05ec83c19af4e9de9542861f0aabf4c81e5c4bb4943c57ea89a7 libsoup-devel-2.62.3-2.el8.x86_64.rpm be82aed5a0a8ab97cca222b4749954ac549602e571e98fbb2615e98ce6aae810 pipewire0.2-devel-0.2.7-6.el8.x86_64.rpm c78cbf37db63fc70418f2625e614ed86a97722d745f773fc359538437039e65b pipewire0.2-libs-0.2.7-6.el8.x86_64.rpm a4e2934410c2f4b95acbd95e11e13b62886604d616a4df3b7f394ed3105fdffa pipewire-0.3.6-1.el8.x86_64.rpm 693e54ebbca5683ff27b042d8c41a428e0d7b33fa0790ab1b0a574cb58bf4cc0 pipewire-devel-0.3.6-1.el8.x86_64.rpm 419cd82f2ec598818f9d4671fed3aaae7c7d70c77fa732cb07532f94309f328a pipewire-doc-0.3.6-1.el8.x86_64.rpm 5fdf2f45560524bf4131d5e97307ae3dc3a57aeed287d9de4789d21e1d6958cb pipewire-libs-0.3.6-1.el8.x86_64.rpm f528472a4a2050271a728b61135788b4aa9abe64bf36fbe4eabbb6e40ce1e687 pipewire-utils-0.3.6-1.el8.x86_64.rpm 3fa26eff88f75628c7a3418e414bc1d6a17a268a07087b1f3a0569a8fe1d4583 potrace-1.15-3.el8.x86_64.rpm 4d635d9ca868a260a7ca30e12118d032ae73ea7cf08876d96119fd7731d2be33 python3-gobject-3.28.3-2.el8.x86_64.rpm dadec73f4be5ca582edcf9d723fd75b27e725b5602f764879a675dbf675716dd tracker-2.1.5-2.el8.x86_64.rpm 6b3aee540738b212cb7f1b9f4115a3a387d3f79626c6b3b2698d20d13bc83d9a vte291-0.52.4-2.el8.x86_64.rpm a25068629ad725d7630d121f24036dc4804b215ae3014e4f224b81e5efd8d2ee vte-profile-0.52.4-2.el8.x86_64.rpm b2c7f7eb37729c285c8c7c5902b408241b8cf8b25799e28f2849bb9797234cb5 PackageKit-1.1.12-6.el8.0.2.x86_64.rpm 443bb3ffdb7c33e79a5b8e187cb8a84e60bbac288ac1e01fcaca47fc80096c09 PackageKit-command-not-found-1.1.12-6.el8.0.2.x86_64.rpm 198e466a067517d90a9c2cb6aaeaa448879c7188287b015b2942639872238a21 PackageKit-cron-1.1.12-6.el8.0.2.x86_64.rpm 3068fc76ed2e84514a2a0cf4e3b46d4cec51982130b86620574bdceac6bc08e7 PackageKit-glib-1.1.12-6.el8.0.2.x86_64.rpm 802c4bc3ac43e64a4169ba2208ef40301af21de468efd95c01362c82e768f23f PackageKit-gstreamer-plugin-1.1.12-6.el8.0.2.x86_64.rpm 3625ed7fbde9cb61d319a0eb8fd18761084fcf4e552d2e8deed1ac387146a410 PackageKit-gtk3-module-1.1.12-6.el8.0.2.x86_64.rpm 165aaa0afa3c75cb66d40c66c9eed8dd7a34744eb1908775aaa5a3e96e56f89b RLBA-2020:4557 zstd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zstd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms zstd-1.4.4-1.el8.x86_64.rpm 3a5bea3f29f92bd1b4865f129ac8807a20201ccfb7d807b8e6e5a7a77174a2ac RLEA-2020:4727 new module: perl:5.30 This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93 perl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm 4ae5d31a58e084256d22b67d1c4a35c947fb7829b40bea49b2ca54e21bda4908 perl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpm 3b4eaea2d1eaf8d161f48a771f08fac793d30846ad09b36883cce5952ff3ad2a perl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpm b5b1b87db685204860ad90cc43b8ee94f9cd71824431bd6a81b8363c5e751e33 perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm ba92a2cb502c3000180f08e99fd70b5fe1d867c629fe7f88ae62e884a805992d perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpm 9f0471053a901dc7d005594d190e10e8c8b2fab6e1e43e8d7962c9abb86b1890 perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm 69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6 perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm ed229dccbc0b92ac2a641e672a1b62281cb7887ad180cf0eb7bf70a72d8190e8 perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 70b3d3861ab9c1695c9bd398d4bd822fed4f52f843ccb34d987b1c72fb6f6190 perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpm 8dac2514b5b2da9f4b0cb4d6e0e5a381eb88a40c888f56643175a0d4e68074d0 perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500 perl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm a3447e3b3260b007272f8c84ef84acb17cb71d37b7880d1ef6357951ac562315 perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94 perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm 37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215 perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67 perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm 49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16 perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm 401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpm 73ba6e41ae0df4855079b75bbf5b2131a5b0fb3f99f0ea9b91ad8812b5df0b02 perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm 847b4fb0ddf80554f9db4f306d9b404f77ff15198af23e1afe2abf866e91117f perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 1da6e17c67943d6d69e57ebd15f72bfa43b6015870fdd338c76b117b2be9f67f perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm 11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f perl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 497e2b909674fed7b47c3dfa281121621efded7d05d019363aff9bfad4c1a527 perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm 457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91 perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm 4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3 perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 7acf6021827fa52dc9a1fcebcb239d23d9096de93e0a6132f0fe4fd541f3f1f2 perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 4189d9a4acaa4add86f0991f50f74e444b59afb872b205e444480c428e247eaf perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 5e8ac50accc1d9281fedfb67c5f38066ac8d9e1237e1d7cc7fbef1e973fb89fb perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm 843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297 perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm 4e8daf0287ea71e64fdb9e6391f257d9ea6c23547d5894df74a595b3ff610199 perl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm 65b9ba1b7e84507cc648a422475283e27ed53de4097f1ff2121b9f9ff3d97c7e perl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm 043ff366aad10957c32292d322c3458202d739c703261b8cbfd14f58bb5da151 perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm f636b21815be2e444fa5b42e99e4328c024327af776bffaebd9d33825d346be7 perl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm 857b4014bddf434d5e21745f92b52a4f046f666cbbdeade6c4043a1b8796e40c perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm 398bd10b093a537a73d3d0df58d4581b21c67d612279a37b22fd614d23adea17 perl-ExtUtils-Manifest-1.72-438.module+el8.6.0+878+f93dfff7.noarch.rpm 4d1776ec7edef8aa7ef06b53a9ccfe28eb78d28dbac1fcdc0f9826591cff9ba6 perl-ExtUtils-MM-Utils-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm cca7d27dbc8d3bb0f080aecd8c1f15e5164a9d9087bac91fffb21753ea601f17 perl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm d8b1feea37aabbfefe537f9b4b886a095d450334b9fb457ceb469a75d53dcd6c perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180 perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpm fc532cf1d81ed8b642813f397665294f4b8e78cbfa9aaff012563de356187cc4 perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpm 995e08ed28513f82e5821425a4d4fc6edc45ee0a783a1f26eacb6359b3f42e11 perl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm f404d9e30a5f8768ff3926e32b45b0b8334f72e3e92b0e4b25c64e05f727708c perl-File-Temp-0.230.900-439.module+el8.6.0+878+f93dfff7.noarch.rpm 67bff95e50d168699ea7a9ea2ec030daabd312f2aaa5d945ac34f92266216242 perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpm 5094b53d07808bfd255aa5b9a1315ad01f5d1892624a3381074d552d82ed562d perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.x86_64.rpm c8ba40590e844230d1f154071d9e092cb479fa4993a8352a0d9c7b3ed9764e01 perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm 1ff0c6c297133b9629712d61b0751dab739548a09a9ed1a014f89b19e210942c perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm 37fcc7a1a0384d0d2fed35aa935e2249dc65641c6ed36cfbaffb844dce6ea14a perl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpm 78bd8b6bb85141daa4c8a4ed9f292276d00dc3d79511de14a028deda013b6f89 perl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 22f6dae1203f60f7112d8a3bf69f730cca7e92ff26307fa0479297b263a5a853 perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpm 0ee7a2f08d700939b9878147d4a711c27fff146c037bdddd7f4375dfbe632c5d perl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpm 46aa912995002371271894c952f50b8f1fb45fd4afe94a1a0a12708173c5d73d perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be perl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpm e1b32c483db01fa644aa11da6316c65ae15c52cdc683702f2724e1bd74c36fc6 perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm 1a865597d7d0da824043c62c50cdd0d3fa02e1f9e1e3420b743a4cffa03d0b4d perl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm 24140d4b859d7da7b5422b39bb33058cb4ed037ec81a33cb29331d61b8391d36 perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpm 0785aa352684de2b27e973a2414cabfd1f60ff94cb9b1c8f1595b8a773d74ecd perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524 perl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm fcf81923aca881d995501ac6adb0b600d85acbe1e146c92024e96bd92c8adfa1 perl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm b721a1d996c4455e7c4973dbe7740cc31e3f6956124c2b3bd9ad8005c98e5f3e perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm b642ac31df8f05336d101b3607d855839335742ba4b80652bcd4d19fa8c71b2e perl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 1bc02c4b987dcdcba510201debe3955a9fb8212874e3d7ee8342cc5b248dceb8 perl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm d12bc389fea342859c1ce3fa9a6116e31ae66d6225797ed145796ee1d73325d8 perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217 perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14 perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3 perl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpm df5dd4eb3e9897dba7b9d45123b567b21f33f83fe70141c3ed2fa6132d619c82 perl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm 20d8397c0ab7ad88baf463277dd8fc673e094ea05a4adda02fa0f692ff6374c1 perl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm cc8295684213d6c1f1b9bd7f25a88b9621fce85560e9a719a32121cb3b762361 perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpm 35d8c093f5f2aacfab1e753a4c0c2bcf2736885654ccd881b194eccb8a3490d9 perl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpm ad836cedbb118144fbb29c1adacf8745b0be196bed0e7c20a7918df0c7632327 perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpm 1d281d8bb79c2f3a7f8e8245faeac9d5381e450515d7e510b4bbf8f9313205e0 perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm 23471694783ed058ce2795ffffb3754ac5f991a18d78b9e6760850e3faef4b79 perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm 3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691 perl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm 2107d6fe2bd4c30f879d05e9e91f3a67b669e9311a7d821bc1eaedc69362ac0e perl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm 4e7d56c452587e7eda8a6d95f035df77838d724beb89d8300f489bf05c4119c6 perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm 4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737 perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm 04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm 658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f perl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpm 030735bc0b0a45c4329c3cff957df2bc31efcaf85e8a83ac14caaf7590278bbe perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf perl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpm 68d69421e6ecdd0c17b838ce5cd87e6178e480b859e741d75790a38e001a0e3a perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpm 9233f630e519b178b9d2554a6567fa54427edb910b2305affe3fd505c3eebdaf perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437 perl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpm e9edbfc3c8c01620a652dd1dabfdaf9aaa6f8b245ffdc98aaa49d59185f5016a perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8 perl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpm f97ad11912e5d33ff4ecd9080ca24d427fbf5d44165f53d663e0affa77f2b01c perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5 perl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpm 684f8c4f2fad53955dc42f7e46620c817d77f6ada02b3585ed01890bc86ac7e0 perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpm 8e0adc72bb11846ec003cf0b3d8a7fda73b819b12cb4cd1f83cb74372e7e1917 perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 19c9476b75c247420525ff36ad321453c46d0262305cad01bfd0eea652a70093 perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpm b60d7dc5e566fbe0b9282e1f90b628d86d87f6e7c091290737cddea24d9bdc1b perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm f303faa506dc1d7735a1fba64383acc4c4075c37a502e5f3a6793849dd3f50c4 perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpm b7f894a292d6278b60fb5754d1ed5ad9d199c8f84d140f47dbeb260d6a3eaa35 perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpm 75489ca0ff106abbfe0c4bcae3fed2348adfeba22114e664f4d4f000f43d3f08 perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7 perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359 perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpm 94c51f36928bb91516b6f64205a2589ac0da63b50f1b2fe2b39b8dd3e89cdb57 perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253 perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm 77b7f51b21e2373d909905b0d45191814fbb1c8dd9c855a250048f9437944533 perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpm fa90202ab3e84856ac931df1ec5dfe31e4854dae428d3dc1a888e17baeccb30b perl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpm a66f0ac7400eb036108d48bac612d9b6e2f35cb1c252f7f0cb16e7a5f1e062ce perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpm a6145f9481f9059c301eb1355d0cdd688feebab8d19fc2b2ebcd591737903628 perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm 21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5 perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8 perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm 0ad56d5e6405906910a2efe8448960cdb0b14fe3557e69cf8b59651e75a6abca perl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm e3e8703e0c6628e7814fe4c7533d995643a929b4fbb931708d6e22729b694f6e perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 2e5b2999050f52a5be6078a7024fa2d8696471958b37582c6ae57f869b22b247 perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm e95a1149d05da0bdfc99db4a561b0ffee93dd2d670951b8bf9e9f0bcd867473c perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpm c32bff30e752a3efa107b8a0d0a6758e720770d895c642fbd8434f86f54ef46e perl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm d7d4e67d3dad8f5cf8721b9842d490a23b2d2db38e107fdb785b5b84045aa8a4 perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 329b8a55fd6c40d52610e15f55037edc8395d682ed5ceca6611930c6ec0c80fb perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 641de0fcef19c0f7ab506f797d92584ac6c17d3f1335d5fa6fb0d515c8220612 perl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm 6852a1483a15b008cb44a2881bae6beec4dd4e1e00d6743caf3d1e822e38bfa0 perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm 96805b92a1012403138db9d46d761fcafc05517684b5ff73a5ccfbf75edb0d59 rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2020:4767 perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-x86-64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2020:4802 perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-x86-64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLSA-2021:1586 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms atkmm-2.24.2-7.el8.x86_64.rpm b04306a0fbc6f392a135fa1923e314ee71148dd95394002cb9278d2cf35040be cairomm-1.12.0-8.el8.x86_64.rpm f87200fc6c9098a97e7000b991c9d9b55665c936adf071461e857da01b6b74c3 chrome-gnome-shell-10.1-7.el8.x86_64.rpm d0c4998aaddb8c3b81afc3826beb1b1e046a0767269163fecbe4bb7e209ef64d dleyna-core-0.6.0-3.el8.x86_64.rpm 8061d05aa41fc9d4379e9882c88fe0d7081d8a18b3bcc3c928614261aa3b3cf7 dleyna-server-0.6.0-3.el8.x86_64.rpm da0bab305997b9906a2357a21e93c7f5bb7cd0334a55b0a537d60491a150113a enchant2-2.2.3-3.el8.x86_64.rpm 85cd0e04908d96550e8e132a527695d74d85113baa3ebb07847801a06a646554 geoclue2-2.5.5-2.el8.x86_64.rpm 74c8c4eee50054f5f23588b01d6486d847555ffade12edee2422223b9543b101 geoclue2-demos-2.5.5-2.el8.x86_64.rpm 9ccc5a181d474a2681fc432a1b8dffcf57a3f03485f9f702337da7ad5135e089 geoclue2-libs-2.5.5-2.el8.x86_64.rpm 8e9470a09160870f9d81a3f3a63f4ac445970737779a3c05f08af39fab2f89dc geocode-glib-3.26.0-3.el8.x86_64.rpm a2e669a2b25bfed174353e7921009a37f044f5d4db70248414a05d728205f242 geocode-glib-devel-3.26.0-3.el8.x86_64.rpm 1f0f79da8cd8327846386294463ce07a7fecd6fb4aa0b17bf8cb2585d7399dd4 gjs-1.56.2-5.el8.x86_64.rpm f2a3b03056695cd41cae4b0d078ad602c7b0478af1df7dcfce54b99b01517480 glibmm24-2.56.0-2.el8.x86_64.rpm 75d1f9cc2d4c44096a680f2f2922177cde0cbb3124b337ab13ec48a73aa859f1 gnome-photos-3.28.1-4.el8.x86_64.rpm 7c19b9128c3f6031cc1c96e50aa0f16ebd9e0108f52342e2259c56496875db0f gnome-photos-tests-3.28.1-4.el8.x86_64.rpm ca37177d2e0689a5d6652ae7a39f4baba08c61e8f7d77b45cf2f8fedb5581055 gnome-terminal-3.28.3-3.el8.x86_64.rpm dd27a423551804084221da7392ac0128cfd64447b1147140a83bbe5d8780d2f9 gnome-terminal-nautilus-3.28.3-3.el8.x86_64.rpm 285192366764466557fc62eab78f3de9a4462c2b166572ada7060510de416cf2 gtk2-2.24.32-5.el8.x86_64.rpm babbb096fbe18354be01a584983de5d2c26d69f318ee964c48850b9dbbb1b1ff gtk2-devel-2.24.32-5.el8.x86_64.rpm 33f6d0a0e7a5edf62e556cc364580a4e3e01d970f8e9d5f7cc4f3cb02bc8497c gtk2-devel-docs-2.24.32-5.el8.x86_64.rpm 68284375144a790dad399ac3abd677d59349c854fa20760690e5618807376293 gtk2-immodules-2.24.32-5.el8.x86_64.rpm df0d38789261a7af178f3b8914ec84cb0abc2c393372d4674320dd7d86431ac6 gtk2-immodule-xim-2.24.32-5.el8.x86_64.rpm 3c5dc65defe122704e59969bc2fbb7b17202f6e637c349669d367ff117b86fe6 gtkmm24-2.24.5-6.el8.x86_64.rpm 362aa1bf60d328749b4765fadd1febf5e43e36edf21e8ea03d90a0b6a38b1182 gtkmm30-3.22.2-3.el8.x86_64.rpm 871356ba2f4cc9a426dd1429a748237a8ab4c0b32ce61d0f1b22fb39500e0e24 libdazzle-3.28.5-2.el8.x86_64.rpm 6da46d51e00482965cf6bba9ac1f4cc1aa89a61ba645d343d273dcdece579971 libepubgen-0.1.0-3.el8.x86_64.rpm 4955abb3033684450018aac873107bb4e9e62a8e2835ce4e5b6cafa75f59dcbd libsigc++20-2.10.0-6.el8.x86_64.rpm 8f1c1f4b47c7fac19f15cc3815077b0677a1fb2c2cd1e7d5631370cf28ab07bd libvisual-0.4.0-25.el8.x86_64.rpm 770b1865cb2580cdf75ee48ba979fb912bc4a48fb2fd8af2d69f554d923a2c85 OpenEXR-libs-2.2.0-12.el8.x86_64.rpm 35f0d3fb2d52c671f9a86824a4d524d53a29d16e5437852eb12cfc10bc69f47a pangomm-2.40.1-6.el8.x86_64.rpm 0fb7b384cfe916c06b91f28b6abe87e16822b150af8a8bd096007a104d698b5c soundtouch-2.0.0-3.el8.x86_64.rpm 8f2d071970bdb85bcf2fc23f0d9fb7c327ab2f3aca90ea16159ad3a405fe8b8c woff2-1.0.2-5.el8.x86_64.rpm c4a5f23fe56dbbd6b222b45b19fa6b1e0728a4d5d2e7c9af366cdd609481be2e gnome-boxes-3.36.5-8.el8.rocky.0.1.x86_64.rpm c9b9679109843e21773525b39e990d4d6cee077d89c79cc31d8bb53a10b14af4 RLBA-2021:1591 libxslt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxslt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxslt-devel-1.1.32-6.el8.x86_64.rpm b370f997b6f3aad5205c0a37e646e8a5356adaea60e125bc1af7a4a73347e6fc RLBA-2021:1612 avahi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms avahi-ui-gtk3-0.7-20.el8.x86_64.rpm ccf168c311e9d313b7b68399b583f1f4ae322744ab63e76c923e6b846d8e19d6 RLBA-2021:1619 efi-rpm-macros bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for efi-rpm-macros. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms efi-srpm-macros-3-3.el8.noarch.rpm be93fbe5d15a6af78df7e5441fa6c0a13ef4d4ca73431cd7a8e49c691aa3442a RLBA-2021:1681 vhostmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vhostmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms vhostmd-1.1-5.el8.x86_64.rpm 003e5c788d60a86ba8f5a61d9f8baeda9f80c03ce584c50c316e7322e2bdd333 RLBA-2021:1687 dejavu-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dejavu-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dejavu-lgc-sans-fonts-2.35-7.el8.noarch.rpm fb84cf5353f07a8ab165754d6c92b019a12bc879457165766e30dc960b338c83 RLSA-2021:1702 Moderate: brotli security update Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for brotli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms brotli-devel-1.0.6-3.el8.x86_64.rpm d512ea0ff25f717bb9e8c779990e2ed42751637be036c574cc56c324b62b8dd2 python3-brotli-1.0.6-3.el8.x86_64.rpm 4ea1dcb3f2f40a6dab1c067a811163f1a07143e54a8e473c40c213c1cb8cf19e RLBA-2021:3594 libdb bug fix and enhancement update The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) rocky-linux-8-x86-64-appstream-rpms libdb-devel-5.3.28-42.el8_4.x86_64.rpm 4038cac5a947df780f43ad543f735f1c0307a106ae02b1ac518fba0349d5bdc9 RLBA-2021:4353 lm_sensors bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lm_sensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lm_sensors-sensord-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm 6fe3b62dd82076b44d2d79404bf82e491136151bd16c837331b3eb0df01fa795 RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-autoar-0.2.3-2.el8.x86_64.rpm ec104b742f1ee24ed3b790f8bcf2e9c3624d835c37d4f046226737569af9c0b5 gnome-calculator-3.28.2-2.el8.x86_64.rpm bfc480d1f9e922cdeebbd6056672a2a349776204c6be7a6240a5eea1a623de39 gnome-online-accounts-3.28.2-3.el8.x86_64.rpm 128fe18ab8bfd55fcf3d048764c08baa784e475c43e05bee007663ed65266f64 gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpm 2424a681b21ec3cc257eb8117d833e143b766ced3bb3f0d80fc6580ebe78b52d gnome-software-3.36.1-10.el8.x86_64.rpm 2a9f077aa8113e2a4c4c3788d5258918fd7aaa4a97a3b5696d604e849fd23c5d gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm 440c33ca267b2f26215df09174ce6574a2bb5113fe6d7c740eba3f1133c93af8 LibRaw-0.19.5-3.el8.x86_64.rpm df151c39f20ea9815d46aff810e74f2c837a34fb755909c23d2e159714999d90 vino-3.22.0-11.el8.x86_64.rpm 3ba0c279a775b11f29b6dbeb5daa462d4bbe721a3bc0f541dcaa8b0c25555ec1 gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm 12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94 RLEA-2021:4405 libmodulemd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmodulemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-libmodulemd-2.13.0-1.el8.x86_64.rpm 261911bd0c62a94982ee44638a391b2a47f18434e2b5371ea8c76a5b0ed4bdb2 RLBA-2021:4412 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mvapich2-2.3.6-1.el8.x86_64.rpm dd351b8868ff7bc80fae9dae488eaa189dc9c7f6eb396d4e79d210376ff9bf6b mvapich2-devel-2.3.6-1.el8.x86_64.rpm 0c0305bbe23485eb35b434972dac29fbf0eee28f6cf4b726fd6bb9c34c46612e mvapich2-doc-2.3.6-1.el8.noarch.rpm 9aaca96ccd26080a515d39ee7b7dd5ed0bbd699c05ebdd970ab8a94e4008c188 mvapich2-psm2-2.3.6-1.el8.x86_64.rpm 825a16773f805807387cf6b32d8cac59df358d8d44fd6f312a9c78aae72eb3a7 mvapich2-psm2-devel-2.3.6-1.el8.x86_64.rpm 3526d362751e05cfb2f706200a3b03012ac93d07562a638d34f87fb6468ef04d qperf-0.4.11-2.el8.x86_64.rpm 8e2a2d8a488101682d7495de161c2083b8fb3f12ef9828c7fb4c12324df5c7cc rpm-mpi-hooks-8-2.el8.noarch.rpm 4a022972f93d34ec9ce71ae06cd75a345fc2cfd6cd6c145eb39b7e39e8b05e85 RLBA-2021:4442 lshw bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lshw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lshw-gui-B.02.19.2-6.el8.x86_64.rpm e8bad6055146ad48980556830eaceb61a86e42c3b36955ccac1f2e4fbd8a287c RLSA-2021:4451 Moderate: gnutls and nettle security, bug fix, and enhancement update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nettle, gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nettle-devel-3.4.1-7.el8.x86_64.rpm e139494f5eaa94ff5410adc22013d4c5b3888d875e78089bb1c3a35be09c2933 RLEA-2021:4488 hwloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms hwloc-gui-2.2.0-3.el8.x86_64.rpm 27e4f5230cad7b62e5ce72e640fbae7afd9c48d35b72bc3e0e94084ceca508b0 hwloc-plugins-2.2.0-3.el8.x86_64.rpm 18903b95ff7ea05265d1fcf969c3dfde7a1191f277bdce76ad93925c6ffb9ce1 RLBA-2021:4501 emacs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms emacs-26.1-7.el8.x86_64.rpm 78f6e6a1910c95a773be74c70dce446bf600cd63cf289b56547447085b7eaa53 emacs-common-26.1-7.el8.x86_64.rpm 9c89bc8eb9a0cfe9f514a9100c41cd602d12f928497ad6e810b29a84587d7d7a emacs-lucid-26.1-7.el8.x86_64.rpm f689279f4d76738af86a78b6e546214a695034ea695edabba93c53d4f9b24592 emacs-nox-26.1-7.el8.x86_64.rpm a30a83b2f2aea300c30dc0cd3d5fbed857699495fca57cdb57209e84cb8886b7 emacs-terminal-26.1-7.el8.noarch.rpm e2e3fd63ab15f4edf00ab4a77ee73deb0fe6888c2defe538678ed766729d2c42 RLSA-2021:4510 Low: lua security update The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for lua. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lua-5.3.4-12.el8.x86_64.rpm 49a648c94ed0da6494fd0e3b518c5c2e7d08f0f888b7de85f22f6577e4bccecb RLBA-2021:4516 usermode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usermode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms usermode-gtk-1.113-2.el8.x86_64.rpm 050b67bd0709281a9191f8e9be7b6849456c6d0bdcd06951ce44090e2aa686cb RLSA-2022:0658 Important: cyrus-sasl security update The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cyrus-sasl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms cyrus-sasl-sql-2.1.27-6.el8_5.x86_64.rpm 66fcc6223022b9410b104521f3eddc569f87487b818bd807a28a0feff071b741 RLEA-2022:1954 perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-x86-64-appstream-rpms__perl perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2022:1956 perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-x86-64-appstream-rpms__perl perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2022:2014 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mpich-3.4.2-1.el8.x86_64.rpm 74148fa6cc16f87b94559df63f245c2a028481b343e0ff625cb7065bc1dc2b80 mpich-devel-3.4.2-1.el8.x86_64.rpm 4bc763f8f86364ff81a5973199876e168cc9dbe0d36cfcc53c68baccd623c492 mpich-doc-3.4.2-1.el8.noarch.rpm 785f500c25e4018f095172a3c27bebc89dc8e5d0289b3e77f82f69412dbed17d mpitests-mpich-5.8-1.el8.x86_64.rpm d0714e70449d9184851da372b81afb64dd1d73b5fd01fc558eb260f3df0ba756 mpitests-mvapich2-5.8-1.el8.x86_64.rpm bb8e7188cd01962e4e666416accabb8cc8cfde090ade2e3ffbfa4f9c9f885988 mpitests-mvapich2-psm2-5.8-1.el8.x86_64.rpm 7530a1544a8c5c220c7d4241216eed9507f270f46d4b5d5e5f09ce4fb5af6541 mpitests-openmpi-5.8-1.el8.x86_64.rpm 93e0650f54ef76aeb8fd9d533661c9ff699f6ad106c176fe56ff0e4e6d01d043 openmpi-4.1.1-3.el8.x86_64.rpm e7af704f8d835ca6f51c90949305ecb44501c84337b1370a7829eaf1920e4f0a openmpi-devel-4.1.1-3.el8.x86_64.rpm 22c66b5c2b99405d401d82a2d9f4bef3510964a36f5db51af4e10bcf3d107a64 pmix-2.2.5-1.el8.x86_64.rpm 52a6205c21965646bed592eb3d3bd2a87e15d3ce4891f4802ded71cb14a277cc RLBA-2022:2023 net-snmp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms net-snmp-5.8-25.el8.x86_64.rpm ad38b78a6c4715dab4f8426336d833075bf2ab0bd0ba552047020432da88ac74 net-snmp-agent-libs-5.8-25.el8.x86_64.rpm bdc3346d124753f657fcbd61969966bc3062a70bb05071378bd56bd30ec6a84f net-snmp-devel-5.8-25.el8.x86_64.rpm 8913a90a7e732bf28f2abcaf3861708bd4191691278b13e1388b469ffce39b42 net-snmp-perl-5.8-25.el8.x86_64.rpm 91b0132109c0ff1363158041fba5d5f248c91b99b0fe497940bdca04a48be150 net-snmp-utils-5.8-25.el8.x86_64.rpm 371193495c7e5caf863d812317dad5a133f49a919c2a09df9d13a8e963011ce6 RLBA-2022:2027 json-c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for json-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms json-c-devel-0.13.1-3.el8.x86_64.rpm 4486495d3b2d376b0571c35f1830566455e0678698c6dd475e449b99d38f53c8 RLEA-2022:2029 libseccomp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libseccomp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libseccomp-devel-2.5.2-1.el8.x86_64.rpm 6bea64b05e30226d2db6ed7221e8c7c0cef4165cd07a72c0435a00c0e9b8b81d RLEA-2022:1869 new module: perl:5.32 This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl perl-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm 7cbe324defaaf158029c8bb85417396a131c0562ba68f15912cf6caba39ee383 perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93 perl-Archive-Tar-2.38-3.module+el8.6.0+879+823e3012.noarch.rpm 896f84217933fb9a1911087752ad7ce902692834a7f81ecd56a4398c257d8568 perl-Archive-Zip-1.68-3.module+el8.6.0+879+823e3012.noarch.rpm 0f0f6f60858417d44fcad3e03f74afd274ff40a01e8c09a22bb60e7c7b23528f perl-Attribute-Handlers-1.01-471.module+el8.6.0+879+823e3012.noarch.rpm cc69147359fd01e984e9f0b7f1fd57b6c3af33351c1f0e76c70e51e558742784 perl-autodie-2.34-1.module+el8.6.0+879+823e3012.noarch.rpm 91a1b226f91006b0ebc5918e12786feb3c381e1950372d21cc6883b6b6806d0f perl-AutoLoader-5.74-471.module+el8.6.0+879+823e3012.noarch.rpm 84a78350d8c8da6478e9e0094084a2e034ac6cc0bff0596162d97b4576f54d3b perl-AutoSplit-5.74-471.module+el8.6.0+879+823e3012.noarch.rpm b508bb6e554d8d9ff38a882a93e738ae308aed39dbda2ac9d5d841a423e1bfb4 perl-autouse-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm 6f75d27406d5b3a1b63d39f0e5e2418292b507d737a52abf0b89afd33b24c135 perl-B-1.80-471.module+el8.6.0+879+823e3012.x86_64.rpm 3fca367721228806c0535072913fc5da50b6146cf6c3fdf23488abf7f48afd23 perl-base-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm c6a793847ad5c6fe6d21886cb9904514ee014e30ca492d8ed15c18598d2bd473 perl-Benchmark-1.23-471.module+el8.6.0+879+823e3012.noarch.rpm a6c81a824472718a9198558a0687ab69db6862c738c927e118c6e45f1f4f8e36 perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm ba92a2cb502c3000180f08e99fd70b5fe1d867c629fe7f88ae62e884a805992d perl-blib-1.07-471.module+el8.6.0+879+823e3012.noarch.rpm a716d8647407047b09d14beee6f214e4ee69b74d9116a0098b529ea931413321 perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpm 9f0471053a901dc7d005594d190e10e8c8b2fab6e1e43e8d7962c9abb86b1890 perl-Class-Struct-0.66-471.module+el8.6.0+879+823e3012.noarch.rpm 4eafc5acc7cb511c424861388d5f194496055cdf049e93972994560a7336da20 perl-Compress-Bzip2-2.28-2.module+el8.6.0+879+823e3012.x86_64.rpm 45cb6b8ae71c45500be114d6512fab9cefe7922454e574573c69a6d6df255285 perl-Compress-Raw-Bzip2-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm 26b44886c1ecc20b683eaa0d86e61c0e21007111a78fcadb8e8fa1c0dad9866b perl-Compress-Raw-Lzma-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm 87107b833c9c8adeceddd6218a9af0cf5da0c4e3ce4b8ae46252548a5fd12aa2 perl-Compress-Raw-Zlib-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm 0a950bf8d5334642a3b3aca7ec0e8068af88efa404c283e6814cf645f06b7011 perl-Config-Extensions-0.03-471.module+el8.6.0+879+823e3012.noarch.rpm 10a6e54bd41bec4d64444794368e65fcae0a815e1c46ac16df2d429605a4398a perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpm 8dac2514b5b2da9f4b0cb4d6e0e5a381eb88a40c888f56643175a0d4e68074d0 perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500 perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm 11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f perl-CPAN-2.28-5.module+el8.6.0+879+823e3012.noarch.rpm 76808568b4b4172edfd6333435186bf4c13a99d791df3c203b08838d263b9363 perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94 perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm 37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215 perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67 perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm 49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16 perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm 401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpm 73ba6e41ae0df4855079b75bbf5b2131a5b0fb3f99f0ea9b91ad8812b5df0b02 perl-DB_File-1.855-1.module+el8.6.0+879+823e3012.x86_64.rpm 294048e1443911d2c7fcbbe3957f8a40c992ba094174731a0af80b6fea60067c perl-DBM_Filter-0.06-471.module+el8.6.0+879+823e3012.noarch.rpm 348f6ebd9008c5c43add4cf5414a5507b2b8fccc52b223a8a63f172171f06379 perl-debugger-1.56-471.module+el8.6.0+879+823e3012.noarch.rpm 418c8ef9746af37f5efd28733d8170cf0149145101f129af40d69d3b41aa00c0 perl-deprecate-0.04-471.module+el8.6.0+879+823e3012.noarch.rpm f51735ec38fd9bf505928fc67e352a0f953d0ab07a3c2e3e17b070c07599e9d7 perl-devel-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm a0a14581d495ad3aa604f136657b00b5e07e01f9a31430180ae996750851129a perl-Devel-Peek-1.28-471.module+el8.6.0+879+823e3012.x86_64.rpm 76702e124b8837aedb53a200606bd97531fddd70a479d523652f4b5c4eeca3df perl-Devel-PPPort-3.62-1.module+el8.6.0+879+823e3012.x86_64.rpm eed2c853112750b1147a0318e8021dac109449701971f8a2fb0fdfb59a7bbe27 perl-Devel-SelfStubber-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm e22f51e48176a831edd9a927e323164bc8618a5dd95bd9ff16284eaafeeff7e8 perl-diagnostics-1.37-471.module+el8.6.0+879+823e3012.noarch.rpm f1e7e8876bf518814158e6226ca5689d62aaa70d5ea2bf7480fde79e1a812573 perl-Digest-1.20-1.module+el8.6.0+879+823e3012.noarch.rpm 054f0b929f4291d597147ae000c3849fe5609243f724a30ca4ae58ece1936c7a perl-Digest-MD5-2.58-1.module+el8.6.0+879+823e3012.x86_64.rpm 8b3bea86b235d1cdcb0d28912e7201458f04994558c6516adb8b52d141e5bbca perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm 4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3 perl-DirHandle-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm c6ee20a81e7bfc9ec89a2aefab9f8b74ae9d339ce1e2802d7f9584ff8b926af8 perl-doc-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm 49178342c4ec2682002c7312f5b95cc9d1190dccd40132ea4d45ae0f97ddcc98 perl-Dumpvalue-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm 5d76a0f039c461e9d72ce162188488f43829dda3fc4ffad9e7b3066f70bff5c0 perl-DynaLoader-1.47-471.module+el8.6.0+879+823e3012.x86_64.rpm cffb954b308ff49275e64194b68e33cbb3da9deb92bd27b40a803d63b90d45e8 perl-Encode-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm 77253b724ff748e21fa428d8f4bb5c67bdf52705f7c53b07ce812513e55f91ee perl-Encode-devel-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm 8a265047be5f34848b19cb882a8fd3ad39c11ee8cd53bca3632633c9b8b5392e perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm 85d5b8dca8c11735fe4bb387756c332e49af51227cf76cce4ae44bae6a8641e0 perl-encoding-3.00-461.module+el8.6.0+879+823e3012.x86_64.rpm f03d602b657d6686a6e5e9881babc4686eb5f902b469c44d86c8583c4371209a perl-encoding-warnings-0.13-471.module+el8.6.0+879+823e3012.noarch.rpm 64c4fc68f3055231b42198628030f3eb35bce6925937afec70cb8ef742b059cd perl-English-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm 0bf7dbe90229ba650801a73951c9f7dabb1f93f745c69c10d244617b24ec596f perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm 843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297 perl-Errno-1.30-471.module+el8.6.0+879+823e3012.x86_64.rpm 76658c7a3779fd65500ab4f9c6f6b203481d8bad79e2f5a10fd288046a53e22b perl-experimental-0.025-1.module+el8.6.0+879+823e3012.noarch.rpm 1555a407b267cc6961b4a836488b8857e96faf10570d36d00efeee1b9d1bf0fd perl-Exporter-5.74-458.module+el8.6.0+879+823e3012.noarch.rpm e42ec395bd22562922325052ceaccf8aba76cab83bf75efa674282ec0be84312 perl-ExtUtils-CBuilder-0.280236-1.module+el8.6.0+879+823e3012.noarch.rpm 1bb0da4c8be0ca3f8a39f80f00b6e481a4a04350be1fff0c93cbd9e80f184ee9 perl-ExtUtils-Command-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm cfbdcdf18c92f3191c5e755c36991b89d7bbaa9406c03b32162e3ab6d3993f43 perl-ExtUtils-Constant-0.25-471.module+el8.6.0+879+823e3012.noarch.rpm cdfe69802b3790de366257454e341b8aff534bb220f46077917f8846269f62d1 perl-ExtUtils-Embed-1.35-471.module+el8.6.0+879+823e3012.noarch.rpm d8c27fda2d5764245ebd0484d5c3b3872f0c757d632841d401ffbc02e2ab4f8d perl-ExtUtils-Install-2.20-1.module+el8.6.0+879+823e3012.noarch.rpm fc5be11468e3fccc2a11d2de9121a6cdd6df69205ca5494391da4385ec119563 perl-ExtUtils-MakeMaker-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm 3c150eda89de5b4eb449318b79c0943e143c1b6e0332a8d05eac98afa6052314 perl-ExtUtils-Manifest-1.73-1.module+el8.6.0+879+823e3012.noarch.rpm cbc7809caf4d53a1596e607b072e1280b86f8f8c61674bef764916490dc6906c perl-ExtUtils-Miniperl-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm 81e895a84c42621ec5223c35358f73ad023af2536932076b0f9e551442f5e14e perl-ExtUtils-MM-Utils-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm cefed0569fcb3467aa060fe8ed4afd30715c0ae724ce44a4e60ba939f72354f7 perl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm d8b1feea37aabbfefe537f9b4b886a095d450334b9fb457ceb469a75d53dcd6c perl-Fcntl-1.13-471.module+el8.6.0+879+823e3012.x86_64.rpm b13ed0199de86c0afa7cb56b07fe89968febe4bd713514dcd8f0d1926a0d9b61 perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180 perl-fields-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm b3bcc175fa8264d466885d81e1719ed5507b3ebf7110d50ead611ff6f1fb7bfc perl-File-Basename-2.85-471.module+el8.6.0+879+823e3012.noarch.rpm a797d34356e7273efedb3109544f0ec6372498e0faee26f269196de0da6f2b3e perl-FileCache-1.10-471.module+el8.6.0+879+823e3012.noarch.rpm 05d65b299e9b9e5f3cc3121c33c102ccb988512d183799f9d8443e30157520fc perl-File-Compare-1.100.600-471.module+el8.6.0+879+823e3012.noarch.rpm 261019cdcc5442317525d4485702f38c6970a23fb5eb91e21a00b9aef1b51971 perl-File-Copy-2.34-471.module+el8.6.0+879+823e3012.noarch.rpm ae39110ad6194729ae242bcd0ee73f40540a5a7dd419addd6c71c1cf662a4407 perl-File-DosGlob-1.12-471.module+el8.6.0+879+823e3012.x86_64.rpm e1ff76d84cbc0debbbb36d08abe8ba711e2e162bb46abd049e2768aa08f4905c perl-File-Fetch-1.00-1.module+el8.6.0+879+823e3012.noarch.rpm a19b297b723dae8f070e6747f43243135103f21e8b7d8d7553310e1ac1f96d8e perl-File-Find-1.37-471.module+el8.6.0+879+823e3012.noarch.rpm 511e8ccb46054fa69d53e80bd671c65284526b9f4eafcd322ec38e976b16698a perl-FileHandle-2.03-471.module+el8.6.0+879+823e3012.noarch.rpm 371527cfd57f724e8f7d976b02243c713ddcb7998fd1591031195b84ace3c526 perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpm 995e08ed28513f82e5821425a4d4fc6edc45ee0a783a1f26eacb6359b3f42e11 perl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm f404d9e30a5f8768ff3926e32b45b0b8334f72e3e92b0e4b25c64e05f727708c perl-File-stat-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm ceb6a060ae984f2efece2712dc9d1cb1fc14a2aacaefef858c780ce234e969c1 perl-File-Temp-0.231.100-1.module+el8.6.0+879+823e3012.noarch.rpm fca98aeecb539f5f2553808ce3bc203a8740a01ef0663149256d024bc13823cc perl-filetest-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm 8564ef1f84399cfbc09d27d6567a5dd5996f47cfdf2384a58a1c5191a8eae071 perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpm 5094b53d07808bfd255aa5b9a1315ad01f5d1892624a3381074d552d82ed562d perl-Filter-1.60-1.module+el8.6.0+879+823e3012.x86_64.rpm 26ad0484430812ddabc5f1998e2c262481b7116b396d68669c2b8465d11d6c54 perl-Filter-Simple-0.96-457.module+el8.6.0+879+823e3012.noarch.rpm 6d8cb469ec7e7529d67609f167434c267aefb6d153c98733d6a446086d68bb0f perl-FindBin-1.51-471.module+el8.6.0+879+823e3012.noarch.rpm 56d14f944a7fcf10ea8ed5579038d32088058e32ab5182135afacdd246685634 perl-GDBM_File-1.18-471.module+el8.6.0+879+823e3012.x86_64.rpm 256a011b9c3d1714752273382e297e474e8b39caf3e9de390f1612eb0006762e perl-generators-1.13-1.module+el8.6.0+879+823e3012.noarch.rpm d29e5ee3480ccf6127f8e2334cc6492d37fd979a629a314c83387753d227be09 perl-Getopt-Long-2.52-1.module+el8.6.0+879+823e3012.noarch.rpm 5090d47b718450f95444543eaca7222ba73e43d2837b592c56f5c983355e2fcf perl-Getopt-Std-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm c385e938af9008822ea9e471a00a055cd2a6208b4855c2b7647fe234c04f55d9 perl-Hash-Util-0.23-471.module+el8.6.0+879+823e3012.x86_64.rpm 7a82010f9481e8348bc8f4d3420a4b36b6603388325bb039ba977724ad5cf627 perl-Hash-Util-FieldHash-1.20-471.module+el8.6.0+879+823e3012.x86_64.rpm b61d92583075cb764edcd00571874a66ad6b8604b34c062acac7f18e0ec459b4 perl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 22f6dae1203f60f7112d8a3bf69f730cca7e92ff26307fa0479297b263a5a853 perl-HTTP-Tiny-0.078-1.module+el8.6.0+879+823e3012.noarch.rpm 5f65138b4d1d4d31ec4ef9d4ea3ef8a59eef998f0480ea0dec2dbf644b63ae57 perl-I18N-Collate-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm ddb8549326f4c53d3e63ebadb3bd15006b623554ee919c3aefe61bd9d69dc9b2 perl-I18N-Langinfo-0.19-471.module+el8.6.0+879+823e3012.x86_64.rpm 2623e457fc54df6cdf59e7cb367600debfb9e9dd4ed80c9c1168afca8907e3ab perl-I18N-LangTags-0.44-471.module+el8.6.0+879+823e3012.noarch.rpm 39548593db24c273c66016fb982e7982326f3494a17553d011567f4db7b188fd perl-if-0.60.800-471.module+el8.6.0+879+823e3012.noarch.rpm b5af25267734d759f7bfe75dd79437be719dbbf828dd356ab2f13648fc0f046a perl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpm 46aa912995002371271894c952f50b8f1fb45fd4afe94a1a0a12708173c5d73d perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be perl-interpreter-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm 4624784fafbb106fa3c2ede801be0a3ab3287d8dd65e8b86e5322b9956a953ee perl-IO-1.43-471.module+el8.6.0+879+823e3012.x86_64.rpm d88ffbb0fb6a54b382944fd9b4f64cec99cfa3dcb25bffd44d8c53e9c9938085 perl-IO-Compress-2.096-1.module+el8.6.0+879+823e3012.noarch.rpm 05418030256a705280d58c0e7a44134e578593acc935342159ee8b4339a8bb57 perl-IO-Compress-Lzma-2.096-1.module+el8.6.0+879+823e3012.noarch.rpm 343d36d9129f80e8a302644b6eb13ef5b97f2066b5ab06e268ca6553100d97c2 perl-IO-Socket-IP-0.41-2.module+el8.6.0+879+823e3012.noarch.rpm 82c29b5fbc0a72d196b990b51c051b0fd4c733d024f1b8cd646dfb9ea98f0e5e perl-IO-Zlib-1.10-471.module+el8.6.0+879+823e3012.noarch.rpm 023590025fb11cc0eb9d6205e5ff24b371ff751c8e1e8b39ef4049d1807692c0 perl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm 24140d4b859d7da7b5422b39bb33058cb4ed037ec81a33cb29331d61b8391d36 perl-IPC-Open3-1.21-471.module+el8.6.0+879+823e3012.noarch.rpm a0f7e9bccac2bfd7f926690a876853388c61c46f9bee71ee77dd63dc04ab4610 perl-IPC-System-Simple-1.30-3.module+el8.6.0+879+823e3012.noarch.rpm 351f74beab3545664c924ad1c77b4640a278dd7e4e7429def448839b66a3880e perl-IPC-SysV-2.09-1.module+el8.6.0+879+823e3012.x86_64.rpm b50105e5a0de165d0d60f55df6a89a56adde83f940977893ee6d2d4fd3b19b41 perl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm fcf81923aca881d995501ac6adb0b600d85acbe1e146c92024e96bd92c8adfa1 perl-less-0.03-471.module+el8.6.0+879+823e3012.noarch.rpm e1557f0a82c4bd76df1a36ea09c4b2208264606b14ebe7fb490b68f6f6e47dac perl-lib-0.65-471.module+el8.6.0+879+823e3012.x86_64.rpm 4bc4e1fc0465b77d6f1458a5bf2929b3af9d7b6ee094966a08f60501c873c801 perl-libnet-3.13-1.module+el8.6.0+879+823e3012.noarch.rpm d06402fd430d3442bfba5a8d8c5a82038d3db5ac31ac5b0e464eb8ad78d756c6 perl-libnetcfg-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm d97bca5e252435f16cb6fde3433756b503a5e1f4b64cb2882b4eb802aba6e29e perl-libs-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm 2c72efd56a0c43f88b948f2baa76d8967cdd727e28eea76520e748bb889fa448 perl-locale-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm 34eebbec86c2085e4659691f3138bbac03e164da2fa0178610cc19d48464dc10 perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm b642ac31df8f05336d101b3607d855839335742ba4b80652bcd4d19fa8c71b2e perl-Locale-Maketext-Simple-0.21-471.module+el8.6.0+879+823e3012.noarch.rpm b80618e4f4845f86e83404fc38505cd233f225df9adf7b123747f19f67b08203 perl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 1bc02c4b987dcdcba510201debe3955a9fb8212874e3d7ee8342cc5b248dceb8 perl-macros-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm b9b653274abf61f37d7e7e71ddec801dd21eb8720899da487981c39b1df181dc perl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm d12bc389fea342859c1ce3fa9a6116e31ae66d6225797ed145796ee1d73325d8 perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217 perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14 perl-Math-Complex-1.59-471.module+el8.6.0+879+823e3012.noarch.rpm 6afdeae53c444f636af1d353715b9e87d143502cf01f6fe4ebf21d55964efa5a perl-Memoize-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm e640b0075b3b18645576b21b2b94122eb6356596edec3d9735883df6e0d6b036 perl-meta-notation-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm f8d9fcba8446cfe4269dde3e5aa29c1346db382ba89414c193f9c1c1639d14e0 perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3 perl-Module-Build-0.42.31-5.module+el8.6.0+879+823e3012.noarch.rpm f8d22bd91df7e742342d514b89fd5bbf1210bda859a600e23267b5087a361696 perl-Module-CoreList-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpm 7d6c1bdb41c206e5b62df1652fd1627fced6df877244ad48ada69faa84ca496c perl-Module-CoreList-tools-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpm f16595a91826bc713cf1b3699a9f76b4cbec2c994f0214a07c4824db64170d77 perl-Module-Load-0.36-1.module+el8.6.0+879+823e3012.noarch.rpm 15c2aa6d684ac14cb382c3969cfb118abfc38744bb8543d35ad9017e759adbf1 perl-Module-Load-Conditional-0.74-1.module+el8.6.0+879+823e3012.noarch.rpm 2227be4711dc435a31aaed4b5f1cfc3a646025912e8c74aafa1f7d971134f6c8 perl-Module-Loaded-0.08-471.module+el8.6.0+879+823e3012.noarch.rpm 234b1102675736344a4e0bd6cfad9f73f37771a3b9e73c48c6ee7f0c36aef802 perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm 23471694783ed058ce2795ffffb3754ac5f991a18d78b9e6760850e3faef4b79 perl-mro-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm 866fc141c8bcc8aab318c0c4455b6615b17b0ea8a09d68dc8f1aa5fea05fa79d perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm 3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691 perl-NDBM_File-1.15-471.module+el8.6.0+879+823e3012.x86_64.rpm 0f3c32d42439f2aa209820ddd83fbb58fc8f69ddc1547c211dd10fdef981d7e9 perl-Net-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm cd5856fd6f47a143c5c60916504482e3798b06c54421870119f441a5fd0f2a4d perl-Net-Ping-2.72-471.module+el8.6.0+879+823e3012.noarch.rpm d738802084565dab57fab502d0975c5d483fbaf7a348d64075c11c6622a971a1 perl-NEXT-0.67-471.module+el8.6.0+879+823e3012.noarch.rpm a44972702c8e4ddf7f4a18cfc7ff52385f1dee67e3df11f9d16e0e449353954d perl-Object-HashBase-0.009-4.module+el8.6.0+879+823e3012.noarch.rpm 5bf571fb3b59b5580204b90a299cd8b647215bae2bf17cff6332289ca31c00db perl-Object-HashBase-tools-0.009-4.module+el8.6.0+879+823e3012.noarch.rpm c35b94f76b882d2b5a55ad03d3726a9726ddc541eecf8b2eda38ac4bf7cf7d6c perl-ODBM_File-1.16-471.module+el8.6.0+879+823e3012.x86_64.rpm a5dc7f814ed12d914d2fdf89cf69337225d723522c430e58964541d63907e076 perl-Opcode-1.48-471.module+el8.6.0+879+823e3012.x86_64.rpm 68fb12de43afe023752218b8f161dd9d1cea74734108b1c50358f6528cfbe999 perl-open-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm 8fd5bb3e31b79691129dbbbdca582e3090393d4ea59874610b6319b2a20b6d0c perl-overload-1.31-471.module+el8.6.0+879+823e3012.noarch.rpm 56a29401904d3c7c9948d7f020b81beec209dbb1007daf4b7d0efeca028549a9 perl-overloading-0.02-471.module+el8.6.0+879+823e3012.noarch.rpm 6a85f75028ac3bcd321e3a362f16a5aa6f9707ac0531e4b9d7879c4497347c8f perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm 4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737 perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm 04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf perl-Params-Util-1.102-2.module+el8.6.0+879+823e3012.x86_64.rpm 1619c60e20f21d259c619d3e4140efe4ab69e095a33ea26e5a6114fa2efa5bb8 perl-parent-0.238-457.module+el8.6.0+879+823e3012.noarch.rpm 246f2b9cf71c9ab37e60447253c7bc23bb90e394a09471c13ad513863cb4b1d2 perl-perlfaq-5.20210520-1.module+el8.6.0+879+823e3012.noarch.rpm 628f7642581468e6dcdadf1f23fd561deb8472e2962a5bf8451236e21f1762a4 perl-PerlIO-via-QuotedPrint-0.09-1.module+el8.6.0+879+823e3012.noarch.rpm 1f151cd4482a00b5c96dfffcb6bc340ef12218d63db6347c426feb154585cc60 perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437 perl-ph-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm 071c53fc3b1508ea0794c71615a8a105b02d194653b3f4fabdd3c45871a7807c perl-Pod-Checker-1.74-1.module+el8.6.0+879+823e3012.noarch.rpm 978c1a649e6dab3bbac23f87c6dbd967f157ca43b9eab4a2f943480f506414bb perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8 perl-Pod-Functions-1.13-471.module+el8.6.0+879+823e3012.noarch.rpm 13006d948d6a40dc78e9042d186528286fbb2b06e01239b8a140494291f30175 perl-Pod-Html-1.25-471.module+el8.6.0+879+823e3012.noarch.rpm 727afd865cc869ac175501107278a34bb09dc06f334f8c6981c226dd43878c3f perl-podlators-4.14-457.module+el8.6.0+879+823e3012.noarch.rpm 801c287bd1847de60e53e057f36994f48477983773c1f5559faa303651acd9fa perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5 perl-Pod-Perldoc-3.28.01-443.module+el8.6.0+879+823e3012.noarch.rpm a0f8f74314bf2558c2294c10bbae789bcca2477c8f06fdd9fd3dfd6b89519a8f perl-Pod-Simple-3.42-1.module+el8.6.0+879+823e3012.noarch.rpm e146ad799d75b5bc4ef12223d1dbb0c1ab3571ba6dd8b6a35425ed064a679b96 perl-Pod-Usage-2.01-1.module+el8.6.0+879+823e3012.noarch.rpm f6fe843a228687f99d59ac574fa274c4c69c97e3e3a359c9113e94a3b18ddd54 perl-POSIX-1.94-471.module+el8.6.0+879+823e3012.x86_64.rpm ad0bfffeb0f0371d2449ef8b63e0e96481b4d14217ed73fbb6f2f7ba8bbe3b7f perl-Safe-2.41-471.module+el8.6.0+879+823e3012.noarch.rpm 6b1e3f5e918c5d0403947dd664f95c805de54dcb9549c864ba3a3a54aea10f92 perl-Scalar-List-Utils-1.55-457.module+el8.6.0+879+823e3012.x86_64.rpm 834d2180a77a193a02d3eb6ea02c76e87b89cbbeae8d246fcb8e1eae50891f3c perl-Search-Dict-1.07-471.module+el8.6.0+879+823e3012.noarch.rpm d64ba76cb75f264755f708d56d6f9221718a0b26a33601e5bd2e1e76c8db57e1 perl-SelectSaver-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm 6c0d785dab43b86be4465e8c1cf2218565fde7338b479e9e1df8e61728006970 perl-SelfLoader-1.26-471.module+el8.6.0+879+823e3012.noarch.rpm d9b165a64386b8743a80285fecf71fbfc182f4e264a60fd93d07618725b6472c perl-sigtrap-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm 3ea359b960bb85b474ee7d87a1d9e381f14e15bb4f01a101a1984f25f31de13f perl-Socket-2.031-1.module+el8.6.0+879+823e3012.x86_64.rpm b784bd497c1513d31623f76cfcdbcf7190d2501f1929d2dff53ada8a2bfd60c7 perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm f303faa506dc1d7735a1fba64383acc4c4075c37a502e5f3a6793849dd3f50c4 perl-sort-2.04-471.module+el8.6.0+879+823e3012.noarch.rpm b8c97d9ce8146ffff05a7e6de6e37cf4bcc3874663addeebc3e84c66521053af perl-Storable-3.21-457.module+el8.6.0+879+823e3012.x86_64.rpm e66945a1abd7ed97d71e9f176facb28f76f70e85cb7586af58414ecb080fb0a5 perl-Sub-Exporter-0.987-17.module+el8.6.0+879+823e3012.noarch.rpm 87013bce0917524587738fe6db264ebe2fca53bb042673d9d2865a267046c3f1 perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7 perl-subs-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm c154fc9f9df0ecd16a600eba0a3a720543878c26f7be70fc4805362bed3142df perl-Symbol-1.08-471.module+el8.6.0+879+823e3012.noarch.rpm d6d8b699f51f9de47e5410330493ee4aafee37f894f4e9ca6d8df35bdd6585c9 perl-Sys-Hostname-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm b3aebb55c9c25f8ab97d6957108e80ad2c2998ce1dc69dc5cdebf3e6eabb71b5 perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359 perl-Term-ANSIColor-5.01-458.module+el8.6.0+879+823e3012.noarch.rpm 567fd6cc0d686ea74e81200b960c825839cbdaf834cf2e40e2eea5d011eb9054 perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253 perl-Term-Complete-1.403-471.module+el8.6.0+879+823e3012.noarch.rpm 12cccb3cdcf19038d5dbfbf0f0d09ca461341842696b4daa9bec331a466fc041 perl-Term-ReadLine-1.17-471.module+el8.6.0+879+823e3012.noarch.rpm 373cac615872c1af5f6ca02a882bb150b5ad5c680257b86076443157463b0ce6 perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm 77b7f51b21e2373d909905b0d45191814fbb1c8dd9c855a250048f9437944533 perl-Test-1.31-471.module+el8.6.0+879+823e3012.noarch.rpm 491106e63923a68bc208d8ac4281ababe8d801c869a7590061ccdcb1efe9d93c perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc perl-Test-Simple-1.302181-2.module+el8.6.0+879+823e3012.noarch.rpm dbb742a892e6dc1dcc16ee5b91c459c331ee720aa5ad1a0c6a5d3d682037122d perl-Text-Abbrev-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm c205e14663d76b9d00c6209c660a64a5ee997cc600cfd7693841b32dcb0ef38e perl-Text-Balanced-2.04-1.module+el8.6.0+879+823e3012.noarch.rpm 74e1307d9f4ac5e6855a7b9cfc7be52c146bf2460fe3f0286ed4a0e83bac4cec perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpm a6145f9481f9059c301eb1355d0cdd688feebab8d19fc2b2ebcd591737903628 perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm 21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5 perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8 perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm 0ad56d5e6405906910a2efe8448960cdb0b14fe3557e69cf8b59651e75a6abca perl-Thread-3.05-471.module+el8.6.0+879+823e3012.noarch.rpm 3dc885f24e1cfc994e854b3bff76c5eea91f4ece1502c945cb9da005d4bb4db4 perl-Thread-Queue-3.14-457.module+el8.6.0+879+823e3012.noarch.rpm 74c32c60d87d1fd0746e3607df03ff1a8f2a7e93b2510375fa2e64c483aebd28 perl-threads-2.25-457.module+el8.6.0+879+823e3012.x86_64.rpm f0478b6cb7f9e5493a8c7d233a817484589962f6164334f6813a306d2e52a9a7 perl-Thread-Semaphore-2.13-471.module+el8.6.0+879+823e3012.noarch.rpm 1564920e001ac5edeb382e7195849fedd8981ea011aa4c17d842c1ee140681f8 perl-threads-shared-1.61-457.module+el8.6.0+879+823e3012.x86_64.rpm a3c7d91fb51aa3a9ec804723d69b05cb86288e78ced03ac361521aa3f76624a7 perl-Tie-4.6-471.module+el8.6.0+879+823e3012.noarch.rpm 6c25d1a7dd605049d5fe4f1504b4539cd57d976716bfe0f61e7ee3226f475f9e perl-Tie-File-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm 3942379ac44b5238773a2f01ff12230b5883d41147efcf0e67ec8d40848539af perl-Tie-Memoize-1.1-471.module+el8.6.0+879+823e3012.noarch.rpm bcb5ed9b4a09202bb78f4e6cf9b2101d6e1221e63fff35eb9ac6f634a9d8d840 perl-Tie-RefHash-1.39-471.module+el8.6.0+879+823e3012.noarch.rpm a2d31cf0bc263635ac976f8c69e3012de4770e2b35d2b1407153f9edf046ee2e perl-Time-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm e8e3ee9f23ae9a591471ad8da34d1625093cafecc5319ab419b30d936d3d19dc perl-Time-HiRes-1.9764-459.module+el8.6.0+879+823e3012.x86_64.rpm 2a2d4011516f4a020d24de2d2706513be6f04b8608954a84d2a2f71d7b8a59d7 perl-Time-Local-1.300-4.module+el8.6.0+879+823e3012.noarch.rpm 48049d3cd87b9332801907c518df9bb4ee8e9f0cb20c2f18cf9cfe1ac794adac perl-Time-Piece-1.3401-471.module+el8.6.0+879+823e3012.x86_64.rpm fc5ea636309c25ade4a9ce4be19732b102da1ce61a4e4b910a9192f35b79b867 perl-Unicode-Collate-1.29-1.module+el8.6.0+879+823e3012.x86_64.rpm 819e4e179ecf1b3b45beb9755217e03e5219f1c0e4aa808a7bd27d0495070697 perl-Unicode-Normalize-1.27-458.module+el8.6.0+879+823e3012.x86_64.rpm 5696de7c803145cae3ecd568451295cda3c8b9d4949f9991702f8e1aed5fff18 perl-Unicode-UCD-0.75-471.module+el8.6.0+879+823e3012.noarch.rpm 2cd8f639f68d91b50850daa0e008220bfb0e5e626df322be161c425a1df794ce perl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm 6852a1483a15b008cb44a2881bae6beec4dd4e1e00d6743caf3d1e822e38bfa0 perl-User-pwent-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm a295ea0d908e6fc919a33297756dba92bce9530192fb5da087ec5ff707744dfe perl-utils-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm ccbd6a719d269e2ebed04ff4b72d49e6ebdc0b36cc25a821803a91147362e8fc perl-vars-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm 7b47dd1b248f8c7c77211a907fb8cc4786d227de025d43ff933faafeb78c348c perl-version-0.99.29-1.module+el8.6.0+879+823e3012.x86_64.rpm 22908f36f713a9de7e1bad7bc3233b722dff2557f49d067ad93bb5d66b43a02f perl-vmsish-1.04-471.module+el8.6.0+879+823e3012.noarch.rpm 7d33e6dd54f850575efe826fe6779d7fe9108f2e28d5e1d5def2640fcc83a814 rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 4f838ceea3cf5dfefffdebe0181ef879213ea9c143a6d77859b8f97d37d7f2a2 perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f8ac7791b06c47866c5e688dacaef16d8bbc56e760e71ace7610b12fa6b1da1 perl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 3aaec32b508f40a97b7274018a707339b6a5877493b84f55769a47d84fbb7a5f perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b perl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f41b83ba68e184bda30ef525a7600673733aa444c2713bffb572eb691818b2d perl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 39a934c51411a833c333671b2a7df180f1c9d0ef251889a8c1e9d48701cee459 perl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9862723272cc2aba25739dc251961e0cbd90be7e3b3eb9a0eaf79c1b8504f080 perl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 0d9b36f3c0e80cadb8b5282c1b3be01f6501e2b1d95e80e84d9fb3b24a6f7e52 perl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9a1c248fb9f94b77b6b5afa60bef8e145057c8d1031957e09bfd42e188e17309 perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm 321334e0883dd66f5c7b6aa86ea601e5a1a831dd0950032128ac3909032bc343 perl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 7f33a736a361b53262ce8cbd273f26b8debe23f4f3fb0a1817d4c519ca2471c6 perl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 3416b0bcbd18b2b38276c15376eb1560dace73dc40c613e5434a4b956ddf52bf perl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm e6121208c088b4a8c6d95d89aeee50c265ca21c7cd35ec9fde3ffc087fecdf49 perl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm c350bea5407e56eb42eda4cbc77895da0ad65ae5ce23e08543fc3cfe56939793 perl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm bf26ed1f8417e1a76d8bc96d609e74c2c8af22c5e3194b1c7d5dbb1fa7bdd911 perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpm c0a260b0aaddebf1df80c0b98ea0f24abc32b2f7711f67c4982559dd19b98d7a perl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 47f5249f76519dc5d16c9dd6d74d51ba1c62ca0937e544395f9e67b10cf2f3cd perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 1d87ab90226348884ea3741f614e33782a9176a71227f7d14c6fbc2aa69c35b9 perl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpm 4cb2c5f159200cb752acaca0293501f413bae3e4fc0a2263b633f847b5ab3d7d rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm 66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpm e5aef8c6bbdd4a6de57484cce458f522a95163174acbbc8eda2dfa4f705aabf4 rocky-linux-8-x86-64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2022:1955 perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-x86-64-appstream-rpms__perl perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm 85d5b8dca8c11735fe4bb387756c332e49af51227cf76cce4ae44bae6a8641e0 rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 4f838ceea3cf5dfefffdebe0181ef879213ea9c143a6d77859b8f97d37d7f2a2 perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f8ac7791b06c47866c5e688dacaef16d8bbc56e760e71ace7610b12fa6b1da1 perl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 3aaec32b508f40a97b7274018a707339b6a5877493b84f55769a47d84fbb7a5f perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b perl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f41b83ba68e184bda30ef525a7600673733aa444c2713bffb572eb691818b2d perl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 39a934c51411a833c333671b2a7df180f1c9d0ef251889a8c1e9d48701cee459 perl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9862723272cc2aba25739dc251961e0cbd90be7e3b3eb9a0eaf79c1b8504f080 perl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 0d9b36f3c0e80cadb8b5282c1b3be01f6501e2b1d95e80e84d9fb3b24a6f7e52 perl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9a1c248fb9f94b77b6b5afa60bef8e145057c8d1031957e09bfd42e188e17309 perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm 321334e0883dd66f5c7b6aa86ea601e5a1a831dd0950032128ac3909032bc343 perl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 7f33a736a361b53262ce8cbd273f26b8debe23f4f3fb0a1817d4c519ca2471c6 perl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 3416b0bcbd18b2b38276c15376eb1560dace73dc40c613e5434a4b956ddf52bf perl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm e6121208c088b4a8c6d95d89aeee50c265ca21c7cd35ec9fde3ffc087fecdf49 perl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm c350bea5407e56eb42eda4cbc77895da0ad65ae5ce23e08543fc3cfe56939793 perl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm bf26ed1f8417e1a76d8bc96d609e74c2c8af22c5e3194b1c7d5dbb1fa7bdd911 perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpm c0a260b0aaddebf1df80c0b98ea0f24abc32b2f7711f67c4982559dd19b98d7a perl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 47f5249f76519dc5d16c9dd6d74d51ba1c62ca0937e544395f9e67b10cf2f3cd perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 1d87ab90226348884ea3741f614e33782a9176a71227f7d14c6fbc2aa69c35b9 perl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpm 4cb2c5f159200cb752acaca0293501f413bae3e4fc0a2263b633f847b5ab3d7d rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm 66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpm e5aef8c6bbdd4a6de57484cce458f522a95163174acbbc8eda2dfa4f705aabf4 rocky-linux-8-x86-64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLBA-2022:1999 trace-cmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trace-cmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms kernelshark-2.7-10.el8.x86_64.rpm e28b68cf43f4d1c02ab2a79c4323b7cd47289064f3e0036785f08d09925bec02 RLBA-2022:2018 perl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms perl-5.26.3-421.el8.x86_64.rpm de27f706ec48d1157ea764e5e00b210769f25773b79ada5edc315add5a410cc2 perl-Attribute-Handlers-0.99-421.el8.noarch.rpm c67e0e8f12e7b46b4d8a3705f0c3ce7b4b01307508b747a3d2ca514f697e9398 perl-devel-5.26.3-421.el8.x86_64.rpm 7e84a978e37a73520535dce1fd70aa2db75274b0339e6e0e13383a4814660292 perl-Devel-Peek-1.26-421.el8.x86_64.rpm 5f8937a9d898a252a7ac81d9c52cef2840e4c63dd6452c1f52002b84a1d0a764 perl-Devel-SelfStubber-1.06-421.el8.noarch.rpm 986d78a6c8d9b4ce0698c4d6ea5d66531eacededb54a97f8a8141bc8230fcc89 perl-ExtUtils-Embed-1.34-421.el8.noarch.rpm 677553fb9495d08b815a7044a6347440e7b632b8e9bc38a0b748c8638e9fd0c5 perl-ExtUtils-Miniperl-1.06-421.el8.noarch.rpm f8a43f89f59de3ad61ac2edc52e907b0ac94646c4b49856b89ae5a53ff73507f perl-libnetcfg-5.26.3-421.el8.noarch.rpm 84dc8411cf86bbc8c6afc4ad5059a399b59bffc3d6dc674c8cb5964ba94669f2 perl-Locale-Maketext-Simple-0.21-421.el8.noarch.rpm fd32ddc20e534ba3efddfe29e742948a8c50fea177ad1d017a13d18f9c812a4d perl-Memoize-1.03-421.el8.noarch.rpm c4aecb1934ca89c82001a151bbfeff4a02fadf1c2283e782db864da4fb170e81 perl-Module-Loaded-0.08-421.el8.noarch.rpm b467bb47db2fa4d717ed1f989f7a7d7bccdf8d9ddb52143f310c2483e1a7326e perl-Net-Ping-2.55-421.el8.noarch.rpm 2306c5ea5766ff7683707bae5690371c8f522f84f52e0b17e133632cfd0b2017 perl-open-1.11-421.el8.noarch.rpm 82ed6426b0d0907e3a969c6587ee354731a04f9fd82493b8b51265700f949e60 perl-Pod-Html-1.22.02-421.el8.noarch.rpm b6a508328e8fe486c3863ea2b2e623034b454998e3bea8d038b9f0daaee4e933 perl-SelfLoader-1.23-421.el8.noarch.rpm 04b2901653f194db99e55d4a50a4faca5d925638809eca595fb321155f9d0f1c perl-Test-1.30-421.el8.noarch.rpm 2983dfb3fc40d8d795174749ac3d0d7039e2e5ac9f4213ce041b235f8b7de4c6 perl-tests-5.26.3-421.el8.x86_64.rpm 07f7486385c9e9cfb78b7ccc40cd13bfc78054671398a882d19236eec1e9bee4 perl-Time-Piece-1.31-421.el8.x86_64.rpm 18005c88512126fa7401c38a030b01a053ef2c7bda411aaafcc4d4ef2e66a99c perl-utils-5.26.3-421.el8.noarch.rpm 7768fb10a59c0e2a7be504351e22ea85fbec0d6ce9e748ab5aa572165643b0fd RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libssh-devel-0.9.6-3.el8.x86_64.rpm 7cb2b675798815b1a1bf842d17c69edf8dfc941ece898b2d471e235161e0cccc RLBA-2022:2061 jansson bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jansson. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jansson-devel-2.14-1.el8.x86_64.rpm 35b0b0591cbe5cddaf91736f2d564e332cdf3332321e88c020eebb9ac5d20053 RLBA-2022:2063 firewalld bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms firewall-applet-0.9.3-13.el8.noarch.rpm 9b5d2c6936e1205d6c1451ce75981469aa8c442fc9c1a3e3a21da3099cb737eb firewall-config-0.9.3-13.el8.noarch.rpm b34f79b0b9751e662540afee7e53397f7a2b4c3f7be89befbb7580b497fb3472 RLBA-2022:2079 setools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms setools-4.3.0-3.el8.x86_64.rpm 92e03aafb9f6d19f1725d8ee7cc9f0f61be095ef701a093ce0dad91809314afc setools-console-analyses-4.3.0-3.el8.x86_64.rpm 21696c7309cba8e7e944a8cc8c7d73ec33dd729f1b00467eba2c754176eb6132 setools-gui-4.3.0-3.el8.x86_64.rpm 12f3002986a110dd30f171b09700f9ab4427dda79355903c09d830fc3b0d6446 RLBA-2022:2091 postfix bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postfix. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms postfix-cdb-3.5.8-4.el8.x86_64.rpm 63e360386cb151bf0a338d57a3e52cf4bc3eed8372013fb802e70a9b0c7504f5 postfix-ldap-3.5.8-4.el8.x86_64.rpm 10b1d1dba27b6cb581629867dee9bbaec38b6e795d071165898782f6cae741da postfix-mysql-3.5.8-4.el8.x86_64.rpm 5486249aaeb70a5d9aa2f11e6b10fdc8a6cf31e5a208baa06d1beda213601306 postfix-pcre-3.5.8-4.el8.x86_64.rpm 6a00c9e929bf2c21d174ebd36d666db74a4625c0398817a107b712f7b76d19e2 postfix-perl-scripts-3.5.8-4.el8.x86_64.rpm 977cba0e36d8bcef037636fe5fd9302f7396f029efe3dd501551695e3d5d5863 postfix-pgsql-3.5.8-4.el8.x86_64.rpm ac275db2c2062f885ce5ce04d6f80171e41a654b8f51bb8970d21c7a87a369d0 postfix-sqlite-3.5.8-4.el8.x86_64.rpm 11433addb8f58c2f4c0169e995941ae25e7a02406013239b5deee3abbe2b1bf5 RLBA-2022:2097 cryptsetup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cryptsetup-devel-2.3.7-2.el8.x86_64.rpm b5e72ac21ea1b38f767fa1ebb0598d0d69418f86eb274f8ab0b47d28808cbb0c RLBA-2022:2099 sysfsutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysfsutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sysfsutils-2.1.0-25.el8.x86_64.rpm d6e32caf879b2d8d4f33f1257ab6a2d391d5d1d9db2e29329471eda80d0adf9d RLBA-2022:2117 gpgme bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qgpgme-1.13.1-11.el8.x86_64.rpm 25d6f8ccd77cf48a02d86239ef91981a7f93a3395adea817cdee2d296996d9a3 RLSA-2022:5813 Moderate: vim security update Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms vim-common-8.0.1763-19.el8_6.4.x86_64.rpm 58fb2fd64740f3dddd0465d725779b9a92382096a451b38a3d13e598fb537a65 vim-enhanced-8.0.1763-19.el8_6.4.x86_64.rpm 555bf2c9cb7a631f91195a2c477713668210b2dfcb82c5dc5258fe411bfb7e4c vim-filesystem-8.0.1763-19.el8_6.4.noarch.rpm 37b57ef90a9d794c1f1ef30ca31a1a26a8651d05b752f582dc91f3112a8fb124 vim-X11-8.0.1763-19.el8_6.4.x86_64.rpm 138b57307d0b6d219d4739841ec0d118256c885f6357c4052400276513f5dc63 RLSA-2022:7105 Moderate: gnutls security update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms gnutls-c++-3.6.16-5.el8_6.x86_64.rpm 57818cdd7188acbf57263517b2a9e81d7d283bb0e0e87c280c58d831933c9ad4 gnutls-dane-3.6.16-5.el8_6.x86_64.rpm 1738781e0a92c8c890bf53efc9ee95b8055d9ad51ea408e5f0e4d22d6dce3643 gnutls-devel-3.6.16-5.el8_6.x86_64.rpm ee433690b3583469d732499e6419ae573fe88152d0417def1fc4814ce35dcc54 gnutls-utils-3.6.16-5.el8_6.x86_64.rpm 6a0485d3cc9fa5cb3c26e88cd5a1affb2b377a1c599ad886be3aa58fe9fe957d RLSA-2022:7108 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms lemon-3.26.0-16.el8_6.x86_64.rpm 7378a4f1edf1a34321ee4e735db4302fdc3c780cc7df9fe235f263ee50817ca6 RLBA-2022:7115 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) rocky-linux-8-x86-64-appstream-rpms rpm-build-4.14.3-24.el8_7.x86_64.rpm 677b722768bb6fbb4b9479ffad9cb7f69aaaa06718686d75d66dd87a8081f0f5 rpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpm 321b320ea3f4f0e28d68daf77bd6f004329e48700273b0f6138519ccd7474e6e RLBA-2022:7404 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-8-x86-64-appstream-rpms tzdata-java-2022f-1.el8.noarch.rpm 0a7ca48030df3fda59da01d6e365550ff67b508a4583d00d2f348b9a50550984 RLBA-2022:7684 glibc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms compat-libpthread-nonshared-2.28-211.el8.x86_64.rpm 0d987ddaee5aa093feb72296aa630e0cab8c6b86dda5e560652ae561cc06b113 glibc-utils-2.28-211.el8.x86_64.rpm 8decd744120cef26bc1ee1253cd7d56326391b14fbf896c9249a3330b4b5f015 RLBA-2022:7688 gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cpp-8.5.0-15.el8.x86_64.rpm 28cf4357b326dc03b53023b4a3368c4dac6ac058c850d3e787302436f3e90b84 gcc-8.5.0-15.el8.x86_64.rpm a775ba87b97355a442098c6ff1381f92521a2ba8201e9af62c1fe1167490a78d gcc-c++-8.5.0-15.el8.x86_64.rpm d9ce7589fafa13e929ad62b8db7507844a842e23bdf006915ddd19e4b9f2740b gcc-gdb-plugin-8.5.0-15.el8.x86_64.rpm 164d664e573149c79415039b67dfe110bf69fef0030f857136f1d46d1dbd8580 gcc-gfortran-8.5.0-15.el8.x86_64.rpm c65a3cbe3a87e0d181ccfd4305331422e6427090d59b25daa4621e8b483e05d9 gcc-offload-nvptx-8.5.0-15.el8.x86_64.rpm 6b134ae3ff20d035c857122d2dcbf3cb0ccf85813cf896eda6dc13f4e1fa605e gcc-plugin-annobin-8.5.0-15.el8.x86_64.rpm 789b09dfb84ce5000de464228a4f376343415861749430f694002a3c364bcc60 libitm-devel-8.5.0-15.el8.x86_64.rpm a4cf4b140dd638ab5bfdf21c2608b7231cfd72dce246016dc2624224b4fca265 libquadmath-devel-8.5.0-15.el8.x86_64.rpm 5402ec862817511fe5b2a6cfefcdd46404f0220cc3405028288e1b9026c0c48b libstdc++-devel-8.5.0-15.el8.x86_64.rpm 5fc96d87ea16dc1a72c61f7e81a4c7b4cfa9ffebe0eff215639c442e1cd945f0 libstdc++-docs-8.5.0-15.el8.x86_64.rpm 3358d2c9007ea4e04e326a1c43841dca505bb2e566a72224ec1944194e231b84 RLBA-2022:7693 binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms binutils-devel-2.30-117.el8.x86_64.rpm b756947caed110dbd7309c580685a01e1b32c56ea253ce72dd8f0b8665096be2 RLBA-2022:7698 samba bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms samba-vfs-iouring-4.16.4-2.el8.x86_64.rpm 293bfdcd38d29e1c5d2d0b3bae70d030335b5930798fd40776a937e377d0d278 RLSA-2022:7715 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxml2-devel-2.9.7-15.el8.x86_64.rpm 4b107cd7b8a27df7a1c9af249ff0a61e749290c282fca5c1230b4f274d9e9b73 RLBA-2022:7716 cups bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cups-2.2.6-50.el8.x86_64.rpm 1517378cb5ed82be222d6499d7a4ee724e680a9ce66821a62ea7822e84ea6993 cups-client-2.2.6-50.el8.x86_64.rpm 1e739decd05133d57837a8eb165a9cfc3f2d6c816b175d28e5c23d22b9e96d78 cups-devel-2.2.6-50.el8.x86_64.rpm 702da979d61c4ed0202ee91e3c3a9a431641fae9eb13cf0f535ef6eee757fa57 cups-filesystem-2.2.6-50.el8.noarch.rpm 340365e14e5c67134cd42391206678c6578cb011ab2cd816777e07e178b1649f cups-ipptool-2.2.6-50.el8.x86_64.rpm 7f2b504aa5392955ce26dbc5ef7da19d7f23803476ccaecc6cc189898e44f674 cups-lpd-2.2.6-50.el8.x86_64.rpm ac704b6073e258756580693de27b42288f30b9ab2cff142d04e6fc33c2416f50 RLEA-2022:7719 subscription-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms subscription-manager-migration-1.28.32-1.el8.x86_64.rpm ab1ac527e986bf52f691534aabef8e7f8b830e3837f84e44bd82417439a31f2f RLBA-2022:7735 bluez bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bluez-cups-5.63-1.el8.x86_64.rpm 7f4571280a8f4a40728e6956e10da82c26377c28e1c620d69a17cbb83667dfaf RLBA-2022:7738 authselect bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms authselect-compat-1.2.5-1.el8.x86_64.rpm b0e97bad8179ed01ff00f73175d7a65a51ceb824d4d546ced7d0068260f4cff7 RLBA-2022:7746 zsh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms zsh-html-5.5.1-10.el8.noarch.rpm 1a856e07e467122c9383f89a0c778a983d8b82bc138e522bc5b266ff76ec019c RLBA-2022:7747 tuned bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tuned-gtk-2.19.0-1.el8.noarch.rpm 47f13bd39952a7079fa357c764f075d8dc0635b4e5314859b6fbcc030468b260 tuned-profiles-postgresql-2.19.0-1.el8.noarch.rpm 47bdfe6837d32422eb6071db284c1427dbd9d24572f5e010b4e16f91c1677479 tuned-utils-2.19.0-1.el8.noarch.rpm 0bde2847749a3bcaabec1e04b32b81ef170d9e02238bb8c65032d365be8fa8b0 tuned-utils-systemtap-2.19.0-1.el8.noarch.rpm b2ab705b2debee9ea11b6dd6a7a1e1096c5b251007dbd48f0e7eb2b415ebcbe2 RLBA-2022:7759 dnf-plugins-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-dnf-plugin-modulesync-4.0.21-14.1.el8.noarch.rpm 7068f370d1b9133196d186276c7ca4139bc68f2235287a12df8215f48018e72c RLBA-2022:7760 ndctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ndctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms daxctl-devel-71.1-4.el8.x86_64.rpm 157d2afbb8abdd8d1fe02d06a46606c5a4548ebaa4b21d49702ac2baa6d54181 ndctl-devel-71.1-4.el8.x86_64.rpm 4b2034b6068692d1caaf0c99575a263c397a0edc309bf1ddd3dd8859c6ca4a32 RLBA-2022:7763 openssh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openssh-askpass-8.0p1-16.el8.x86_64.rpm 46b9b55d7c2a500abe0b2012b4844cd340f9994350d092c7b837c44f8516239d RLBA-2022:7769 dbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dbus-devel-1.12.8-23.el8.x86_64.rpm 95cd8f0b705189258d6c9be2b274457fb77617a3b94d2ce50df2dadb4b4d6d8b dbus-x11-1.12.8-23.el8.x86_64.rpm 63a0db5acdf451a16ddcb6158cd211af4b0d57064d8353f6c617efea50aba460 RLBA-2022:7774 sanlock bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-sanlock-3.8.4-4.el8.x86_64.rpm e5ec992a8929df979daba0e9cf56ace4d4e7bbf916dc1fe4dcae37fb1603eea7 sanlk-reset-3.8.4-4.el8.x86_64.rpm 5d99904b88d20974973b30e16d118ed1f4fba2b9138897bdf392eb00fe62c107 sanlock-3.8.4-4.el8.x86_64.rpm 654cebaf1bf1b42cb78225bc15ce12bb9282ff53e06627ec0b7f9ed469e03a00 RLBA-2022:7776 libverto bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libverto. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libverto-libev-0.3.2-2.el8.x86_64.rpm c0f58652b59ca82763860f53f288449c6707c61e769ada7010454abd0603865a RLBA-2022:7783 util-linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-libmount-2.32.1-38.el8.x86_64.rpm ea9c81249ea546c2a79b65edb54694a9a0e1bab7d51cb9432d6ef8089dfe6439 RLBA-2022:7786 libselinux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libselinux-ruby-2.9-6.el8.x86_64.rpm 2a5b7dbd02c5776cd8ec453af6971a94c486325d05f86cb877979095a9c7daf6 RLEA-2022:7797 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms eth-tools-basic-11.3.0.0-1.el8.x86_64.rpm b737a706ddd7eb66e5ec36939762facfca9ef1024c5f54e0861dda61bf1e6cf0 eth-tools-fastfabric-11.3.0.0-1.el8.x86_64.rpm ba86e4ca08507ace4effef1704dd98444dd4643b1b92b29f28379a6fae833e22 fabtests-1.15.1-1.el8.x86_64.rpm c7ca517e48ea1f77adc9bc0ee2f7176adf2c331b90d7ccf92f850022f31a1a7e libvma-9.6.4-1.el8.x86_64.rpm 2b31ad656b5a84b2568145bcc11ce61a4ff6d2c555caf0ff5f2d2a0b954e061e mstflint-4.21.0-1.el8.x86_64.rpm fdcb52a33b993aa19181e3d0665a467ea8405cb7ff88078fa8b169511dcac099 ucx-1.13.0-1.el8.x86_64.rpm 1d7ec0c05bb2563c4c5fbc6f4d38778b1bfc2667387ec7c0cd88a81df070bf58 ucx-cma-1.13.0-1.el8.x86_64.rpm 272cd740693dbf9243e665dc84f3fa92a5dc2a2a974ccb283a311f58466d569e ucx-devel-1.13.0-1.el8.x86_64.rpm 31c1637913be8ef679e273b472264cfd6741e6ce50e6835c744b10a78d846471 ucx-ib-1.13.0-1.el8.x86_64.rpm dce07ebbd90ca1f8d20853a2fb42c0f8fbf512bc633c68e309fc985c11e4a1c0 ucx-rdmacm-1.13.0-1.el8.x86_64.rpm 4a10f4601d8e5fe574fbc8fb996f06985521aa807c39a58c30465e57489e8d14 RLBA-2022:7805 policycoreutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms policycoreutils-gui-2.9-20.el8.noarch.rpm 1d99560135850829f9dc0fb2b77885c934580993648eb3a8b42ab244522d4c70 policycoreutils-sandbox-2.9-20.el8.x86_64.rpm b6dcb5c056adf4f355f2fb41e46feb691faf5c3bd2ba26e5afef9538c6ef1871 RLBA-2022:7819 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) rocky-linux-8-x86-64-appstream-rpms rpm-build-4.14.3-24.el8_7.x86_64.rpm 677b722768bb6fbb4b9479ffad9cb7f69aaaa06718686d75d66dd87a8081f0f5 rpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpm 321b320ea3f4f0e28d68daf77bd6f004329e48700273b0f6138519ccd7474e6e RLBA-2022:7825 bind bug fix and enhancement update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272) rocky-linux-8-x86-64-appstream-rpms bind-9.11.36-5.el8_7.2.x86_64.rpm 21abee84a89028d14ce98980aa383f28918bde55413fbd9e0cac50b19fb800df bind-chroot-9.11.36-5.el8_7.2.x86_64.rpm c0145d2d72c77b41ddd899f6cfbe5f616b0b9dff9c142767a31144375e78e082 bind-devel-9.11.36-5.el8_7.2.x86_64.rpm 09a84b9fa5fad18116b216c46c47aed57687a4836220f1efe46ccfab229322be bind-libs-9.11.36-5.el8_7.2.x86_64.rpm 91e2c3e97c80d3bf7889b9a54a56b5023f0f836b5ff90fa0d9d89c57daaa7dc0 bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm 1076cfd8cf8a54db16a2bd8ad4afac3af11af0c7b64efca9f099001be25abac7 bind-license-9.11.36-5.el8_7.2.noarch.rpm 6962b9370b7289b60f13dd744a4686cc326e572e0d78146d05bb2d185cc25609 bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpm e92594606ed4e209aeee470bdbbb0f914407eaacbaaf51287dd0b87d2c11f9e2 bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpm ff6eeac2c720aa70d0833d6f67674797320f7a604bd0e89d7e3b104dc218a09d bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpm ac101cab9169d403cb52c7102ccd5464f7bd937c8433402506275a1888b2f367 bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpm f4b183526a9aa05136adbb5e85f751d999d7890304108ba2398bf1d7c6c15684 bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpm dbe7c50b37b95e2cd134a1985e23e9c31573b20a06870e7e81280c52f78a7cf8 bind-sdb-9.11.36-5.el8_7.2.x86_64.rpm 0c54ec1aa90b2dbd9db277762b9c87e5c203662c7e9fb4e4f339fd5d0e508127 bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpm 4b1f0cbc1fb7fb538f4dfaffd41e20b56067054ab12452ead829aaeadfeba5f1 bind-utils-9.11.36-5.el8_7.2.x86_64.rpm 32150af88921ca072ecb2c37e21606693effcba9264fbe9b9acf52fe11a5df5c python3-bind-9.11.36-5.el8_7.2.noarch.rpm b218709131629d02a30d045c0bcf541ee2262bbd083d07b35e263675fce0703e RLBA-2022:7828 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) rocky-linux-8-x86-64-appstream-rpms NetworkManager-cloud-setup-1.40.0-2.el8_7.x86_64.rpm 1759b995a9e30a6e3237ce2e58473e1a0bdcf88663abb49967dad49a8f94ae5c RLBA-2022:7829 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) rocky-linux-8-x86-64-appstream-rpms sssd-idp-2.7.3-4.el8_7.1.x86_64.rpm 3c6c95405c3b4e996b6bf4f2cc6485b989ea323907be522fad24fe0c3956679c RLBA-2022:7884 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-8-x86-64-appstream-rpms tzdata-java-2022f-1.el8.noarch.rpm 0a7ca48030df3fda59da01d6e365550ff67b508a4583d00d2f348b9a50550984 RLBA-2022:8785 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. rocky-linux-8-x86-64-appstream-rpms tzdata-java-2022g-1.el8.noarch.rpm d5799859d5ae6af11f34b5c55e385e2f26daa17a9b635a9a9446f134e31d707d RLBA-2023:0085 net-snmp bug fix and enhancement update The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) rocky-linux-8-x86-64-appstream-rpms net-snmp-5.8-25.el8_7.1.x86_64.rpm 8e7570faa67317a9a726d1323277d9efd27a9b291c3dc345c18f7e741cd39ce5 net-snmp-agent-libs-5.8-25.el8_7.1.x86_64.rpm 739c2a903c800b8afd884b0b67a5aa02683a5f6cb145b1b5aeaecc5f8ec5ea2c net-snmp-devel-5.8-25.el8_7.1.x86_64.rpm 6d6a6b021a77c170e8ef0b1df2c46d6c59e77305469232d38f5068d443116691 net-snmp-perl-5.8-25.el8_7.1.x86_64.rpm cfec9b175bfa5cb9978309ef54574d767d0fff689899780ac3cea2f171a332de net-snmp-utils-5.8-25.el8_7.1.x86_64.rpm 0b85a6937805187a8507ac0e374a11d2414b5008fcc92e2d94fc27bd23ff541e RLSA-2023:0096 Moderate: dbus security update D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms dbus-devel-1.12.8-23.el8_7.1.x86_64.rpm f3459cfbe2e627daed858265868a5c0c4d657e939594cc0e0269423090018cd8 dbus-x11-1.12.8-23.el8_7.1.x86_64.rpm a998c811a937fd7398a0f7821ff5272a8da1b1cb4be7e2733caa1c68055cdef5 RLBA-2023:0098 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) rocky-linux-8-x86-64-appstream-rpms NetworkManager-cloud-setup-1.40.0-5.el8_7.x86_64.rpm 02a5132a0d3b86743d4f6f24d1f74aacfcdf566b45967ef872f4e09c8d01b466 RLBA-2023:0105 util-linux bug fix and enhancement update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) rocky-linux-8-x86-64-appstream-rpms python3-libmount-2.32.1-39.el8_7.x86_64.rpm f614fd2c1fc6b957438d93fada12ea568af9ca25305eb3b3025579c4b897e852 RLBA-2023:0106 gcc bug fix and enhancement update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) rocky-linux-8-x86-64-appstream-rpms cpp-8.5.0-16.el8_7.x86_64.rpm 023d14d82ff5f25ecc443509a50d3ea5ef0f42fee1805ef8c3d4bec535324e20 gcc-8.5.0-16.el8_7.x86_64.rpm 5b8aace21801f6e6702d6c33e3279dfd9fe894f28d3450236090d075f4509aa2 gcc-c++-8.5.0-16.el8_7.x86_64.rpm 57eb119d1affce29d7c09427b3d2427ef18ed75513c2e9e178f2833b3f6bbdf1 gcc-gdb-plugin-8.5.0-16.el8_7.x86_64.rpm d3b4ec734d470f1c9d7465a9319b2b2d2eac0002a8d8fadd8e578f63c60e77d7 gcc-gfortran-8.5.0-16.el8_7.x86_64.rpm e67137a484d7cca1e388ff92031924bf979e485c85c75ab4887ab93f91cecfa9 gcc-offload-nvptx-8.5.0-16.el8_7.x86_64.rpm 9c79ffc7831ffcac7bb2fa8dab7b9a47e1cc4c8f75bd62f174b68cf0baccfef3 gcc-plugin-annobin-8.5.0-16.el8_7.x86_64.rpm 4c251a06c8b5032d7bb6b3bd3cb637cce6e8f6698e6c76460d436498c2c1b8f7 libitm-devel-8.5.0-16.el8_7.x86_64.rpm b786e7d6210051d4d18a5208fb0ee426ffd6287b49252f502c69c4137320234c libquadmath-devel-8.5.0-16.el8_7.x86_64.rpm 47a32750c89cf5e9cdf6a43a4c93556542997c14c8cf9cd83c2f2f97131b93cf libstdc++-devel-8.5.0-16.el8_7.x86_64.rpm 4967a6b2121388225a306e92f6de0f0208a07f614cf7fa5083c87ed433170fed libstdc++-docs-8.5.0-16.el8_7.x86_64.rpm a7ef4e076abca80ffad691972f006805d09d37c90bfb3d3c661ff096344f2a3c RLSA-2023:0110 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms lemon-3.26.0-17.el8_7.x86_64.rpm 47817f17935b6af44be335b39a44b5a6d0772b6ea2d78d245d549a8e56c01d41 RLSA-2023:0116 Moderate: libtasn1 security update A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libtasn1-devel-4.13-4.el8_7.x86_64.rpm 0d55122e296074efde594a2ff30970b1cfe31086b7273908aa34d2b1059ae1a2 libtasn1-tools-4.13-4.el8_7.x86_64.rpm 46d0db87e2f9d5aa78b591286d07345cb18efaefc4c93756852468c7801fe040 RLBA-2023:0120 authselect bug fix and enhancement update The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) rocky-linux-8-x86-64-appstream-rpms authselect-compat-1.2.5-2.el8_7.x86_64.rpm 0dcb5ee8ac4d74314203eda35bca1ed32982ff799e837977f92a580e6892c52b RLBA-2023:0124 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) rocky-linux-8-x86-64-appstream-rpms sssd-idp-2.7.3-4.el8_7.3.x86_64.rpm e3a0ab19cdf0ff2dec20c7e33f97069bae225df8c11a5b01a4d193b524c15bab RLSA-2023:0173 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libxml2-devel-2.9.7-15.el8_7.1.x86_64.rpm f779a0f9675a3365dffafa0e432c44e9166dec2ce6164f1d3baf17bde23f2bfd RLBA-2019:0973 container-tools bug fix update The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc. Users of container-tools are advised to upgrade to this updated package, which fixes several bugs. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc. Users of container-tools are advised to upgrade to this updated package, which fixes several bugs. rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:0975 Important: container-tools:rhel8 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675) * [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669) * [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675) * [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669) * [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689) rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:0981 Important: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636) * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636) * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLSA-2019:0984 Moderate: python36:3.6 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-nose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__python36 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 RLBA-2019:0986 rhn-tools:1.0 bug fix update Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release. Bug Fix(es): * Cannot provision PPC64LE Rocky Linux8 host: grubby-bls: the option "--yaboot" was deprecated (BZ#1702181) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osad, spacewalk-abrt, rhn-custom-info, rhncfg, spacewalk-koan, spacewalk-oscap, spacewalk-backend, rhn-virtualization, spacewalk-usix, rhnpush, spacewalk-client-cert, cobbler, spacewalk-remote-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release. Bug Fix(es): * Cannot provision PPC64LE Rocky Linux8 host: grubby-bls: the option "--yaboot" was deprecated (BZ#1702181) rocky-linux-8-x86-64-appstream-rpms__rhn-tools koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm ef6a6abd5a24a20830e6a532506c6325391ef0cba9d5921b87ea468215214fe5 osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 2133db14f204ca048a15cfcb20b148b8d5f73c6275072c959545195e63ec0105 python3-koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm a0ce2d95b51241c2167ddbee03fca8b5d3ce76deb8c45482aa970a49305e1ebe python3-osa-common-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm cd02043d059cb29919b7fb2f2464d388bff93d93adcf7ddf24e24453a4e8e40f python3-osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 6a9074192b7c122b476fa15d474961604260fdec74cca10502cc41321384d8a7 python3-rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 993f6be05e14a31109e8dda51488579cff948a3675e7456266c016e43560f4b6 python3-rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 72850cebd3ee25af5b34c3c7b16e9560d178ce1352d28c73519303434ae76b66 python3-rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 1e1f7c96bc40a2e005d06247d6417ffe44563f06859f59a48cae629ca4893544 python3-rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 9e19116ea8766b48317a9c8d20058530345b3d814ed222c81f0da6de1cf50554 python3-rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 104a20afd1759671beb597de2dca516301151e57ee15053f7aa9e9d631b3eccc python3-rhn-virtualization-common-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 59e9f5e5a42a345e883e1f24d44ba4374d4318f88cdd52ccf41d628311c1fe47 python3-rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 9d4d2782acf243b6f5dec466200f12797c0ea21854a89ee4cee3f8dbb205a266 python3-spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 13f25bdb91b8e5f474c8a85d4799cf02048d64f74c7af73ec099f30d82b064b0 python3-spacewalk-backend-libs-2.8.48-4.module+el8.3.0+252+a4420673.noarch.rpm 81fa5ec16047238ca83e846515d64888a26aeca598f3c7ffea7e538f882b8c4b python3-spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm f17dbf0ff52ef317f7d9b48d61fd61d97afce69cab09fa39e3bf71042cb791ba python3-spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm 87030b53537711a41fdc570ff7fce2f67027417f043d616652ccbba6258cd858 python3-spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm 7de8880e395f8bc88ae6b250654293fdbb43ba5ccd5276d4f3477ae47c70e13a rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 3502c4651d93969e0d98a563e60277e1ac9accb3ea506f8368a87c9320e8596b rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 6a761d9a856fba39dd1eb646c1ad24d9b5da6c093d42ed03c45e73a00f66035e rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm f170cbf71b957bb4f71168849ce869c0a570c18c8ad487196c50b80fe07e9e55 rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 00e597136de3c22b598803c6a00901193c6590c261ecf7b57d8c4953353315d9 rhn-custom-info-5.4.42-4.module+el8.3.0+252+a4420673.noarch.rpm 1e2c7e789b48516f62d6a8b98b7316a655f35207cc6e792bf28cd23fcc8c52a3 rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 6f3e46bb12ae2aa9fc3b5083e8d4706510effb90e07dfa87c852b0086d06a6cf rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm e72d2685a7f8a7b786918b618d98ff743332a07137d079e0d2d12ecf86431444 spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 39b418c006dd634bc6433e787323bbc39099af1aa152447952e96000be3e3226 spacewalk-client-cert-2.8.2-3.module+el8.3.0+252+a4420673.noarch.rpm b8628a7c0b5a8ff78e442b97ef471d3ff75868232aaa1d8e11b04f80d4706a4d spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm dbfd4518fff5db07595559409fffb9d203a4dcc50aaddf0a9e1c5e15ede11720 spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm dbe62414978cb5a33feaf68b24d3f90a8378b7eb6c8d4438ee8119d702e58354 spacewalk-remote-utils-2.8.4-5.module+el8.3.0+252+a4420673.noarch.rpm 2fead60abcda5cce898895895cc0105fe97c7e0496cd6ae63be8e03a48852dd1 spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm f254208706acce7b4bc22289c9c5adc4cda822dbb62e7e1f1260be6848c1c959 RLBA-2019:0987 mariadb:10.3 bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Bug Fix(es): * Altering table's column used in primary key causes data corruption (BZ#1702602) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Bug Fix(es): * Altering table's column used in primary key causes data corruption (BZ#1702602) rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLBA-2019:1524 rhn-tools:1.0 bug fix update Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release. This update fixes the following bug: There was a problem that was caused by a missing tar command for the system provisioning script (BZ#1703706). Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osad, spacewalk-abrt, rhn-custom-info, rhncfg, spacewalk-oscap, spacewalk-backend, rhn-virtualization, spacewalk-usix, rhnpush, spacewalk-client-cert, cobbler. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release. This update fixes the following bug: There was a problem that was caused by a missing tar command for the system provisioning script (BZ#1703706). rocky-linux-8-x86-64-appstream-rpms__rhn-tools koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm ef6a6abd5a24a20830e6a532506c6325391ef0cba9d5921b87ea468215214fe5 osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 2133db14f204ca048a15cfcb20b148b8d5f73c6275072c959545195e63ec0105 python3-koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm a0ce2d95b51241c2167ddbee03fca8b5d3ce76deb8c45482aa970a49305e1ebe python3-osa-common-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm cd02043d059cb29919b7fb2f2464d388bff93d93adcf7ddf24e24453a4e8e40f python3-osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 6a9074192b7c122b476fa15d474961604260fdec74cca10502cc41321384d8a7 python3-rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 993f6be05e14a31109e8dda51488579cff948a3675e7456266c016e43560f4b6 python3-rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 72850cebd3ee25af5b34c3c7b16e9560d178ce1352d28c73519303434ae76b66 python3-rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 1e1f7c96bc40a2e005d06247d6417ffe44563f06859f59a48cae629ca4893544 python3-rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 9e19116ea8766b48317a9c8d20058530345b3d814ed222c81f0da6de1cf50554 python3-rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 104a20afd1759671beb597de2dca516301151e57ee15053f7aa9e9d631b3eccc python3-rhn-virtualization-common-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 59e9f5e5a42a345e883e1f24d44ba4374d4318f88cdd52ccf41d628311c1fe47 python3-rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 9d4d2782acf243b6f5dec466200f12797c0ea21854a89ee4cee3f8dbb205a266 python3-spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 13f25bdb91b8e5f474c8a85d4799cf02048d64f74c7af73ec099f30d82b064b0 python3-spacewalk-backend-libs-2.8.48-4.module+el8.3.0+252+a4420673.noarch.rpm 81fa5ec16047238ca83e846515d64888a26aeca598f3c7ffea7e538f882b8c4b python3-spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm 87030b53537711a41fdc570ff7fce2f67027417f043d616652ccbba6258cd858 python3-spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm 7de8880e395f8bc88ae6b250654293fdbb43ba5ccd5276d4f3477ae47c70e13a rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 3502c4651d93969e0d98a563e60277e1ac9accb3ea506f8368a87c9320e8596b rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 6a761d9a856fba39dd1eb646c1ad24d9b5da6c093d42ed03c45e73a00f66035e rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm f170cbf71b957bb4f71168849ce869c0a570c18c8ad487196c50b80fe07e9e55 rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 00e597136de3c22b598803c6a00901193c6590c261ecf7b57d8c4953353315d9 rhn-custom-info-5.4.42-4.module+el8.3.0+252+a4420673.noarch.rpm 1e2c7e789b48516f62d6a8b98b7316a655f35207cc6e792bf28cd23fcc8c52a3 rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 6f3e46bb12ae2aa9fc3b5083e8d4706510effb90e07dfa87c852b0086d06a6cf rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm e72d2685a7f8a7b786918b618d98ff743332a07137d079e0d2d12ecf86431444 spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 39b418c006dd634bc6433e787323bbc39099af1aa152447952e96000be3e3226 spacewalk-client-cert-2.8.2-3.module+el8.3.0+252+a4420673.noarch.rpm b8628a7c0b5a8ff78e442b97ef471d3ff75868232aaa1d8e11b04f80d4706a4d spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm dbe62414978cb5a33feaf68b24d3f90a8378b7eb6c8d4438ee8119d702e58354 spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm f254208706acce7b4bc22289c9c5adc4cda822dbb62e7e1f1260be6848c1c959 RLSA-2019:1529 Important: pki-deps:10.6 security update The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Open redirect in default servlet (CVE-2018-11784) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Open redirect in default servlet (CVE-2018-11784) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLBA-2019:1970 authd bug fix update The authd packages contain authd, a small and fast RFC 1413 ident protocol daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd. Bug Fix(es): * authd authentication fails with ERROR:NO-USER (BZ#1730802) Users of authd are advised to upgrade to this updated package, which fixes this bug. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authd packages contain authd, a small and fast RFC 1413 ident protocol daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd. Bug Fix(es): * authd authentication fails with ERROR:NO-USER (BZ#1730802) Users of authd are advised to upgrade to this updated package, which fixes this bug. rocky-linux-8-x86-64-appstream-rpms authd-1.4.4-5.el8_0.1.x86_64.rpm 2cd8989ff633196026606258fc42d248b1ff003662ee845a9e9f197af077da1b RLSA-2019:1972 Important: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLBA-2019:1954 python27:2.7 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757) rocky-linux-8-x86-64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLBA-2019:1955 satellite-5-client module update Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) rocky-linux-8-x86-64-appstream-rpms__satellite-5-client dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm c738f38ce26ddcc540a4b59a1d0c2c133be8f2391b0526185a64142906a30a82 python3-dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm 65996b41301af857a541928e6ab60fe6ab556f582566dc8cdec0d42284ec7cc4 python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 571a4ec8b5b17116dc1105367bf344d2d5e99d7f64cdd139abed68156604ec5f python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 711ac546b34b0800ad9a428df43abb16d49657037165d9346094b2ef7b1d4838 python3-rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm 4ea6368bf1b879bdeb7927df0cc66a74c94e25f918ff7eb7bcac25a8413543e2 python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 12bed1b1726516134b87a833019a03971acdd2647ee20d835a508123e93e6e28 python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm eaa1b2f91389b2137df2afee36b21556592e777c9c5fea50173ae7d325c4c803 rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm c6ebd58dbc04bc16d86ad30394c59c6252992b6a9b7c05322b1245927b6a78d3 rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 32e4a7d4235da0cca307470b72205611adf539711e176d057fb8deb1e08a5641 rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm b71d82c660d0b4b0da5eb8e25137387c4a9376ff7d17f53ab57c7b87b6679eb8 rhnsd-5.0.35-3.module+el8.3.0+178+27415451.x86_64.rpm 7f2a23b3dd1997439a3c6e06b639d153a960ce6f0224be8bba18423a69050124 rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 9e363cfb7f6d2dc976c53838116bfafcb58be49f3f261af1ab1f64df89111d9b rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm bd1750ce82956377455e3b6de5ac8700eb1a34405d6d6568794da3e97330abe5 RLBA-2019:1956 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470) * Performance Problems with Podman on systems with IO load (BZ#1724522) * podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470) * Performance Problems with Podman on systems with IO load (BZ#1724522) * podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270) rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:2511 Important: mysql:8.0 security update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs. The following packages have been upgraded to a later upstream version: mysql (8.0.17). Security Fix(es): * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503) * mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752) * mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536) * mysql: Server: Connection unspecified vulnerability (CVE-2019-2539) * mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737) * mysql: Server: XML unspecified vulnerability (CVE-2019-2740) * mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780) * mysql: Server: DML unspecified vulnerability (CVE-2019-2784) * mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795) * mysql: Client programs unspecified vulnerability (CVE-2019-2797) * mysql: Server: FTS unspecified vulnerability (CVE-2019-2801) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819) * mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mecab-ipadic, mecab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs. The following packages have been upgraded to a later upstream version: mysql (8.0.17). Security Fix(es): * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503) * mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752) * mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536) * mysql: Server: Connection unspecified vulnerability (CVE-2019-2539) * mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737) * mysql: Server: XML unspecified vulnerability (CVE-2019-2740) * mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780) * mysql: Server: DML unspecified vulnerability (CVE-2019-2784) * mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795) * mysql: Client programs unspecified vulnerability (CVE-2019-2797) * mysql: Server: FTS unspecified vulnerability (CVE-2019-2801) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819) * mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mysql mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f RLSA-2019:2512 Important: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a RLSA-2019:2593 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLBA-2019:2716 python36:3.6 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732325) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-nose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732325) rocky-linux-8-x86-64-appstream-rpms__python36 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 RLBA-2019:2717 python27:2.7 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732326) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732326) rocky-linux-8-x86-64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLSA-2019:2720 Important: pki-deps:10.6 security update The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLSA-2019:2722 Low: libwmf security update The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick. Security Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libwmf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick. Security Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libwmf-0.2.9-8.el8_0.x86_64.rpm 4f37891f78181ba5c63beed49787b5dc6576856fddadac0da20d190f25c58590 libwmf-lite-0.2.9-8.el8_0.x86_64.rpm af3108a84c555c5b19277f7f16ab43f0f3b406c601be1b7b8c4364e33f17c633 RLBA-2019:2723 container-tools:rhel8 bug fix update Bug Fix(es): * race/corruption: podman failed to launch containers (BZ#1741110) * podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * race/corruption: podman failed to launch containers (BZ#1741110) * podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163) rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLBA-2019:2724 container-tools:1.0 bug fix update Bug Fix(es): * [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707) rocky-linux-8-x86-64-appstream-rpms__container-tools fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:2799 Important: nginx:1.14 security update Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage. Security Fix(es): * HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage. Security Fix(es): * HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm d77c1f61ff7c954fca0a2fac6b5d215deb913be94829d83e7669a94326341d88 nginx-all-modules-1.14.1-9.module+el8.4.0+542+81547229.noarch.rpm eb20aa61d586dcb30576b6859546e0b777311d2748379db94f9006592eb2a437 nginx-filesystem-1.14.1-9.module+el8.4.0+542+81547229.noarch.rpm 734955ee4e9cc7dd8e87ae6c6cfb3c5bcc3e437d89b3ee82334127ddf27b1d49 nginx-mod-http-image-filter-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm af1755fac641c16ca7dbfd78ecd5853b85189fe2a9013a80d6cc15c790c20758 nginx-mod-http-perl-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm 68ffe1514e55b20afe3fd0d9de5651c799941543bc015e44f9524e30a665639d nginx-mod-http-xslt-filter-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm 337667809e6b461078276949229dbf337915a06945bd083743501c0247d7f9f5 nginx-mod-mail-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm b154bd4e42e272dbb325d06f7eae09abb9feb4038299f6dce1fc95b9c918ffd4 nginx-mod-stream-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm 19a19fe758d472c9c8b471a8ae875482372f340f668184510ff7121d0832d5e8 RLSA-2019:2925 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.16.3). Security Fix(es): * HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) * HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516) * HTTP/2: request for large response leads to denial of service (CVE-2019-9517) * HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.16.3). Security Fix(es): * HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) * HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516) * HTTP/2: request for large response leads to denial of service (CVE-2019-9517) * HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2019:3331 perl-generators bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-generators. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms perl-generators-1.10-9.el8.noarch.rpm fd3bb64efcd24efd5d404cd8ea31bdf335f382cf2a77811750f841b690a48fc4 RLSA-2019:3335 Moderate: python27:2.7 security and bug fix update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446) * python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740) * python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947) * python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446) * python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740) * python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947) * python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLBA-2019:3336 nss-altfiles bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nss-altfiles. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nss-altfiles-2.18.1-12.el8.x86_64.rpm 9c32bc933f3ad0cc751246893ab76d85f3839afe2d70f6f2d945dcc97019ad85 RLBA-2019:3343 python36:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pymongo, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python36 python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm 434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 RLSA-2019:3345 Low: virt:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755) * QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755) * QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2019:3348 idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLBA-2019:3355 rhn-tools:1.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osad, spacewalk-abrt, rhn-custom-info, rhncfg, spacewalk-koan, spacewalk-oscap, spacewalk-backend, rhn-virtualization, spacewalk-usix, rhnpush, spacewalk-client-cert, cobbler, spacewalk-remote-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__rhn-tools koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm ef6a6abd5a24a20830e6a532506c6325391ef0cba9d5921b87ea468215214fe5 osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 2133db14f204ca048a15cfcb20b148b8d5f73c6275072c959545195e63ec0105 python3-koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm a0ce2d95b51241c2167ddbee03fca8b5d3ce76deb8c45482aa970a49305e1ebe python3-osa-common-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm cd02043d059cb29919b7fb2f2464d388bff93d93adcf7ddf24e24453a4e8e40f python3-osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 6a9074192b7c122b476fa15d474961604260fdec74cca10502cc41321384d8a7 python3-rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 993f6be05e14a31109e8dda51488579cff948a3675e7456266c016e43560f4b6 python3-rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 72850cebd3ee25af5b34c3c7b16e9560d178ce1352d28c73519303434ae76b66 python3-rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 1e1f7c96bc40a2e005d06247d6417ffe44563f06859f59a48cae629ca4893544 python3-rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 9e19116ea8766b48317a9c8d20058530345b3d814ed222c81f0da6de1cf50554 python3-rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 104a20afd1759671beb597de2dca516301151e57ee15053f7aa9e9d631b3eccc python3-rhn-virtualization-common-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 59e9f5e5a42a345e883e1f24d44ba4374d4318f88cdd52ccf41d628311c1fe47 python3-rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 9d4d2782acf243b6f5dec466200f12797c0ea21854a89ee4cee3f8dbb205a266 python3-spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 13f25bdb91b8e5f474c8a85d4799cf02048d64f74c7af73ec099f30d82b064b0 python3-spacewalk-backend-libs-2.8.48-4.module+el8.3.0+252+a4420673.noarch.rpm 81fa5ec16047238ca83e846515d64888a26aeca598f3c7ffea7e538f882b8c4b python3-spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm f17dbf0ff52ef317f7d9b48d61fd61d97afce69cab09fa39e3bf71042cb791ba python3-spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm 87030b53537711a41fdc570ff7fce2f67027417f043d616652ccbba6258cd858 python3-spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm 7de8880e395f8bc88ae6b250654293fdbb43ba5ccd5276d4f3477ae47c70e13a rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 3502c4651d93969e0d98a563e60277e1ac9accb3ea506f8368a87c9320e8596b rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 6a761d9a856fba39dd1eb646c1ad24d9b5da6c093d42ed03c45e73a00f66035e rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm f170cbf71b957bb4f71168849ce869c0a570c18c8ad487196c50b80fe07e9e55 rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 00e597136de3c22b598803c6a00901193c6590c261ecf7b57d8c4953353315d9 rhn-custom-info-5.4.42-4.module+el8.3.0+252+a4420673.noarch.rpm 1e2c7e789b48516f62d6a8b98b7316a655f35207cc6e792bf28cd23fcc8c52a3 rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 6f3e46bb12ae2aa9fc3b5083e8d4706510effb90e07dfa87c852b0086d06a6cf rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm e72d2685a7f8a7b786918b618d98ff743332a07137d079e0d2d12ecf86431444 spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 39b418c006dd634bc6433e787323bbc39099af1aa152447952e96000be3e3226 spacewalk-client-cert-2.8.2-3.module+el8.3.0+252+a4420673.noarch.rpm b8628a7c0b5a8ff78e442b97ef471d3ff75868232aaa1d8e11b04f80d4706a4d spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm dbfd4518fff5db07595559409fffb9d203a4dcc50aaddf0a9e1c5e15ede11720 spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm dbe62414978cb5a33feaf68b24d3f90a8378b7eb6c8d4438ee8119d702e58354 spacewalk-remote-utils-2.8.4-5.module+el8.3.0+252+a4420673.noarch.rpm 2fead60abcda5cce898895895cc0105fe97c7e0496cd6ae63be8e03a48852dd1 spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm f254208706acce7b4bc22289c9c5adc4cda822dbb62e7e1f1260be6848c1c959 RLEA-2019:3361 gedit-plugins bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gedit-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gedit-plugin-bookmarks-3.28.1-8.el8.x86_64.rpm 8ee55f18c9ef924892aa658c08c4ee530cb746cc53c55b406995db7d500bb9e9 gedit-plugin-bracketcompletion-3.28.1-8.el8.x86_64.rpm 56c21923ee5a336aee82c875144d0ed34336611e97bd0f14a90debe433afb39b gedit-plugin-codecomment-3.28.1-8.el8.x86_64.rpm ab8bb5e0f23e617cbf0492b714c384c8a84f133e2cc91215268d1e3b40e4f485 gedit-plugin-colorpicker-3.28.1-8.el8.x86_64.rpm 6e2a9fd2d5b7c4c15b5f143635c1cccd1ddd3328d7114d91dab524b2183a7ba4 gedit-plugin-colorschemer-3.28.1-8.el8.x86_64.rpm 8c76c2706aadb7d8b94da6c1f6aaadc265bc54af15fdfd111debeba11653a961 gedit-plugin-commander-3.28.1-8.el8.x86_64.rpm cef1bdf4601e1a18dacd7489b8ae0a6eaba6a88bd6faeb00ff34d33372205869 gedit-plugin-drawspaces-3.28.1-8.el8.x86_64.rpm 32093993ce0f43cbf5808c19504f7f54f6e2dd2e0c3ec55b896b27a83000acc9 gedit-plugin-findinfiles-3.28.1-8.el8.x86_64.rpm c9e327e321b30c1277553b9fb078f61b0b0faecef864462ace636eae756c0cad gedit-plugin-joinlines-3.28.1-8.el8.x86_64.rpm 3099b3395a9f8da5b15e20da5eba3fe5a71ba310c7d8a1868d24c932f9d5ce90 gedit-plugin-multiedit-3.28.1-8.el8.x86_64.rpm 444af7dbedaa40019c503f13d0a82f74f7b7d87bf687190a04be717de6fc51cc gedit-plugins-3.28.1-8.el8.x86_64.rpm 60987cdc33bea0a8464f6f351a7cef7d2dda4b464c7addc316b1cf7128af31ab gedit-plugins-data-3.28.1-8.el8.x86_64.rpm d56b807f59f8559097c097eca3cc8124ca9c4dc9c4c4c7051bfa0d92501163a2 gedit-plugin-smartspaces-3.28.1-8.el8.x86_64.rpm a95cfd63cf7ad33d989da3aff0583f8ba5005be4c34fe4421a82bc9e4d0421d0 gedit-plugin-terminal-3.28.1-8.el8.x86_64.rpm 8e2cbc6e55d8695c8538ab32cb61d05b2c9d9f29c69a1df115f0d2a76559db4f gedit-plugin-textsize-3.28.1-8.el8.x86_64.rpm 387df64b03c799e437a87611a9740bdb794d4c4ff16e8437ff4d0a82d7eb1247 gedit-plugin-translate-3.28.1-8.el8.x86_64.rpm 1687bf81b496c1c398996db23046a9fb27046ec197dec3f4df82e944ce32af1a gedit-plugin-wordcompletion-3.28.1-8.el8.x86_64.rpm 0e61a5476f5485156b60fb3d04687f88b52364a34aa52ab9ab09334a54c6729d RLEA-2019:3367 google-noto-cjk-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for google-noto-cjk-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms google-noto-cjk-fonts-common-20190416-1.el8.noarch.rpm 05c71f569e9d099ae44beb99756dd24bdf1b11477afdd708c0d052724ffba567 google-noto-sans-cjk-ttc-fonts-20190416-1.el8.noarch.rpm 4f0722dcdf2d0d991caff93ec045892068d7425a3c5caca96b202fb5f7671235 google-noto-serif-cjk-ttc-fonts-20190416-1.el8.noarch.rpm 18a6756341c5e3791726593ed822a6f4d034c048d7a3cd9bb4f36bb85fac5ec7 RLBA-2019:3373 criu bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f RLBA-2019:3374 php:7.2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpm 4b8310f3980d49aafc8a9098f45f69cab6c6d24c967f8b357541a22621c47cee libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475 libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372 libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5 php-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpm 53d93e110ac02f191341248649791187f8474454500c2137eefe0c3fa35a68e9 php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482 php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68 php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm 52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b RLEA-2019:3375 new module: php:7.3 This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45 libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm 33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744 php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5 php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7 RLBA-2019:3376 python-augeas bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-augeas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-augeas-0.5.0-12.el8.noarch.rpm bf0e98bc5c4aeb4f618e0486831e65376a472041bc0131746af02b56f3048028 RLBA-2019:3382 python-gevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-gevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d rocky-linux-8-x86-64-appstream-rpms python3-gevent-1.2.2-4.el8.x86_64.rpm 97d0e59dbd8e57beffd16895bf906d7cf06d02ee9a310e79860fef6ae78cd9bb RLBA-2019:3384 ruby:2.5 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLEA-2019:3399 alsa-plugins bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms alsa-plugins-arcamav-1.1.9-1.el8.x86_64.rpm 549d5132d498ac5385320ac8bb8df3e3e618f43e615cf453f7350ef4a304b5d4 alsa-plugins-maemo-1.1.9-1.el8.x86_64.rpm 42044dad79db97f15ca117d0850fc457c00d7728c3129af779d8f7a161fc1caf alsa-plugins-oss-1.1.9-1.el8.x86_64.rpm b5d262787692b35ebf7476e839e7977589f580726407602f525a7456cc7dfffd alsa-plugins-pulseaudio-1.1.9-1.el8.x86_64.rpm ddbee7fff19b4e1f87929dd688047339a3ad7e3fd2a6e917f417508020a6b8e7 alsa-plugins-samplerate-1.1.9-1.el8.x86_64.rpm 3b3898b0e2e748f3614d076dab4f9bcf392581a8832c8777312edfbea2d3e8ad alsa-plugins-speex-1.1.9-1.el8.x86_64.rpm 025cce6f35fcd4e0b04e329c51e37d7af2de086e39b30f3d7ae59921b186c683 alsa-plugins-upmix-1.1.9-1.el8.x86_64.rpm df4a2a71c782fae44e5f349a87ef63190682d47f8499c204e75f1c8d88f3d9de alsa-plugins-usbstream-1.1.9-1.el8.x86_64.rpm d47e53bbb122ecc904051a02b5ba3d693b8446573f58660a615f617937d6716a alsa-plugins-vdownmix-1.1.9-1.el8.x86_64.rpm 37b572f3cfb040633527f9b6ab083de2952e2f7615a6f656dcb43dbf18050ba3 RLSA-2019:3403 Important: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLBA-2019:3406 python-gssapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-gssapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-gssapi-1.5.1-5.el8.x86_64.rpm 8e40257c5b6d46b869e64fc234db0c7d78fd4659ed191df14c0d5ac45d905daa RLBA-2019:3411 lttng-ust bug fix and enhancement update This update fixes two issues in lttng-ust and subpackages. There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed. lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lttng-ust. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This update fixes two issues in lttng-ust and subpackages. There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed. lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux. rocky-linux-8-x86-64-appstream-rpms lttng-ust-2.8.1-11.el8.x86_64.rpm 69324bb766990259ee748c0fe4b146ee919478fd8c828cb2c6b48a1126c49a08 RLBA-2019:3412 X libraries bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libICE, libXt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libICE-1.0.9-15.el8.x86_64.rpm 2568b940439e3ab124234560251c5ccf3b82969b9a489a8c944919c1de9893e9 libICE-devel-1.0.9-15.el8.x86_64.rpm 12362899f5263ddce92e808a63b5e86c6f3f3c16e43faa39b71b053f3e8862f0 libXt-1.1.5-12.el8.x86_64.rpm 30df272fc4623a96e973ef361cbc6ea2eff0b5645b34f274c4a58f0ab968d6d0 libXt-devel-1.1.5-12.el8.x86_64.rpm d41ae80a927a31d8f6111dce855f27ced876a991dcf1bbe1b796d3450ebfca3e RLBA-2019:3416 pki-core:10.6 and pki-deps:10:6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLEA-2019:3420 enscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for enscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms enscript-1.6.6-17.el8.x86_64.rpm 8526cca5224af50c658f7c1e04b192c7722cce4595458a7c2f2c95527cc6b565 RLEA-2019:3425 compat-libtiff3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for compat-libtiff3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms compat-libtiff3-3.9.4-13.el8.x86_64.rpm 1304c7f70782eaa2903ca449db76e1811e0d37c90afd71ee8b511df4d4dcc164 RLEA-2019:3426 libpng15 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpng15. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpng15-1.5.30-7.el8.x86_64.rpm 8ce7dae0d8ef80a5d1feee1ebece3bec3bdef3d185d0a6b64289b01c145b2cd9 RLBA-2019:3439 new packages: gcc-toolset-9-dwz GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-dwz-0.12-1.1.el8.x86_64.rpm 5f8261a71f62b3fb4e1472718b81b1189652e72710d37df6eb38296b5b543f4b RLEA-2019:3443 new packages: gcc-toolset-9-elfutils GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-elfutils-0.176-5.el8.x86_64.rpm 2eef2ff31d574cea7416d85d9399fd82c8b3e59387c4cc33be87f3912f42bac9 gcc-toolset-9-elfutils-devel-0.176-5.el8.x86_64.rpm e9e08f5165c99f3c1de380b7918ba1e60a284640d92d0869620aeb062f85394b gcc-toolset-9-elfutils-libelf-0.176-5.el8.x86_64.rpm 846436e017c2d77367ada9744eff3c9f589343f9e85fc042fc83f498aa0db80a gcc-toolset-9-elfutils-libelf-devel-0.176-5.el8.x86_64.rpm be68c4f4732af6e419a828278bdc346e8d00ef69295efe40729edd8bfb19736a gcc-toolset-9-elfutils-libs-0.176-5.el8.x86_64.rpm 47517201979ac2449b61ab24f82ff5904364fd163721a72aa6350f054350f99e RLEA-2019:3444 new packages: gcc-toolset-9-valgrind GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-valgrind-3.15.0-9.el8.x86_64.rpm 1eb88892de938b9d4e1bd78a8014cb802c1ef6e412959a38ed7757136db4b731 gcc-toolset-9-valgrind-devel-3.15.0-9.el8.x86_64.rpm 95aa574532e5bcb97b0a73165ef1e2f77270161acba2b4a782ad0429520302fd RLEA-2019:3447 new module: ruby:2.6 This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm 2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm 338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197 rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm 0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372 RLBA-2019:3449 new packages: gcc-toolset-9-dyninst GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-dyninst-10.1.0-1.el8.x86_64.rpm 6df02dd5b151ecb1e4cdd9025b16fa9e921ef15a6b03533e3b46a215bbea8bb6 RLEA-2019:3454 new packages: gcc-toolset-9-systemtap GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-systemtap-4.1-4.el8.x86_64.rpm 5a6dc6ffb6a37f157aefbfc02164b38c1db6325000e9968867e0a2ebadbbe3af gcc-toolset-9-systemtap-client-4.1-4.el8.x86_64.rpm 8897e248306da3821d112e1f692c5a635f62ef7983b7330756e3f08191eaae13 gcc-toolset-9-systemtap-devel-4.1-4.el8.x86_64.rpm 0c9dccc40c8aafdffe1122b6060de0f59e5dcaf65027260845dfea524393ccc9 gcc-toolset-9-systemtap-initscript-4.1-4.el8.x86_64.rpm 982d1e1a8db7e14221ed71f6352bc1a52d4c835eb3a84ffb3d7d058b90f3f975 gcc-toolset-9-systemtap-runtime-4.1-4.el8.x86_64.rpm a48dea3a6f266f31d24387aafb49b337b57c384d96b5348a2d530351f68d3662 gcc-toolset-9-systemtap-sdt-devel-4.1-4.el8.x86_64.rpm f9953a98d5629774e66ec9c7a23eb9426387406cd2842bfd12664d450c3653f0 gcc-toolset-9-systemtap-server-4.1-4.el8.x86_64.rpm ec1a0beb49da172370b38ab991bafed35d2e35f057c903ccc37b54fe40d3d2b8 RLBA-2019:3455 new packages: gcc-toolset-9-ltrace GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-ltrace-0.7.91-1.el8.x86_64.rpm 8417a0a4f057afbee21e8ce44573a85c6059affeeafb4b3fc63436b4051706c8 RLBA-2019:3457 new packages: gcc-toolset-9-gdb GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-gdb-8.3-1.el8.x86_64.rpm c402ca12acdc3aba7cec6add66be4ac51a0694e46377830c2194f80f85e37cc6 gcc-toolset-9-gdb-doc-8.3-1.el8.noarch.rpm 4aaec69bdf0b16534d6f7a361bd918dc40bf9afa49ad30df39f77d1176b3665b gcc-toolset-9-gdb-gdbserver-8.3-1.el8.x86_64.rpm ff3d9a1c2d55a09a49b304e680107d73e0941c45a26d32d0d12c94f8f1e7afb2 RLBA-2019:3460 keycloak-httpd-client-install bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for keycloak-httpd-client-install. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms keycloak-httpd-client-install-1.0-2.el8.noarch.rpm 9881ad6d70f3e5e696adbb2323d52dc3b4749809aa4ae583a5d7b0eb7fa40ac7 python3-keycloak-httpd-client-install-1.0-2.el8.noarch.rpm dda4420fe5936ec7a993f6417473cd344a1889094be55f8b38a20697fc65a010 RLEA-2019:3461 new module: nodejs:12 This enhancement update adds the nodejs:12 module to Rocky Linux 8. (BZ#1685191) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the nodejs:12 module to Rocky Linux 8. (BZ#1685191) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2019:3462 libcdio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcdio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libcdio-2.0.0-3.el8.x86_64.rpm 6a060a4f1db6ba186a94e8a733dc16045b90352200136898005ef516101c1c1d RLBA-2019:3463 idm:client bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, python-yubico, python-qrcode, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLBA-2019:3465 hplip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hplip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms hplip-3.18.4-9.el8.x86_64.rpm b6ddf49b9620356330be16bd3aadce81e022fd52b3eaeb466332cb0f18bc1dfd hplip-common-3.18.4-9.el8.x86_64.rpm b2d6d0450a7b58bf970fc13cb5d3792e37ce0111c9ff99b135d3409471a8fe71 hplip-gui-3.18.4-9.el8.x86_64.rpm 561f58c36b5e5c98848e6b9025edfe5b988590166c776805997f0a549efa4125 hplip-libs-3.18.4-9.el8.x86_64.rpm fcdeb5dbff590b4c154b56471d0f3592b5998eb20cff0e8c279df0b9134b0d02 libsane-hpaio-3.18.4-9.el8.x86_64.rpm e59779857cfee8069795c2b567e877cbf81c3cb962bfe9ac98d355381471dd41 RLBA-2019:3466 libkkc-data bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libkkc-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libkkc-data-0.2.7-12.el8.x86_64.rpm 8932c5300df500745f4e27cc9210313bfa68501c5b8c98b94f336c32d7358a88 RLBA-2019:3468 sblim-indication_helper bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-indication_helper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-indication_helper-0.5.0-2.el8.x86_64.rpm 9ce614765666f2b1844db8b46414736e62a129fbbaa65a0718ecc8e9946158c3 RLBA-2019:3470 python-rpmfluff bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rpmfluff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-rpmfluff-0.5.7.1-2.el8.noarch.rpm aac41c91e05f36ade4d373f9e316c7f4225253392a845a2876450ef792fc0e2f RLBA-2019:3471 container-exception-logger bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for container-exception-logger. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms container-exception-logger-1.0.2-3.el8.x86_64.rpm 226566224f9bbee3c0b7ec102ddc1ce3f4e84fdeded9027ae7c41478e23e1063 RLEA-2019:3472 libpmemobj-cpp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpmemobj-cpp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpmemobj++-devel-1.6-2.el8.x86_64.rpm 391cececabace73d050b8bb563f1315638653716f594e042e4e9cb86f61c4b9c libpmemobj++-doc-1.6-2.el8.x86_64.rpm 9cd1db8bef466f7b30b35dbf9780d661c62b248ae6b8b37264ce18ffe8d8115f RLBA-2019:3474 satellite-5-client module update Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) rocky-linux-8-x86-64-appstream-rpms__satellite-5-client dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm c738f38ce26ddcc540a4b59a1d0c2c133be8f2391b0526185a64142906a30a82 python3-dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm 65996b41301af857a541928e6ab60fe6ab556f582566dc8cdec0d42284ec7cc4 python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 571a4ec8b5b17116dc1105367bf344d2d5e99d7f64cdd139abed68156604ec5f python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 711ac546b34b0800ad9a428df43abb16d49657037165d9346094b2ef7b1d4838 python3-rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm 4ea6368bf1b879bdeb7927df0cc66a74c94e25f918ff7eb7bcac25a8413543e2 python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 12bed1b1726516134b87a833019a03971acdd2647ee20d835a508123e93e6e28 python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm eaa1b2f91389b2137df2afee36b21556592e777c9c5fea50173ae7d325c4c803 rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm c6ebd58dbc04bc16d86ad30394c59c6252992b6a9b7c05322b1245927b6a78d3 rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 32e4a7d4235da0cca307470b72205611adf539711e176d057fb8deb1e08a5641 rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm b71d82c660d0b4b0da5eb8e25137387c4a9376ff7d17f53ab57c7b87b6679eb8 rhnsd-5.0.35-3.module+el8.3.0+178+27415451.x86_64.rpm 7f2a23b3dd1997439a3c6e06b639d153a960ce6f0224be8bba18423a69050124 rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 9e363cfb7f6d2dc976c53838116bfafcb58be49f3f261af1ab1f64df89111d9b rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm bd1750ce82956377455e3b6de5ac8700eb1a34405d6d6568794da3e97330abe5 RLSA-2019:3476 Moderate: squid:4 security and bug fix update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLBA-2019:3480 inkscape:0.92.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-scour. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__inkscape python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm 2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1 RLBA-2019:3487 abrt-java-connector bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for abrt-java-connector. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms abrt-java-connector-1.1.0-16.el8.x86_64.rpm 7e6373b1a4d155667f3d37f19a035af395ef37324f31af8968ce3b237fc85fb8 RLBA-2019:3490 ldns bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ldns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ldns-1.7.0-21.el8.x86_64.rpm 579cbe08fbd4d2870363ad94dcaac1517bfefc02621f94d79ddaf783f0ed9338 RLBA-2019:3492 jna bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jna-4.5.1-5.el8.x86_64.rpm 75e7e9bb4c13e26e4665020f7fe0ea4709ba807c6a4221fe1d9d1bedf7492074 RLSA-2019:3494 Important: container-tools:1.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLBA-2019:3500 volume_key bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for volume_key. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms volume_key-0.3.11-5.el8.x86_64.rpm 962a11cdf4fb9ce68fa7fceb99a1f3b34199320dfb11a7e4c0a1bdd7ff805f63 volume_key-devel-0.3.11-5.el8.x86_64.rpm df504d9ef85876617735bd3316c16cad07524b2622aeb16b7d7078b7af72c657 volume_key-libs-0.3.11-5.el8.x86_64.rpm f998500b251c3416e796c60f171bced0eb190acd2c4a0a6c0469fdb6072e4eb1 RLBA-2019:3507 qpdf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qpdf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qpdf-7.1.1-10.el8.x86_64.rpm 174b0828f65c2c71d0d4bf8f883e58b0369b16dfed5aec5c917717a4270026ff qpdf-doc-7.1.1-10.el8.noarch.rpm 5e25af871159ebffd4b486b696c7cc65f5a0ab695f62237e8f46ba5c43fcd696 qpdf-libs-7.1.1-10.el8.x86_64.rpm e36f1b137bf58ed4b21f333b59fbb93b4855cb9045a2c41322320e9cf58ec2c9 RLEA-2019:3557 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cmocka, nss_wrapper, uid_wrapper, socket_wrapper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nss_wrapper-1.1.5-3.el8.x86_64.rpm 5ba1254970834a881d6be6a64f03d1a5660602f5cc40f351c4d46cb04b36e5d3 RLBA-2019:3623 NetworkManager bug fix and enhancement update An update for NetworkManager is now available for Rocky Linux 8. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list An update for NetworkManager is now available for Rocky Linux 8. rocky-linux-8-x86-64-appstream-rpms NetworkManager-libreswan-1.2.10-4.el8.x86_64.rpm 60d73cbb869b8753e3627cf96d9fc5f175bc8719e912958ac88274852927ac7b NetworkManager-libreswan-gnome-1.2.10-4.el8.x86_64.rpm cab52e3f13b05fa3c1211589d2d6550fecb49d5a5dde5581995693d6c85a8294 RLSA-2019:3703 Low: libvorbis security update The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates. Security Fix(es): * libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392) * libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libvorbis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates. Security Fix(es): * libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392) * libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvorbis-1.3.6-2.el8.x86_64.rpm 2fc30d8b8e41b392adc0ecd2cd63377cc7bba4c2664d9b0437b2c6bdeed5c620 RLSA-2019:3708 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358) Security Fix(es): * mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510) * mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628) * mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739) * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740) * mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for asio, Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358) Security Fix(es): * mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510) * mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628) * mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739) * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740) * mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLSA-2019:3735 Critical: php:7.2 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpm 4b8310f3980d49aafc8a9098f45f69cab6c6d24c967f8b357541a22621c47cee libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475 libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372 libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5 php-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpm 53d93e110ac02f191341248649791187f8474454500c2137eefe0c3fa35a68e9 php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482 php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68 php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm 52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b RLSA-2019:3736 Critical: php:7.3 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45 libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm 33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744 php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5 php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7 RLBA-2019:3785 libcacard bug fix and enhancement update The libcacard packages contain the Common Access Card (CAC) emulation library. This update fixes the following bug: * Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477). Users of libcacard are advised to upgrade to these updated packages, which fix this bug. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcacard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libcacard packages contain the Common Access Card (CAC) emulation library. This update fixes the following bug: * Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477). Users of libcacard are advised to upgrade to these updated packages, which fix this bug. rocky-linux-8-x86-64-appstream-rpms libcacard-2.7.0-2.el8_1.x86_64.rpm dcc0805bce58d3f08b032fc8dae90ff8a0c35da6754643c25cd4c8f08acb81e1 libcacard-devel-2.7.0-2.el8_1.x86_64.rpm 68396d58b579bd54d1428654d9811ca4089ef7096677e225e6f868d16de147be RLBA-2019:4266 inkscape:0.92.3 bug fix update Bug Fix(es): * New inkscape (rpm) is actually older than current (BZ#1773655) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-scour. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * New inkscape (rpm) is actually older than current (BZ#1773655) rocky-linux-8-x86-64-appstream-rpms__inkscape python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm 2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1 RLBA-2019:4268 idm:DL1 bug fix update Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516) rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2019:4269 Important: container-tools:rhel8 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318) * backport json-file logging support to 1.4.2 (BZ#1770176) * Selinux won't allow SCTP inter pod communication (BZ#1774382) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318) * backport json-file logging support to 1.4.2 (BZ#1770176) * Selinux won't allow SCTP inter pod communication (BZ#1774382) rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:4273 Important: container-tools:1.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc RLBA-2019:4274 virt:rhel bug fix update Bug Fix(es): * Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829) * [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133) * Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134) * [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829) * [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133) * Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134) * [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2019:4275 nodejs:12 bug fix update The following packages have been upgraded to a later upstream version: nodejs (12.13.1). (BZ#1776116) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The following packages have been upgraded to a later upstream version: nodejs (12.13.1). (BZ#1776116) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:0279 Moderate: virt:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLEA-2020:0330 nodejs:12 enhancement update The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLEA-2020:0346 new module: postgresql:12 This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLBA-2020:0347 perl-DBD-Pg:3.7 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 RLSA-2020:0348 Important: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for containernetworking-plugins, python-podman-api, udica, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:0579 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.19.0). Security Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605) * nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604) * nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606) * npm: Symlink reference outside of node_modules folder through the bin field upon installation (CVE-2019-16775) * npm: Arbitrary file write via constructed entry in the package.json bin field (CVE-2019-16776) * npm: Global node_modules Binary Overwrite (CVE-2019-16777) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.19.0). Security Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605) * nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604) * nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606) * npm: Symlink reference outside of node_modules folder through the bin field upon installation (CVE-2019-16775) * npm: Arbitrary file write via constructed entry in the package.json bin field (CVE-2019-16776) * npm: Global node_modules Binary Overwrite (CVE-2019-16777) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:0598 Important: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.16.1). Security Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605) * nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604) * nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.16.1). Security Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605) * nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604) * nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:1293 Important: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:1317 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:1379 Important: container-tools:rhel8 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194) * fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016) * buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for udica, python-podman-api, slirp4netns, containernetworking-plugins, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194) * fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016) * buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119) rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:1354 gcc-toolset-9-binutils bug fix update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958) rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpm c4fd1717fd48949497da91cc88989d24e81fe925bb57e995aac790154d865c41 gcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpm 4664b94c012a43fd9cbb22dbb2b5717b8f1c76453bdd654a0df1ce5c5a1ebe88 RLSA-2020:1358 Important: virt:rhel security and bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2020:1360 Important: container-tools:1.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc RLEA-2020:1575 perl-Convert-ASN1 and perl-LDAP bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-LDAP, perl-Convert-ASN1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms perl-Convert-ASN1-0.27-17.el8.noarch.rpm de1154a5c04f83967e174cbba8f9bd58092b7e14b2b5eca7e54a3773682fa2b7 perl-LDAP-0.66-7.el8.noarch.rpm 5432e985d9d62e78169dd98c5a7d0de76b1a31d59f04fa3909a1ab0613d8ee81 RLSA-2020:1577 Moderate: exiv2 security, bug fix, and enhancement update The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917) Security Fix(es): * exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421) * exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005) * exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868) * exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303) * exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338) * exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229) * exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099) * exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143) * exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109) * exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111) * exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112) * exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113) * exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libgexiv2, gnome-color-manager, gegl, exiv2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917) Security Fix(es): * exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421) * exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005) * exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868) * exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303) * exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338) * exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229) * exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099) * exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143) * exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109) * exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111) * exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112) * exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113) * exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gegl-0.2.0-39.el8.x86_64.rpm 9da238520faee587b7d4c213e996ed1848c00dd0dd80efe1e497f0e91197e443 gnome-color-manager-3.28.0-3.el8.x86_64.rpm c24a3854ebc59169cedd0d384f7dff9047c81299d5ab7b13c282dbbd20dd55bd libgexiv2-0.10.8-4.el8.x86_64.rpm d6e26f8aea4dfd969f068749aeb11b99ea1a19f85b311d4c2414fc3c1332db43 RLEA-2020:1579 whois bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for whois. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms whois-5.5.1-2.el8.x86_64.rpm 2222561be8aa7f17033cf8dcbf8bd823ac3c8ec61e11da943008ecba6726bc37 whois-nls-5.5.1-2.el8.noarch.rpm 379cce764a95fc9cdcb5fdcb29a0ce4e18673fbf5322373cda4b933c826884de RLEA-2020:1587 virt:rhel bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2020:1599 libselinux-python:2.8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__libselinux-python libselinux-python-2.9-2.1.module+el8.4.0+532+c114ce35.x86_64.rpm ae7f81152647d4c05b01209e235a4844d6f51a82e70168bb11966ca43cc776ff RLSA-2020:1605 Moderate: python27:2.7 security, bug fix, and enhancement update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944) Security Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python: Cookie domain check returns incorrect results (CVE-2018-20852) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944) Security Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python: Cookie domain check returns incorrect results (CVE-2018-20852) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLBA-2020:1606 python-dbus-python-client-gen bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dbus-python-client-gen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-dbus-python-client-gen-0.7-3.el8.noarch.rpm 7d569bd78a0864038991eb97d5612f8f03c12187d7ab4cd00a3dc8624d681a7e RLEA-2020:1607 http-parser bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for http-parser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms http-parser-2.8.0-9.el8.x86_64.rpm 7cc537d8110104b9e9a9d7e1602fea66bf3f3258e0475cc1327f0f228f339e21 RLEA-2020:1611 input stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xkeyboard-config, libevdev, libxkbcommon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxkbcommon-0.9.1-1.el8.x86_64.rpm 51f79ea9268dae9826ece0bc98c135dd5ca62b08581694ae5401971690fd3766 libxkbcommon-devel-0.9.1-1.el8.x86_64.rpm bc172de2c44bdbf518ba6558aa8ae7db3ee9779f00a456278fa2247369b6c17b libxkbcommon-x11-0.9.1-1.el8.x86_64.rpm d8864abf376820a1a7ac8060fa753486b6a189f1ed3f9287080740dcd89d511f xkeyboard-config-2.28-1.el8.noarch.rpm 66853f37796011f8bd91e5068c80e00d74d7a98d1c468f416116bac1d3d4db6e xkeyboard-config-devel-2.28-1.el8.noarch.rpm dc85f4de371ffcf6bff0e96e67fc3af9671509bc37055ff54635e1775ac6497e RLSA-2020:1616 Low: irssi security update Irssi is a modular IRC client with Perl scripting. Security Fix(es): * irssi: use after free when sending SASL login to server (CVE-2019-13045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for irssi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Irssi is a modular IRC client with Perl scripting. Security Fix(es): * irssi: use after free when sending SASL login to server (CVE-2019-13045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms irssi-1.1.1-3.el8.x86_64.rpm 52d26652faf272caa1948ed66b71ee827443f8a8a374e99186a5afda8bab7085 RLBA-2020:1617 pmdk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pmdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms daxio-1.6.1-1.el8.x86_64.rpm 1e9c5f2802c05afb6f6a3245e63f9903da9624c37af3844eb7222ac0b402a3f0 libpmem-1.6.1-1.el8.x86_64.rpm 9390e81eff676f6d996eeee96bd8b357eb3bdbfe33e8f58eb992214d836437ca libpmemblk-1.6.1-1.el8.x86_64.rpm 3542e03b622e8ccab260c766656e20eda1108986d18a417b5c2bfbe87a4ec0e8 libpmemblk-devel-1.6.1-1.el8.x86_64.rpm 54855006772d493e4b01789c8d61a53cfd4e65e0f4892d921b32ba7c7fdd866a libpmem-devel-1.6.1-1.el8.x86_64.rpm db5ffdd71e17560f76194194ab8991f101dfc2ebfcc0d0eabe2b5be29431b392 libpmemlog-1.6.1-1.el8.x86_64.rpm 3f6888905e519eba4431e5131c93f483f5d48ee4343069d27de3148e81ddcdca libpmemlog-devel-1.6.1-1.el8.x86_64.rpm ada2820ea6d421c33b3a0ca644bf3bda157467e2ca319d29f68a3567cb20f28b libpmemobj-1.6.1-1.el8.x86_64.rpm b416032faf71a26ee22012a6a4af0a6f219139dc35140e88a63c1ed54c90bbf7 libpmemobj-devel-1.6.1-1.el8.x86_64.rpm 45c5c07ab0b19824c36f7add9f3cc256a204184da541a850585a1582254a748d libpmempool-1.6.1-1.el8.x86_64.rpm baaddd2fa82996cb11985951f91409c99ca26b7f4a2d634d0be44dafe830a74d libpmempool-devel-1.6.1-1.el8.x86_64.rpm 5f7cdb35109a3a9f82170633093b9ed47479ac3203740096fc15069f645c646b librpmem-1.6.1-1.el8.x86_64.rpm 6d86d6901893a4d0a6e890ebfa528a2338bb53f74d5a50201bbb41197d48afc4 librpmem-devel-1.6.1-1.el8.x86_64.rpm 462852e411c339993af8ea83ab6e8c9784c100aa9457054148c9acbd361fad7c libvmem-1.6.1-1.el8.x86_64.rpm b2efd8c272562f2f2176edb821d32a9545f2da5e2781147d60cd2f1f42bbba04 libvmem-devel-1.6.1-1.el8.x86_64.rpm f236be66a4a07483f19f9d5541a9dcfa7e3d21e6767b465856e1d499cb5bc642 libvmmalloc-1.6.1-1.el8.x86_64.rpm 6717873d36ea17ccc0e0dd9d33d53c832813b48d36b8d09ff0126deb79f7b578 libvmmalloc-devel-1.6.1-1.el8.x86_64.rpm 3db9411351c74d3ff72af48de27fc594e26c29b8ebdba3e740ad1b4193d46bfd pmempool-1.6.1-1.el8.x86_64.rpm 161a8ed305488e6003e0e3d5d0b6f6668fcefebe5cc7113ee340eca83bd4fd96 pmreorder-1.6.1-1.el8.x86_64.rpm eafef0efebf3a85e93f7adce92f394839ddfd0d9652e534201da7c6a9a046030 rpmemd-1.6.1-1.el8.x86_64.rpm 7b19fda765ef96e67ab9a51598f1f3e5b4fc5737e4d02d44cc2c7327a143abc6 RLEA-2020:1618 pmdk-convert bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pmdk-convert. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pmdk-convert-1.7-1.el8.x86_64.rpm 20230e1a1da258f0ca2610927011ed1503d66c644ef86e537f393275835db261 RLBA-2020:1622 python-greenlet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-greenlet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-greenlet-0.4.13-4.el8.x86_64.rpm b420503c732ab66fa5273c9958e6fec08c6fc41d9fd8a73df9a944a418a89656 RLBA-2020:1623 python-flask bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-flask. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-flask-0.12.2-4.el8.noarch.rpm 37969a333ba99baa0be2ac55b1d5e624630cd26a45ab29dc8f9b752da1f2ad97 RLSA-2020:1624 Moderate: php:7.2 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981) Security Fix(es): * php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020) * php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639) * php: Invalid read in exif_process_SOFn() (CVE-2019-9640) * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: Buffer over-read in PHAR reading functions (CVE-2018-20783) * php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021) * php: memcpy with negative length via crafted DNS response (CVE-2019-9022) * php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023) * php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024) * php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034) * php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035) * php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php, php-pecl-apcu, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981) Security Fix(es): * php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020) * php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639) * php: Invalid read in exif_process_SOFn() (CVE-2019-9640) * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: Buffer over-read in PHAR reading functions (CVE-2018-20783) * php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021) * php: memcpy with negative length via crafted DNS response (CVE-2019-9022) * php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023) * php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024) * php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034) * php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035) * php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpm 4b8310f3980d49aafc8a9098f45f69cab6c6d24c967f8b357541a22621c47cee libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475 libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372 libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5 php-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm e8c89eb016473a87dee62f6608b3f052a01f3fdaac8a3bee8bf1bc3fb14e4a91 php-bcmath-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 68aeede7037745de7d9c4a87f4e95b412ad312eacd815f5135f0af710719fe2a php-cli-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 6d2cdcd5dfec65e866d823db778aaebe2b7961d70a07431087e870ea48cf7237 php-common-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm ff4d4ae4646cb95eb1504ef261bfc32509af509b4e5feff09e4340b57044452c php-dba-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm d33a92302c7879f27e807621b72305de719831de2e40ab27fa36e06e8be54440 php-dbg-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm d3e92a616a1626dd40720fadf951f03eeeb7bbd7e90d6027347edd771f8d0445 php-devel-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 366a440d32dc12d9b7ae610b0c0cae66f62f4ed79877112fadeb0197880d54b1 php-embedded-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm b24fe44153454b0a85ebeff5c454810544eaa702090cc5db737ae0de0c1ee852 php-enchant-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm c6d5229c771398c10a5b5f5ec3f92ce45b68f8fafd3d6df231a96a4235c3809a php-fpm-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 8217ad0c7d917edf411b295716a0cbddb1a20328708db91287d6f632355a2b54 php-gd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 1e689dca2b676adb347c55fddd778acdbca3aac326b16dd8e6c58a6d908bb1e8 php-gmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm be29f61e1366cd19956e8ef1741c74248ff21641df66d58e20a2bbc3328cb0e8 php-intl-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 6a839a9c155e561efc2b3d8e3d72353bc3f9a61d8a3c4a471ff68f12273ef502 php-json-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 5561451a9dfdb99c2af45d2011a208e3b0337c23591e85fafe8e273523554bc3 php-ldap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 0270a8e9b01f280a9fa939c41f0cca4c513bc4d481099d388b28ba0f4722823d php-mbstring-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 6e361ea39d2a5e9bf2424fbf4dcf105ef08391350932ae6bfab424a50a98d745 php-mysqlnd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm e848cb92481789dd32bd6e4a12b5ca45bd72dd958bb7251e51e75f96947baf4e php-odbc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 50301245d22ac3c3d1ebfb6f20b3791924dbe50b49c6854948b48b23734f019b php-opcache-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm e3c38b730366995ecf4164bdbcdd12547a284d65df7dae39652d4a9f33bee8aa php-pdo-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 28e87c9a557ba73e0cbc0d1fea7c673fbd02239fd94a3c10531a375f25e48ada php-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpm 53d93e110ac02f191341248649791187f8474454500c2137eefe0c3fa35a68e9 php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482 php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68 php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm 52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b php-pgsql-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm febe0f6ea94f80ebf7ef18875ee5c60517089945b109b12ab471a228bb3a8b6b php-process-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm df61d9b4cac0b42f6e804fa37c1bd38b8f5d853561a52b0cd1065215ace16b1b php-recode-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 893ae8e57613b51870b3c9c72cbf6fd3ff19071a45b755c69b5e3ef460067f62 php-snmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm ce229765886ed0052080a929dab4c81e0d3a309e6bcecf0c21cd4238e93d9214 php-soap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 897a5df0e71a0d773ae24e1223b73b7c79a9387da99749e6c07290268c7f54dc php-xml-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm aff53a597cfc74f4c819d3106261135fe4300cf5c64e2d6f8f2e3d0a68b1ee1c php-xmlrpc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 190fa61efe99be2f949fcb25f8d456893bf14d38976dfd7c5883efaa2e8ced48 RLBA-2020:1626 ltrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ltrace-0.7.91-28.el8.x86_64.rpm 328d16d21ea8d28ea824abf0efd162bc4dfd16dcf3191a989d0749ec22d829ec RLSA-2020:1631 Low: GStreamer, libmad, and SDL security, bug fix, and enhancement update The GStreamer library provides a streaming media framework based on graphs of media data filters. The libmad package is an MPEG audio decoder capable of 24-bit output. Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. Security Fix(es): * libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libmad, gstreamer1-plugins-ugly-free, gstreamer1-plugins-bad-free, SDL2, orc, gstreamer1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GStreamer library provides a streaming media framework based on graphs of media data filters. The libmad package is an MPEG audio decoder capable of 24-bit output. Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. Security Fix(es): * libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gstreamer1-1.16.1-2.el8.x86_64.rpm 74abf0a1fc61255b2dcd15e305266551beb9b2d111f0a52a5aef27c62c873450 gstreamer1-devel-1.16.1-2.el8.x86_64.rpm 73a77d1ce7274051e7cfb6237cbf4c4e4b6421902799183421370fc8f73f140b gstreamer1-plugins-bad-free-1.16.1-1.el8.x86_64.rpm 111298c70ce191ced925d6c74da4420df2352e57dad7f199c5df2fd788ab7143 gstreamer1-plugins-ugly-free-1.16.1-1.el8.x86_64.rpm 6844c81cb360ab071008ba774447848cbe2ff75033aedbdbec3a0e13474be7af libmad-0.15.1b-25.el8.x86_64.rpm 1134b11d9467844dc6cf81ddb59914c5b3c335b0fd9ae5d77e49b885d3bda446 orc-0.4.28-3.el8.x86_64.rpm 38d6384654084c9409e6b6e965278d3c023e7a3c0d4cc032fc1472499e4e4188 orc-compiler-0.4.28-3.el8.x86_64.rpm 5bb52ac79454dc2e2576d0f17d4bbd2d089db071a19c99ce1f3ea23989901dbe orc-devel-0.4.28-3.el8.x86_64.rpm b06be7958b80375c3aba49acf148d5ed42ad20ab035a4a9d7635ddd25167f78f RLBA-2020:1633 xorg X11 server and driver bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libepoxy, wayland, libxcb, mesa-libGLw, wayland-protocols, libXpm, xorg-x11-drv-libinput, pixman, xorg-x11-drv-wacom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxcb-1.13.1-1.el8.x86_64.rpm f879eab6ae5acfddf7c6aa6cb7192fec725940babca04b33388fb1f0b5aadb5b libxcb-devel-1.13.1-1.el8.x86_64.rpm 6228a598daace6500dd10a86572eaca31560c6e1003f87f8d831dc66bb2d5750 libXpm-3.5.12-8.el8.x86_64.rpm d5594de8b7df3e9c907be53eb619f027d1cc1b74cdc8c3b9215cecfaf96bfefe libXpm-devel-3.5.12-8.el8.x86_64.rpm 0bd3d99a95fd5b421cb25d618c0a5539e776a14de9bb71ddafb679c6273bff4c mesa-libGLw-8.0.0-18.el8.x86_64.rpm 4a62430944ac2e54cd3aaf28e1fd6b47341090643330a2794f9b5d1f7309b2a4 mesa-libGLw-devel-8.0.0-18.el8.x86_64.rpm d7bb96bda34dae57b388c1f479c1073696ef6b2a7577ae947df0829d16a647d4 xorg-x11-drv-libinput-0.29.0-1.el8.x86_64.rpm 5dd25511b396ccfe839c16c47bd213c736c4f1c1d53849a99860ba8a3ee483d0 xorg-x11-drv-wacom-0.38.0-1.el8.x86_64.rpm 05c0a87dcd9689fcb21f11141f298146f8931535095c9d33d8ad4156e82350ea xorg-x11-drv-wacom-serial-support-0.38.0-1.el8.x86_64.rpm a35a692b1d7acf6bbdcdde09020c793249d65ad0d5f7e6a6446ad388e4956661 RLEA-2020:1640 idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2020:1644 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540) * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335) * jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942) * jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943) * jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, jackson-annotations, jackson-databind, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540) * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335) * jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942) * jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943) * jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLSA-2020:1650 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921) * containers/image: Container images read entire image manifest into memory (CVE-2020-1702) * podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921) * containers/image: Container images read entire image manifest into memory (CVE-2020-1702) * podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:1661 xorg-x11-drv-qxl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-drv-qxl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xorg-x11-drv-qxl-0.1.5-11.el8.x86_64.rpm c9ab74b68da2c0a8021a878d52335943183eb7f0ce1b2d013c5ae7c46de513f8 xorg-x11-server-Xspice-0.1.5-11.el8.x86_64.rpm 6e37bd87969271a978c82782d84c47b3f79eeac1dbb942ebe1cd03ce4d47a6ac RLBA-2020:1666 gcc-toolset-9 bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-9.0-4.el8.x86_64.rpm 3fb04ea97ffd31864961c227504c19bb08e0962250d78a56643bcbdeae512d6c gcc-toolset-9-build-9.0-4.el8.x86_64.rpm 112a38a574d673354c64ad19318b927d6330e752518613d4a782c74a2a879b84 gcc-toolset-9-perftools-9.0-4.el8.x86_64.rpm 3b049cd421211ea3db048eb15cb19167c3eb621590fe05eddcbd23ab7de91f98 gcc-toolset-9-runtime-9.0-4.el8.x86_64.rpm 6f042a67a613e193878d9b3501c4c79295fee3e46cf6a1d4852c1a87495e485b gcc-toolset-9-toolchain-9.0-4.el8.x86_64.rpm 478abaa58914ce5a4e6c16b7d7d2b9877d7dc307a7aeb1461f7e0fd0ff264828 RLBA-2020:1669 python-networkx bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-networkx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-networkx-1.11-16.1.el8.noarch.rpm f36caec5411961dccb9763811ad3bf42705e11aaf0e35f8d540e999e50aa93d1 python3-networkx-core-1.11-16.1.el8.noarch.rpm d2a88d113da8555607b9e2e85ebfed61a061d4da03098456722838993c25229c RLBA-2020:1673 perl-IO-Socket-SSL bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-IO-Socket-SSL. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm 66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd RLEA-2020:1675 new module: container-tools:2.0 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:2.0 module to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:2.0 module to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:1686 Low: libmspack security and bug fix update The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft. Security Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libmspack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft. Security Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libmspack-0.7-0.3.alpha.el8.4.x86_64.rpm ffe3213cb432e8c9066e152afd41d5ff306eb626c83ad417f8ff23e7e5f9cb0f RLBA-2020:1690 gtk-vnc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gtk-vnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gtk-vnc2-0.9.0-2.el8.x86_64.rpm 2bfff0a24ce4eb6d52ec696e96c58aaf68bf49b081c47993bc451ce8446c24c9 gvnc-0.9.0-2.el8.x86_64.rpm 15fed146b4d63617c6855bffd308d6dd19c47968c01e9fe4d7252715703b341a RLEA-2020:1692 php:7.3 enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for php-pear, php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45 libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm 33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744 php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5 php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm c488f0dba64ba85b4b9888f0ecef07cac2a26a600dee305c50c4eccbd22f018f php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7 RLEA-2020:1694 new module: python38:3.8 This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-more-itertools, pytest, python-psycopg2, python-urllib3, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python-asn1crypto, python-py, python-chardet, python-markupsafe, python-pluggy, Cython, python-psutil, python-wcwidth, babel, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 RLBA-2020:1695 luksmeta bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for luksmeta. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libluksmeta-devel-9-4.el8.x86_64.rpm 8de7884362e85eead893c80b480f0aacf04435ead879224f1f271e6784395e70 libluksmeta-9-4.el8.x86_64.rpm 3db29d50509fd273d410b113d96cee5cfc30660aa09b3e31414b92bf4557df8f luksmeta-9-4.el8.x86_64.rpm d75fee723d6411a531fca66be33b001c5d990f59d08fcadd80fb104c8c207466 RLBA-2020:1700 libbytesize bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbytesize. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libbytesize-1.4-3.el8.x86_64.rpm bf0c4717f287401f9e7ef99509de83cb521164ac666a9f787d5e9d6a6baf58ec python3-bytesize-1.4-3.el8.x86_64.rpm 669e9ddced50415ef55fe469d58a97e8fdd7cd582162a15135d1705a73bdaa7d RLEA-2020:1707 spice-streaming-agent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-streaming-agent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-streaming-agent-0.3-2.el8.x86_64.rpm b0510e805197699ce2ebfff6be3462cd1c6a6ed966ee376d896f0172f5f9ea9d RLSA-2020:1708 Moderate: liblouis security and bug fix update Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg). Security Fix(es): * liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684) * liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685) * liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577) * liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for liblouis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg). Security Fix(es): * liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684) * liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685) * liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577) * liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms liblouis-2.6.2-21.el8.x86_64.rpm 61df0b3c8c29746e62bdb76309ebd73857b125f47213671592f97a63bb5789f1 python3-louis-2.6.2-21.el8.noarch.rpm 89093ded5e8ce00b591e22de53b605d382def59dd9758607f9b211fbd71836b3 RLEA-2020:1709 new package: virt-p2v Virt-p2v is a tool for conversion of a physical server to a virtual guest. This enhancement update adds the virt-p2v package to Rocky Linux 8. (BZ#1704180) All users who require virt-p2v are advised to install this new package. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-p2v. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virt-p2v is a tool for conversion of a physical server to a virtual guest. This enhancement update adds the virt-p2v package to Rocky Linux 8. (BZ#1704180) All users who require virt-p2v are advised to install this new package. rocky-linux-8-x86-64-appstream-rpms virt-p2v-maker-1.42.0-5.el8.x86_64.rpm 2288be0afbe6ef9ca5e037cb6d4508c644dcd34ae82c6aa040519f4f2af90513 RLEA-2020:1711 new module: maven:3.6 This enhancement update adds the maven:3.6 module to Rocky Linux 8. (BZ#1783926) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the maven:3.6 module to Rocky Linux 8. (BZ#1783926) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLBA-2020:1713 gcc-toolset-9-binutils bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417) rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpm 4664b94c012a43fd9cbb22dbb2b5717b8f1c76453bdd654a0df1ce5c5a1ebe88 gcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpm c4fd1717fd48949497da91cc88989d24e81fe925bb57e995aac790154d865c41 RLEA-2020:1718 jolokia-jvm-agent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jolokia-jvm-agent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jolokia-jvm-agent-1.6.2-3.el8.noarch.rpm 3d359cdb5143b577cca66c7991883d437d25806cf0391361055b2e348b8b3490 RLBA-2020:1723 parfait:0.5 bug fix update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for uom-parent, parfait, uom-systems, uom-se, si-units, uom-lib, unit-api, log4j12. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__parfait si-units-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm 6d238596ee6d6869db170d90a9e9839e5c028ff1678dc08a7e8378978eb08b0b si-units-javadoc-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm a20389dc20459d8e277b084b313764a9171b7a63c2a83066dcf5c7de70f09aa5 unit-api-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm 45f3ea7141aeeab01121669fb9d1c71287d16b63126ead63ee3a0fa485fb6e34 unit-api-javadoc-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm 14e336b8562c8c326f1bf24d01515952681212155fdeee137857ba73261b7b0d uom-lib-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm 94e383d27797c3563dd284f31e97761f3c859fabd6d43e6e2ddcfe2d66026d59 uom-lib-javadoc-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm e28c245a0b6063f0cbae3e3dd0f8512c857d581acd0425605e372967df6e2d61 uom-parent-1.0.3-3.module+el8.3.0+214+edf13b3f.noarch.rpm 665b5f7355b65fd698defae938b12f45a0cbd09982662343e43d1e75bd76c628 uom-se-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm 1c5a33c14a4db1f5c1dde1b82c0847034c2b6643969a5d5511dade96439129f9 uom-se-javadoc-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm bb06bb8d9e6d73cf8ed4d8a4c53289397dff79610badd5740d5e98c5250083f5 uom-systems-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm ff8729c2bfb1bc8ee1d487882734d0e07fcf552e6eb3223b7d2ddd1686880b14 uom-systems-javadoc-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm 1bcb94fdab29d21ff7974980bb81f9d5165e81eeeaea52f0360905b1a9f8a187 RLBA-2020:1726 ipvsadm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipvsadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ipvsadm-1.31-1.el8.x86_64.rpm 791359c3e500082c6daa7610d495b285c8c4b174be527cd02b90d71e4b59a7b6 RLBA-2020:1737 gcc-toolset-9-strace bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-strace-5.1-6.el8.x86_64.rpm 1ddb53e90fbdfb19a7d0a556723e6394ecd1a16af69878e8637ba86e9e9b341b RLBA-2020:1741 python-reportlab bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-reportlab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-reportlab-3.4.0-8.el8.x86_64.rpm 89753b1b2534dbc2c44b2cbd5b5ca7c06a1bedafbca56087c63a2ded0d9c2acd RLBA-2020:1742 gcc-toolset-9-make bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-make-4.2.1-2.el8.x86_64.rpm a886becf7389c72de970fa8bb32647d4348c543ce91f55a8c6af16c21aacfe13 gcc-toolset-9-make-devel-4.2.1-2.el8.x86_64.rpm e0538a389200d2a4f4e1285e12d249d7e2918c94eba5b3bb5163ae3b4641a02c RLBA-2020:1743 librevenge bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librevenge. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms librevenge-0.0.4-12.el8.x86_64.rpm e02f71c18ad100ae01818134e706e2e75e6cfa5d4c14189f578205f8d6654593 librevenge-gdb-0.0.4-12.el8.x86_64.rpm cb084768cf9ad94234a0923a4b6954a47963231f54c4d1259264965b06d50573 RLBA-2020:1745 python-pycurl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pycurl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pycurl-7.43.0.2-4.el8.x86_64.rpm 64ea29c73cbbf33a54abfeebe18880ed90d2b313f5f186a47247ffe3dfe0946a RLBA-2020:1750 sblim-cmpi-base bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-cmpi-base. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-cmpi-base-1.6.4-14.el8.x86_64.rpm 4fdd9072c8d73b641504b5dbb352d17bc7afce04a11bf0a1233f5662ed08bfdb RLBA-2020:1752 driverctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for driverctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms driverctl-0.111-1.el8.noarch.rpm 71db251f4803f836e8613ed8eddfe590a275a40ab60918d207bbfb8220ef6620 RLBA-2020:1754 gcc-toolset-9-annobin bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-annobin-9.08-4.el8.x86_64.rpm f82e9f47e52e802b14041b0a2abd8213e3941a33acc643fe94eb9a346f750d45 RLSA-2020:1926 Important: container-tools:1.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * conflicting requests: failed to install container-tools:1.0 (BZ#1813776) * podman run container error with avc denied (BZ#1816541) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, slirp4netns, oci-systemd-hook, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * conflicting requests: failed to install container-tools:1.0 (BZ#1813776) * podman run container error with avc denied (BZ#1816541) rocky-linux-8-x86-64-appstream-rpms__container-tools container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051 RLBA-2020:1928 nodejs:12 bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * Rebuild the nodejs:12 module for Rocky Linux 8.2 (BZ#1811502) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * Rebuild the nodejs:12 module for Rocky Linux 8.2 (BZ#1811502) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2020:1929 nodejs:10 bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * Rebuild the nodejs:10 module for Rocky Linux 8.2 (BZ#1811499) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * Rebuild the nodejs:10 module for Rocky Linux 8.2 (BZ#1811499) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:1931 Important: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:1932 Important: container-tools:rhel8 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:2041 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) * squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) * squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) * squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) * squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLBA-2020:2456 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1834346) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1834346) rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:2457 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1836978) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1836978) rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:2774 Important: virt:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) * QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) * QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2020:2848 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.21.0). Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.21.0). Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:2852 Important: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.18.2). Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172) * nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.18.2). Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172) * nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:3032 Moderate: mod_auth_openidc:2.3 security and bug fix update The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) * mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) * mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107) rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102 RLBA-2020:3036 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364) rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:3053 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-podman-api, udica, toolbox, runc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm 2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLEA-2020:3054 new module: eclipse:rhel8 Eclipse is an integrated development environment (IDE). This enhancement update adds the eclipse:Rocky Linux8 module to Rocky Linux 8. The eclipse:Rocky Linux8 module provides Eclipse version 4.15, which is based on the Eclipse Foundation's 2020-03 release train. (BZ#1786637) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. For instructions on how to use the Eclipse module, see Using Eclipse linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for icu4j, glassfish-annotation-api. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Eclipse is an integrated development environment (IDE). This enhancement update adds the eclipse:Rocky Linux8 module to Rocky Linux 8. The eclipse:Rocky Linux8 module provides Eclipse version 4.15, which is based on the Eclipse Foundation's 2020-03 release train. (BZ#1786637) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. For instructions on how to use the Eclipse module, see Using Eclipse linked from the References section. rocky-linux-8-x86-64-appstream-rpms__eclipse glassfish-annotation-api-1.3.2-3.module+el8.6.0+852+cc16a686.noarch.rpm 703801e1ebfbf2db9652d0e01533b90244de682d93ef14a85747d96dce45f2e9 icu4j-65.1-3.module+el8.6.0+852+cc16a686.noarch.rpm 1102f0b1275d7fb89dfe91af7698838927cad6378d87a0d272191a1b5c76c477 RLSA-2020:3623 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) * squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) * squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2020:3662 Moderate: php:7.3 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655) Security Fix(es): * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045) * php: Information disclosure in exif_read_data() (CVE-2019-11047) * php: Integer wraparounds when receiving multipart forms (CVE-2019-11048) * oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224) * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) * oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163) * oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203) * oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204) * pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454) * php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059) * php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060) * php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062) * php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063) * php: Information disclosure in exif_read_data() function (CVE-2020-7064) * php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) * php: Out of bounds read when parsing EXIF information (CVE-2019-11050) * oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246) * php: Information disclosure in function get_headers (CVE-2020-7066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655) Security Fix(es): * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045) * php: Information disclosure in exif_read_data() (CVE-2019-11047) * php: Integer wraparounds when receiving multipart forms (CVE-2019-11048) * oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224) * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) * oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163) * oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203) * oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204) * pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454) * php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059) * php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060) * php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062) * php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063) * php: Information disclosure in exif_read_data() function (CVE-2020-7064) * php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) * php: Out of bounds read when parsing EXIF information (CVE-2019-11050) * oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246) * php: Information disclosure in function get_headers (CVE-2020-7066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45 libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d php-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 81c845ff6e92154312d6dee84eb0a2420f555560c720df74c6ac28f91d6814a3 php-bcmath-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 3521b7280b6bb19c5c33fdb7bcc1d8900222cb720baad4f5aef0a64c24b5f501 php-cli-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66b575dd4de583eaa438e9fa29e1690622da46917506ff101a29d082d28666b2 php-common-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2b818cb38f29eb46323eb7f988e7eec6e57c54dee336cb9ad680624b4e5ae0c php-dba-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm eacf57de74bb58757840239513992e3e2c48da900db3fae2f4a6fcd9d4e2d520 php-dbg-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 6de3d1723a37e21f09751a1df454ce3db61151f6886e857cd8a016968cbfa887 php-devel-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm a2d8a6b55e603788e61635c41a78bb88fcf23cd638b5b4605e64a793ef1c2723 php-embedded-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm d4a5467b1bf5aaa6eb5977c4e4e8638edc9abdb65a7f0a436fd6d4d142d52ea2 php-enchant-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 8f10ea82c11d1836ec6878a5ec5e307422b5f86900e0f569b9c1700089604643 php-fpm-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm beb88ba847269ee001e886db7f4b23d750c1d0f1f1d3bd7c0d77a8a4c5149fa3 php-gd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0bcaa3bb5600f7d6bfa85c7bdcf4fc34986413fdf7fab2a5f1dbe536893fbc61 php-gmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm a70d92c3cc81c1afd9df86741429fd58d948e19c4747c2dff43a55d3c1b64620 php-intl-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 16b3429667ecf09b1a359959940540167d31a12777564d7d9c318c5b90961b70 php-json-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e9b6597c148f59d8d6418aad929477baf26e0468f260c937281357b433f16c79 php-ldap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 178899d11efba895402fe773aafaf6510150f300aafb15294947b1d36d35a6c1 php-mbstring-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 999d14ab0851ef0a72da81beb3562166d8a02259f31562f91608eb413ce85a75 php-mysqlnd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4806123ba0bbd0586a1148b4b791d8041af7caf7ca3e2d5e92001393b23edb58 php-odbc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f934922a6bfcee875fc543c9cb76ce02687b611c717cfae9d9834b97c5bc29d4 php-opcache-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 3b7570d6416f18238605c38113ab52847f2e9d4527b63f20bdbdddb6c54ff511 php-pdo-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm d1a63ef832f6108bdd1e8c746b1b03489f1dca39457ed2cf135016ba277c9c06 php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm 33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744 php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5 php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm c488f0dba64ba85b4b9888f0ecef07cac2a26a600dee305c50c4eccbd22f018f php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7 php-pgsql-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm b4a70ab74593d4a4e8bbcd147d6a9ef37f2ee73ea3d3fc2026cbb723a8410665 php-process-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f090d8f796e208d1da100151ad96fa24e609eca2a9b1ac728000d735ed5ae30f php-recode-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 7a9b599d8d3a1ed64ebb713be92c2f5648b73b29332460fefbe8a2f2fc76a24a php-snmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 3a288b202b968f5b0685f88e3794865db8a26fe7b94e7a8baf45420a4cede09a php-soap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 510d2dc16daea3a229e16d5ebfdcf5e3a5f9c52a722768e98d754e1be4392a8f php-xml-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 3f13bd0a62eee03261a23f6bcebe607dc20331acae2b7d5623c2cba3ba22b046 php-xmlrpc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e1b10e75e43aea2c9b6c6bdeda8087c6b7921c25e0e96d17e2dfdfbbd2a38564 RLSA-2020:3732 Important: mysql:8.0 security update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.21). Security Fix(es): * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725) * mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619) * mysql: Server: Connection unspecified vulnerability (CVE-2019-3009) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632) * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620) * mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574) * mysql: Server: Logging unspecified vulnerability (CVE-2020-2770) * mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804) * mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921) * mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553) * mysql: Server: UDF unspecified vulnerability (CVE-2020-14576) * mysql: Server: JSON unspecified vulnerability (CVE-2020-14624) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651) * mysql: Server: Locking unspecified vulnerability (CVE-2020-14656) * mysql: Information Schema unspecified vulnerability (CVE-2019-2911) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.21). Security Fix(es): * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725) * mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619) * mysql: Server: Connection unspecified vulnerability (CVE-2019-3009) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632) * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620) * mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574) * mysql: Server: Logging unspecified vulnerability (CVE-2020-2770) * mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804) * mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921) * mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553) * mysql: Server: UDF unspecified vulnerability (CVE-2020-14576) * mysql: Server: JSON unspecified vulnerability (CVE-2020-14624) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651) * mysql: Server: Locking unspecified vulnerability (CVE-2020-14656) * mysql: Information Schema unspecified vulnerability (CVE-2019-2911) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mysql mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f RLSA-2020:4059 Important: virt:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2020:4272 Moderate: nodejs:12 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.18.4). Security Fix(es): * nodejs-dot-prop: prototype pollution (CVE-2020-8116) * nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201) * npm: Sensitive information exposure through logs (CVE-2020-15095) * libuv: buffer overflow in realpath (CVE-2020-8252) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * The nodejs:12/development module is not installable (BZ#1883966) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.18.4). Security Fix(es): * nodejs-dot-prop: prototype pollution (CVE-2020-8116) * nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201) * npm: Sensitive information exposure through logs (CVE-2020-15095) * libuv: buffer overflow in realpath (CVE-2020-8252) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * The nodejs:12/development module is not installable (BZ#1883966) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2020:4435 abrt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-abrt, abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-abrt-1.2.6-6.el8.x86_64.rpm f6d3d376330002979b7be8c06e394a42b5848cf49e856c0a27c04f9dc30883bc libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpm 5e37019a5283ba0e43d7575bb7b92b89500f793ad5c4dbfcfaeb1872a7fc3030 libreport-anaconda-2.9.5-15.el8.rocky.6.3.x86_64.rpm 6194f8ba650bc7585a3e99cd6e7f827286456e62a6bf98ed46c46c35f9d08c77 libreport-cli-2.9.5-15.el8.rocky.6.3.x86_64.rpm 2fcf64301eaafa7fcf3a3c72cfb96f05615b56cfcea521a83561222b72e9db0e libreport-gtk-2.9.5-15.el8.rocky.6.3.x86_64.rpm 695990373066594c0627a7a762537e5de49d7be1926d8be0a55b461bb20140d3 libreport-newt-2.9.5-15.el8.rocky.6.3.x86_64.rpm 0e3e56dc4087d864dc4d67b86cd2b3bfb8b8b4d6673987717d463e1bb87d26e5 libreport-plugin-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm 227c155b52ec31ca24fa66639452937725607195a4253414a2a46b8a3edf7dd5 libreport-plugin-kerneloops-2.9.5-15.el8.rocky.6.3.x86_64.rpm 3e1fa31840233fa95fb27c9c057cb8f2946d81f8f5c9f332f0fc7e5e09fa1bd9 libreport-plugin-logger-2.9.5-15.el8.rocky.6.3.x86_64.rpm e6e49176296cc70d772e69e7b17ecf38a8be6d05a03ad52334b2c719701fb9a7 libreport-plugin-mailx-2.9.5-15.el8.rocky.6.3.x86_64.rpm 95ff8fc918313b921b34162c844e297774e9ef5e5ece711a4eff8ddd8426b608 libreport-plugin-reportuploader-2.9.5-15.el8.rocky.6.3.x86_64.rpm fb9fa978de3e7d265f6c48ffcec76e28d5c736870f398c83580e5660d44e3711 libreport-plugin-rhtsupport-2.9.5-15.el8.rocky.6.3.x86_64.rpm e05b4bb22fd320eeb356dca5d8c43a3ae011354f0f0e013bb534bbdae18dc170 libreport-plugin-ureport-2.9.5-15.el8.rocky.6.3.x86_64.rpm 28a9a4fe6ac7b2b65c8445bdf30c67d674c6af4fc9f7944492a4136cc8c38d02 libreport-rhel-2.9.5-15.el8.rocky.6.3.x86_64.rpm 76e60d9d32ef100959f7171a0e86253d7842d6c9fb2fea7e27535643aff7950f libreport-rhel-anaconda-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm 69e5e743a1180cc8a7002d3a8f68cc27e071dc87ed0d18e9ec954c340d43d750 libreport-rhel-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm c1de7ebf0c873e1247232573b8d8bb7c07e87fbab03e753c3af3826eab008e26 libreport-web-2.9.5-15.el8.rocky.6.3.x86_64.rpm e6aa4595fb879aa45e101f8626e3bd4e43d2513948b23b113e7df6e4ade703ab python3-libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpm 7567494607c825ed5eb4d4c02cda246483d90b5bde0f950cedd06d5d12ac5ceb RLBA-2020:4621 iperf3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iperf3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms iperf3-3.5-6.el8.x86_64.rpm b2bdb78d601c91f9a01bf9f229f02f0079bd92ca8bc37f615d720aba79fecb69 RLSA-2020:4628 Low: libreoffice security, bug fix, and enhancement update LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1). (BZ#1796893) Security Fix(es): * libreoffice: 'stealth mode' remote resource restrictions bypass (CVE-2020-12802) * libreoffice: forms allowed to be submitted to any URI could result in local file overwrite (CVE-2020-12803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libcmis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1). (BZ#1796893) Security Fix(es): * libreoffice: 'stealth mode' remote resource restrictions bypass (CVE-2020-12802) * libreoffice: forms allowed to be submitted to any URI could result in local file overwrite (CVE-2020-12803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libcmis-0.5.2-1.el8.x86_64.rpm 85fe680a824f5ec1a3e0dbeb6cd41abd45d672d462dc0fb1dd327095588a7307 RLSA-2020:4629 Moderate: libvpx security update The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libvpx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvpx-1.7.0-8.el8.x86_64.rpm e78ccbde28d9eeb97e5cb37df37ef5a5e55b3de69bf2f6f260570076a2caee1c RLBA-2020:4630 wget bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wget. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms wget-1.19.5-10.el8.x86_64.rpm cb1dbb79240c60648916fed72bc3368e5394de1013b4135b54a812a40a279cff RLBA-2020:4631 gom bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gom-0.4-1.el8.x86_64.rpm bb7d6fd74621945051cdfc8a40a93c74bb5a6ef9cf399977b82e20d786c92092 RLBA-2020:4633 swig:3.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for swig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__swig swig-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm 3a8d046a51dbf4a121fe67a46df74cd599c6f46a150a2eb1aa48c6c4ade3cd45 swig-doc-3.0.12-19.module+el8.4.0+385+82b6e804.noarch.rpm 796cea2ad5be73af934d2b97b8c00121f097496f215bd867f1de4645bedc5619 swig-gdb-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm e9b828ca9e799c3c02d911fbfb4f430621de393e4361a45ef8bf734889057a10 RLBA-2020:4640 radvd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for radvd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms radvd-2.17-15.el8.x86_64.rpm 7ab537f957b4dd6b3fac3462f1b10cf5905591851c87f4190d6709b982de3152 RLSA-2020:4641 Moderate: python38:3.8 security, bug fix, and enhancement update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416) Security Fix(es): * PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477) * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747) * python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492) * python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-psycopg2, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416) Security Fix(es): * PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477) * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747) * python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492) * python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 RLSA-2020:4647 Moderate: freerdp and vinagre security, bug fix, and enhancement update FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop. The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287) Security Fix(es): * freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) * freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) * freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) * freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) * freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) * freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) * freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) * freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) * freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) * freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) * freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) * freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) * freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) * freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) * freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) * freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) * freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) * freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) * freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) * freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) * freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) * freerdp: out-of-bounds read in irp functions (CVE-2020-11089) * freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) * freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) * freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vinagre. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop. The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287) Security Fix(es): * freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) * freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) * freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) * freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) * freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) * freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) * freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) * freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) * freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) * freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) * freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) * freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) * freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) * freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) * freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) * freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) * freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) * freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) * freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) * freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) * freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) * freerdp: out-of-bounds read in irp functions (CVE-2020-11089) * freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) * freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) * freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms vinagre-3.22.0-23.el8.x86_64.rpm b5c618c63d3360974aa20444687651e51c96bd2a84d47844ddc851391fd02d04 RLSA-2020:4649 Low: evolution security and bug fix update Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. OpenChange provides libraries to access Microsoft Exchange servers using native protocols. Security Fix(es): * evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for bogofilter, evolution-mapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. OpenChange provides libraries to access Microsoft Exchange servers using native protocols. Security Fix(es): * evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bogofilter-1.2.5-2.el8.x86_64.rpm 055fb5f5338f3747eb7f7826bf0508cddc02cc4f1f7a1c81b3b37e7f3696219d RLSA-2020:4654 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLBA-2020:4658 munge bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for munge. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms munge-0.5.13-2.el8.x86_64.rpm 0dd4fe5f637073ab3044226acb9c3a3a8b3d181bc94eb52e3def2535150d7966 munge-libs-0.5.13-2.el8.x86_64.rpm 26722a8ec5e88792ed5728241095a00692fdc93dc6f3165c048aae0983229c28 RLSA-2020:4659 Moderate: gd security update GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats. Security Fix(es): * gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977) * gd: NULL pointer dereference in gdImageClone (CVE-2018-14553) * gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats. Security Fix(es): * gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977) * gd: NULL pointer dereference in gdImageClone (CVE-2018-14553) * gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gd-2.2.5-7.el8.x86_64.rpm ace2c28939c77d3e0ed768fbcef2ad8414a6892b3eae03712ec12a92825fc45d gd-devel-2.2.5-7.el8.x86_64.rpm 1839caff25d169b3fc2b29782ecc02e90fe225938deec1b81e8cc3c7a792b1a7 RLEA-2020:4664 memcached bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memcached. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms memcached-1.5.22-2.el8.x86_64.rpm 80ba002a662fb3b041467abdc1520436e0dbbbcf42b160e81b1d5e24a5a82234 RLBA-2020:4665 lftp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lftp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lftp-4.8.4-2.el8.x86_64.rpm b777ff195179177c9703548dc35156c63f4c56509362bf834d551f3107ce3210 lftp-scripts-4.8.4-2.el8.noarch.rpm cad46fc4eaa97de1a51c59d7e8679f8e838083898a49929dd1fec5cd9d69ca7a RLSA-2020:4670 Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877) Security Fix(es): * js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) * bootstrap: XSS in the affix configuration target property (CVE-2018-20677) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * js-jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * ipa: No password length restriction leads to denial of service (CVE-2020-1722) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877) Security Fix(es): * js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) * bootstrap: XSS in the affix configuration target property (CVE-2018-20677) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * js-jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * ipa: No password length restriction leads to denial of service (CVE-2020-1722) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2020:4676 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296) Security Fix(es): * libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339) * QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) * libvirt: Potential denial of service via active pool without target path (CVE-2020-10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296) Security Fix(es): * libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339) * QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) * libvirt: Potential denial of service via active pool without target path (CVE-2020-10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2020:4678 tog-pegasus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tog-pegasus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tog-pegasus-2.14.1-46.el8.x86_64.rpm 1bed42c08cc37ebc5e1d7c20ef135fa1904ab9939c5101324054e3147eb52c97 tog-pegasus-libs-2.14.1-46.el8.x86_64.rpm 0a14c7352b8954b767c4d33bbba870054489d9bc87317678e48f93d8bdd9c52e RLBA-2020:4679 pptp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pptp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pptp-1.10.0-4.el8.x86_64.rpm 403c469de3bd6f49b2b1f9c82fe72aa3f6dc887ab32184832f1e9db30ac7c25d RLBA-2020:4681 ncompress bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ncompress. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ncompress-4.2.4.4-13.el8.x86_64.rpm 2e7cd19238f419b4b9315b96484d11c41393d2cfd6a22c67b52516e5f4a979e5 RLBA-2020:4688 itstool bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for itstool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms itstool-2.0.6-2.el8.noarch.rpm 887a6d89077f2c036291b58afa8bf12d6d871d82469ffb8a8b629130c21bc9e8 RLSA-2020:4694 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-podman-api, libslirp, toolbox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 RLEA-2020:4700 createrepo_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for drpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms drpm-0.4.1-3.el8.x86_64.rpm 6dc369a31dfb6ca6aaf6b615aec3d52792d2411c276f8e392da041ab705fae87 RLBA-2020:4704 python36:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python36 python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm 434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d rocky-linux-8-x86-64-appstream-rpms__python27 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLBA-2020:4707 spice-protocol bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-protocol. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-protocol-0.14.2-1.el8.noarch.rpm c00444c95aa153b8a621e3086e3a63cc9dd5fda8f1f46cf7a5a7c96f4bba8dd9 RLSA-2020:4709 Moderate: librsvg2 security update The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library. Security Fix(es): * librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for librsvg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library. Security Fix(es): * librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms librsvg2-2.42.7-4.el8.x86_64.rpm be783a46ee945a6822831dc658d7e8bc6bc89ef84dea1ae6b39ef767efeb5147 librsvg2-devel-2.42.7-4.el8.x86_64.rpm 124de649dc6bfedfbbdddea386e9c78653e0d147b2115ac2c0ec02b36a8028b1 librsvg2-tools-2.42.7-4.el8.x86_64.rpm eb0d175b2e1bb18dd7d8f9b0523238a68623abf4e05e4e022a63ee6442279d03 RLEA-2020:4711 HdrHistogram_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for HdrHistogram_c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms HdrHistogram_c-0.9.13-2.el8.x86_64.rpm 55353693dcaf1b676fec269cda6ad65641c27dafd2fda21228a820a45b00d14f RLSA-2020:4712 Moderate: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a RLEA-2020:4713 python-dasbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dasbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-dasbus-1.2-2.el8.noarch.rpm 2bee6c760ce64f9a0c0f286ed8865993d24a71a6d31ce56bf3fd55c20307cbf7 RLSA-2020:4847 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * pki: Dogtag's python client does not validate certificates (CVE-2020-15720) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * pki: Dogtag's python client does not validate certificates (CVE-2020-15720) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm 20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLBA-2020:4715 chan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chan. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms chan-0.0.4-3.el8.x86_64.rpm effca9ba587bd1ece96428cc01c299d9d8212f97b71592babf23e1400de6e4ba RLBA-2020:4717 new module: php:7.4 This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLBA-2020:4723 bpg-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bpg-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bpg-algeti-fonts-2.005-11.el8.noarch.rpm 47e6874b1c41f7f8fb9af54dbf5bbbd84540a380fc3c59b1498d442b8960de3c bpg-chveulebrivi-fonts-3.002-11.el8.noarch.rpm 1ed1607a6fc5e6182532d24b68089af6c17712e53a9ad347d194a07da37d262c bpg-classic-fonts-8.500-11.el8.noarch.rpm c4489256ab3ad73a8de16bc7fb096ad6cb1f8115e48f4a19c733bf3dd6460d99 bpg-courier-fonts-4.002-11.el8.noarch.rpm 5b53df9a759a1f5b5b7b4e0eb22391663ad3b8182e6cfe514f1baa92c321dd0c bpg-courier-s-fonts-4.000-11.el8.noarch.rpm e5958e7c6e2314c0640e1405faf7aff87f9f36925c10b3d0c3be3e6ab5169812 bpg-dedaena-block-fonts-3.005-11.el8.noarch.rpm d82a6f3febe389229e3c6258e1c8b26b4ceb19b92e1c400a26b5976ae8d16598 bpg-dejavu-sans-fonts-2.28-11.el8.noarch.rpm 1112365fa2797fced4f6dd5011f9a663f8af3517b93db6d2ed36618d0fbd188c bpg-elite-fonts-3.000-11.el8.noarch.rpm feca73e375e64fb414d392b2ffbaec526d8249f4294317176e758426ba8f1f90 bpg-excelsior-caps-fonts-2.003-11.el8.noarch.rpm 2d82c9702963480fa2790f4d877768acff685ea8fa7a54c2c78f5c93052dbaf7 bpg-excelsior-condenced-fonts-2.003-11.el8.noarch.rpm 2d08bb6292d03ea4f35b452460ac670387363748baf05cf8de2ce391fbee73ef bpg-excelsior-fonts-2.03-11.el8.noarch.rpm 012c43fc487f0ef864c6b2de33884f934150ef1bc460f898b108fd7e84d58e89 bpg-fonts-common-20120413-11.el8.noarch.rpm 61b7c5b6e0f61a9eb355e6dd27ae076e57af8a2a9ec0195d86447ad7b49e34b2 bpg-glaho-fonts-9.000-11.el8.noarch.rpm efd53c80a4c2c4839cf1a393b361bc7224f37ae8cee1238663d8365eb2cd5d8b bpg-gorda-fonts-2.003-11.el8.noarch.rpm 1c385b59bc5570227569621f983379b20baf6f810f6f73182bcaff8dd81f00f1 bpg-ingiri-fonts-4.000-11.el8.noarch.rpm 72bc5b7db73a2f2f1fdf0c47dca130964179a2cbc3517e5f063f7823ad3bd581 bpg-irubaqidze-fonts-1.000-11.el8.noarch.rpm 4e6caf5c2c1b33b23028b6c9549900997ec814f4a82fb21e3555225092f78228 bpg-mikhail-stephan-fonts-2.500-11.el8.noarch.rpm 55400c32dec1f9648420b8957ff553afde11ad2669d31e354df5097593276b92 bpg-mrgvlovani-caps-fonts-1.002-11.el8.noarch.rpm c0da6baafe1316d13523a487436047653f27ab9c2a2c36ce9bfbe56f5f315cdc bpg-mrgvlovani-fonts-1.002-11.el8.noarch.rpm 2fe663408a4c49559e32751b9501f6e6f0e732e3e58a6f7a788370214dd777f5 bpg-nateli-caps-fonts-2.003-11.el8.noarch.rpm cedee72fb59958ae0157b7036e2aa4c1e6c82626f16520842b18a3fb00169811 bpg-nateli-condenced-fonts-2.003-11.el8.noarch.rpm 484e9bbab1ec19deeb501173c0061943a0714859f576bdd4ab617cfc5d9a2216 bpg-nateli-fonts-2.003-11.el8.noarch.rpm ca437135ac44fb40b0697b6221307ed35da5063b62de03f5d845cf22d5a62441 bpg-nino-medium-cond-fonts-4.005-11.el8.noarch.rpm 16a888290ba281ae33090c6acb4d87a956331e26ab6997e525def891670aaee1 bpg-nino-medium-fonts-4.005-11.el8.noarch.rpm b67a48532714366c3f94089c38f26cbd46e5c07adaeeed6775fe72de6e0f2eb7 bpg-sans-fonts-1.005-11.el8.noarch.rpm cf90e4b021f205476c1dffe9a8e340d571960681bccbd4d418acfe8eb2520499 bpg-sans-medium-fonts-1.005-11.el8.noarch.rpm 5d6ff7f18f2d7c8415be6867308d9085b6e16a07f9e6bdd0348140417f442a59 bpg-sans-modern-fonts-2.025-11.el8.noarch.rpm 63e9e7ccd18f2333b5053647a1b882d33b55630e3d83cd49388bda80bf833c02 bpg-sans-regular-fonts-1.005-11.el8.noarch.rpm 5f95b3c84182a3a10fdd518277db8ba54ca88a3fe943c4ae2aa7adc41bca74c9 bpg-serif-fonts-1.005-11.el8.noarch.rpm c92fdd513eb927718cc07391e07072f0c933c2997337c2cc72255074946055a0 bpg-serif-modern-fonts-2.028-11.el8.noarch.rpm 72175ee483fcd31713aadcf7652dac55d0ab6b5f50757a4a1175b5bc130a13d3 bpg-ucnobi-fonts-3.300-11.el8.noarch.rpm 84b2d3be17f380b7d4704c95dc5e439f9d20633e7ea345f6391f31b69b8e5e50 RLEA-2020:4724 perl-IO-Socket-SSL:2.066 and perl-libwww-perl:6.34 update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-Net-HTTP, perl-HTTP-Message, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-WWW-RobotRules, perl-HTTP-Date, perl-LWP-Protocol-https, perl-Net-SSLeay, perl-TimeDate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 4f838ceea3cf5dfefffdebe0181ef879213ea9c143a6d77859b8f97d37d7f2a2 perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f8ac7791b06c47866c5e688dacaef16d8bbc56e760e71ace7610b12fa6b1da1 perl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 3aaec32b508f40a97b7274018a707339b6a5877493b84f55769a47d84fbb7a5f perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b perl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f41b83ba68e184bda30ef525a7600673733aa444c2713bffb572eb691818b2d perl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 39a934c51411a833c333671b2a7df180f1c9d0ef251889a8c1e9d48701cee459 perl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9862723272cc2aba25739dc251961e0cbd90be7e3b3eb9a0eaf79c1b8504f080 perl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 0d9b36f3c0e80cadb8b5282c1b3be01f6501e2b1d95e80e84d9fb3b24a6f7e52 perl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9a1c248fb9f94b77b6b5afa60bef8e145057c8d1031957e09bfd42e188e17309 perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm 321334e0883dd66f5c7b6aa86ea601e5a1a831dd0950032128ac3909032bc343 perl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 7f33a736a361b53262ce8cbd273f26b8debe23f4f3fb0a1817d4c519ca2471c6 perl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 3416b0bcbd18b2b38276c15376eb1560dace73dc40c613e5434a4b956ddf52bf perl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm e6121208c088b4a8c6d95d89aeee50c265ca21c7cd35ec9fde3ffc087fecdf49 perl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm c350bea5407e56eb42eda4cbc77895da0ad65ae5ce23e08543fc3cfe56939793 perl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm bf26ed1f8417e1a76d8bc96d609e74c2c8af22c5e3194b1c7d5dbb1fa7bdd911 perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpm c0a260b0aaddebf1df80c0b98ea0f24abc32b2f7711f67c4982559dd19b98d7a perl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 47f5249f76519dc5d16c9dd6d74d51ba1c62ca0937e544395f9e67b10cf2f3cd perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 1d87ab90226348884ea3741f614e33782a9176a71227f7d14c6fbc2aa69c35b9 perl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpm 4cb2c5f159200cb752acaca0293501f413bae3e4fc0a2263b633f847b5ab3d7d rocky-linux-8-x86-64-appstream-rpms__perl perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm 85d5b8dca8c11735fe4bb387756c332e49af51227cf76cce4ae44bae6a8641e0 rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm 66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd RLBA-2020:4726 libmaxminddb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmaxminddb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libmaxminddb-1.2.0-10.el8.x86_64.rpm aeba7e5152314138adb423a1f7d1d58fcbc5dfd9214b3de2f6b35e42da4b9ca5 libmaxminddb-devel-1.2.0-10.el8.x86_64.rpm 5392fc9570da9dc7d4deefff17b11964da9b68d900e35b4321d9cf4638430b0d RLEA-2020:4732 new module: nodejs:14 This enhancement update adds the nodejs:14 module to Rocky Linux 8. (BZ#1815402) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the nodejs:14 module to Rocky Linux 8. (BZ#1815402) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLBA-2020:4737 sassist bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sassist. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sassist-0.8.6-1.el8.noarch.rpm 1b7b11ebb113e13742d03ff8229e112ea2025fca26f79416fd382b8578cbf86e RLBA-2020:4738 fio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fio-3.19-3.el8.x86_64.rpm 9e3022392a68cb36d9b816ec9591b91a46bfd5229329c124284ccd8db026be0c RLEA-2020:4742 userspace graphics, xorg-x11, and mesa bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libXft, xorg-x11-xkb-utils, xorg-x11-xtrans-devel, xorg-x11-drv-intel, libvdpau, libxkbfile, libXxf86dga, libXau, libXrandr, xorg-x11-proto-devel, xorg-x11-util-macros, libXext, libXi, libXdmcp, libXmu, libXvMC, mesa-demos, xorg-x11-drv-ati. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms glx-utils-8.4.0-5.20181118git1830dcb.el8.x86_64.rpm 751056a3ca9f371de399e28f0269347b8b83253401cace95a5420c30714fbdb2 intel-gpu-tools-2.99.917-39.20200205.el8.x86_64.rpm ca18f49420bd77871652059de37c4ce2712c7972136796a6c4af5bc4c9b5e9ad libvdpau-1.4-2.el8.x86_64.rpm f45b5cf54aeb481ff4cf52b101736810c7aebedcc227019cafb14b7414bd8cc8 libXau-1.0.9-3.el8.x86_64.rpm 028141ae18fb41c9ee406307953e600eba388282b0d581c7132db5ff22ace362 libXau-devel-1.0.9-3.el8.x86_64.rpm 7a17dc2ed5eff71b97ec5036d404b3b3f6c3ee26c4a42d9cbcd5e62d10ea9da2 libXdmcp-1.1.3-1.el8.x86_64.rpm 0b69d5c1e3ceba8903038d00820e13e7a4dd63ce095e9b3f45af7fff0893311e libXext-1.3.4-1.el8.x86_64.rpm d4b037882da8eb6c588eee822f3227e7caf6ed2e9352ed490f0cd3577ed78470 libXext-devel-1.3.4-1.el8.x86_64.rpm 65c371a1efdad5cf9280b6e62fef1ef155991daea3f026cd5adc0025aff6aef9 libXft-2.3.3-1.el8.x86_64.rpm 2d4a1d4c0c9e61c70936873f0563ed2ac6b468549c3163bf73f91134ff2e9860 libXft-devel-2.3.3-1.el8.x86_64.rpm 5f165daab1a56d5339f5ed6d588e28dc48af44b27470f4f1a4fb06dc1c93d2e5 libXi-1.7.10-1.el8.x86_64.rpm 50085caa63b1a131251449903e9918d847702e5a9b64ed33bd2b72b1ff657343 libXi-devel-1.7.10-1.el8.x86_64.rpm 895888acfd024093b564da21b808c20c3ab93bcee12d604afefbe229f35d396c libxkbfile-1.1.0-1.el8.x86_64.rpm 34a3b0f4f7966fac35d7f912ff9415d8d4ff858c35f27405e3a4e8f3e55a0dc7 libXmu-1.1.3-1.el8.x86_64.rpm d6a17b0d20b9d510cde5ea0bfbb3434a7f3878dbf710246fc063ff49a3facd9f libXmu-devel-1.1.3-1.el8.x86_64.rpm efe847621d6d3d5a6cea7c0ee04ae377e29a0db2235daca5348c893b989bfdc7 libXrandr-1.5.2-1.el8.x86_64.rpm 6e162f68d0459598f596ee0698a504c795d6c992a807dec0e718efdc8a1e225e libXrandr-devel-1.5.2-1.el8.x86_64.rpm e080677e1c0a510493557023b483268b62aaa1788ecf4549d9f0702c0243c27b libXvMC-1.0.12-1.el8.x86_64.rpm a90a28f61c0b3b2b4d7f0ccde4a5910b40c0af50d97e32db8251ef8f4fc4a005 libXxf86dga-1.1.5-1.el8.x86_64.rpm ccfbba780589fce2c706637c19d968f718e57025ca847ca988bd6e08866bb71b libXxf86dga-devel-1.1.5-1.el8.x86_64.rpm d9e6d5d4907a21410438713ba87cb8cac1b0845870e85cca30e9bcb625fbbf00 xorg-x11-drv-ati-19.1.0-1.el8.x86_64.rpm f2044a3ef87c2233a795acfd4e453a204067ac7859154bb8cefa15260d64ea3f xorg-x11-drv-intel-2.99.917-39.20200205.el8.x86_64.rpm a753e4380e920df6184f68718e509ab792225037b3e7d17140413873d5481772 xorg-x11-proto-devel-2020.1-3.el8.noarch.rpm aa75375b6709706c2dfeb39934ae46f7e499f9adb176d8e05942ab94584b7556 xorg-x11-xkb-utils-7.7-28.el8.x86_64.rpm 317f517f2b2624d859fa1ebd0c77f75d2f6707eaa0da526f9e27e815aec27b57 RLSA-2020:4743 Moderate: squid:4 security, bug fix, and enhancement update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467) Security Fix(es): * squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520) * squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521) * squid: Improper input validation in URI processor (CVE-2019-12523) * squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524) * squid: Heap overflow issue in URN processing (CVE-2019-12526) * squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) * squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529) * squid: Denial of service in cachemgr.cgi (CVE-2019-12854) * squid: Buffer overflow in URI processor (CVE-2019-18676) * squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677) * squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678) * squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679) * squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860) * squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) * squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) * squid: DoS in TLS handshake (CVE-2020-14058) * squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) * squid: Improper input validation could result in a DoS (CVE-2020-24606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467) Security Fix(es): * squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520) * squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521) * squid: Improper input validation in URI processor (CVE-2019-12523) * squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524) * squid: Heap overflow issue in URN processing (CVE-2019-12526) * squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) * squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529) * squid: Denial of service in cachemgr.cgi (CVE-2019-12854) * squid: Buffer overflow in URI processor (CVE-2019-18676) * squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677) * squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678) * squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679) * squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860) * squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) * squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) * squid: DoS in TLS handshake (CVE-2020-14058) * squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) * squid: Improper input validation could result in a DoS (CVE-2020-24606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLBA-2020:4747 julietaula-montserrat-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for julietaula-montserrat-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms julietaula-montserrat-fonts-7.200-2.el8.2.noarch.rpm d7014c8bfba50a202864494ab1ce8b7d94d8fecd3b2f6099aee0a80cd8c8661c RLEA-2020:4748 maven:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLSA-2020:4751 Moderate: httpd:2.4 security, bug fix, and enhancement update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236) Security Fix(es): * httpd: memory corruption on early pushes (CVE-2019-10081) * httpd: read-after-free in h2 connection shutdown (CVE-2019-10082) * httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097) * httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) * httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196) * httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197) * httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092) * httpd: mod_rewrite potential open redirect (CVE-2019-10098) * httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236) Security Fix(es): * httpd: memory corruption on early pushes (CVE-2019-10081) * httpd: read-after-free in h2 connection shutdown (CVE-2019-10082) * httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097) * httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) * httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196) * httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197) * httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092) * httpd: mod_rewrite potential open redirect (CVE-2019-10098) * httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLBA-2020:4752 new packages: gcc-toolset-10-dwz GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-dwz-0.12-1.1.el8.x86_64.rpm a3fc3c8e50ede83b9dd42e816b7e3cb7c4b1bea76a7c27e6b9baa86b7de9aef4 RLBA-2020:4758 libosinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvirt-glib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvirt-gconfig-3.0.0-1.el8.x86_64.rpm d212dd8e8560f75d901e1e05a8b60dc221083d7c7ae4c6d38f690e611fe15dac libvirt-glib-3.0.0-1.el8.x86_64.rpm edbb5ddfe8604df94839c05863fbfec930c76b91cd04651d7841292f1c7be852 libvirt-gobject-3.0.0-1.el8.x86_64.rpm 54ce79c975115c186f7da62e5788ce09fff868e6e1e2de308071f9ee85c029c8 RLEA-2020:4759 new module: ruby:2.7 This enhancement update adds the ruby:2.7 module to Rocky Linux 8. (BZ#1817135) For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the ruby:2.7 module to Rocky Linux 8. (BZ#1817135) For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 RLBA-2020:4770 container-tools:2.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:4771 container-tools:1.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996 containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051 RLBA-2020:4773 libgit2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgit2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgit2-0.26.8-2.el8.x86_64.rpm 2fd89961bb66c0f0356457bb232d3aefdb8262b5280b3c0ed3fd6270e690b9c5 RLBA-2020:4774 langtable bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for langtable. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms langtable-0.0.51-4.el8.noarch.rpm e87cdf437e0d034b54e6033c58433150c339e509d9bfd411e663c727258d05f2 python3-langtable-0.0.51-4.el8.noarch.rpm 4f0e0d4f68336e8e79c5eab94d9ee24fbc08e54affbf456284dde6acaf4d8112 RLBA-2020:4776 new packages: gcc-toolset-10-make GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-make-4.2.1-1.el8.x86_64.rpm 108af38877fcfbe0a978849c72e88cb7dbb60680a1cd2936807fb34fec10d4ba gcc-toolset-10-make-devel-4.2.1-1.el8.x86_64.rpm 9e4b9b3d7878c6d9b9695660b55998da5d9c1719f04cff1a9e2c9c35e47d478d RLBA-2020:4777 new packages: gcc-toolset-10-ltrace GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-ltrace-0.7.91-1.el8.x86_64.rpm 671eb647a6e888e8832655ae9a3ffd566c15053bc6fba88ae9ff4b7b42ba9eb0 RLBA-2020:4779 ibus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus, ibus-hangul. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ibus-hangul-1.5.1-6.el8.x86_64.rpm 4917a3b7d03f8d640150d01cf98454973f9acaaf01d809c3dcf1e965ec7ed59b RLBA-2020:4790 google-noto-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for google-noto-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms google-noto-fonts-common-20161022-7.el8.1.noarch.rpm 9054f4115d1f9261a89572c0d14aa2fac5a513f9d5b5baa232bbf3ada845187e google-noto-kufi-arabic-fonts-20161022-7.el8.1.noarch.rpm b8f953ee409ea1f18bba6be030c175e905cc1878fd6132eb95bee3254ea4bf75 google-noto-mono-fonts-20161022-7.el8.1.noarch.rpm d6456554249139c1628f6628c877faf27fc4cea6bfb4f1d6922e2b45339655aa google-noto-naskh-arabic-fonts-20161022-7.el8.1.noarch.rpm 9ddb9ca176cb011dce33f0debbd54047fe668b89150f4bf6494691b1a03b3216 google-noto-naskh-arabic-ui-fonts-20161022-7.el8.1.noarch.rpm 3d453fbc9a239b7c55afd77ce5f6d73a97860abebdfb3eacfab46d1e2400d6f7 google-noto-nastaliq-urdu-fonts-20161022-7.el8.1.noarch.rpm 881fe2872e13de931261e9e52d3b29c9183b73a3bbdb95422a7c30be3bc14483 google-noto-sans-armenian-fonts-20161022-7.el8.1.noarch.rpm 1afdb3c07ba26d67d0463255dfc71c5e316f24bf4fa6adf7e96204a6df097eb6 google-noto-sans-avestan-fonts-20161022-7.el8.1.noarch.rpm 8549d9509bb34983498b2a871584e7861b1b7e5b7620a82c8447c4363c24f8af google-noto-sans-balinese-fonts-20161022-7.el8.1.noarch.rpm 95b38b22969a8afa2d5cf667aa690762eaa35010a1242efd88942739ca463747 google-noto-sans-bamum-fonts-20161022-7.el8.1.noarch.rpm a0beba19c95e5c7bd2879cab9230492780ac0a3bdce3e652cbcf44e2ef7247f1 google-noto-sans-batak-fonts-20161022-7.el8.1.noarch.rpm fa3c4c7e71bfe3e7591412839332f37bf9c3394efefc3e6a8ae00d77b888ee51 google-noto-sans-bengali-fonts-20161022-7.el8.1.noarch.rpm c69876d017c262057100432557a7c11942686cf312c409c333f9451f08bbeed0 google-noto-sans-bengali-ui-fonts-20161022-7.el8.1.noarch.rpm 7f5a4bcfcc4dc9fb88bc4b5bbbbde63cb175053f57de1c0852c56d6eb3d2a76c google-noto-sans-brahmi-fonts-20161022-7.el8.1.noarch.rpm 00f4a158384b075758dae1f14ada89ea6075565c33ebff7238e8c393eb899013 google-noto-sans-buginese-fonts-20161022-7.el8.1.noarch.rpm d9827320d8332b8b441b9cd20c5a2ed1521fa4c2a8c918dbc1f96aece0df195b google-noto-sans-buhid-fonts-20161022-7.el8.1.noarch.rpm 32042bbd855f80ae18b007b4476a93ff5507a11af8b8456183af3eabb2f0c5d5 google-noto-sans-canadian-aboriginal-fonts-20161022-7.el8.1.noarch.rpm eeb8487dc495979dcf179770dbd978be58dbc86d6116f1ab25654a2f23cebed7 google-noto-sans-carian-fonts-20161022-7.el8.1.noarch.rpm 8da9a2b63f21af5205affe22deb41e75e2d5e0fdef9212409c95ad482d7761b6 google-noto-sans-cham-fonts-20161022-7.el8.1.noarch.rpm bb82447e61bcea669eedf3658e612c1c69aad42381b7b6220736ade3a72b46bb google-noto-sans-cherokee-fonts-20161022-7.el8.1.noarch.rpm 74c51fa685d4a7c04f0ea5c4f4ee6abfa1d82a285ec2397403f99c0b62986524 google-noto-sans-coptic-fonts-20161022-7.el8.1.noarch.rpm 4b53d69180d5b24e1594658ccd095129d538661bf0c9def0d37c57ac25710485 google-noto-sans-cuneiform-fonts-20161022-7.el8.1.noarch.rpm 107af3986cd3504d590e8a1896c577d7a488888c09b6dba9d5ad1c04884fb5d2 google-noto-sans-cypriot-fonts-20161022-7.el8.1.noarch.rpm 5a817b07d9267889ffd20abe01c0edcf67d08683885e01bff82ff5baf532297f google-noto-sans-deseret-fonts-20161022-7.el8.1.noarch.rpm 1f99f054d6ccf566e7d7dd287fa2e7e75287ad3c3818d66a2a481be9531c93f2 google-noto-sans-devanagari-fonts-20161022-7.el8.1.noarch.rpm 06f907e62ad60a45e6bdef41c49c0f03f23264c8a7ba3526b25de68646ad6cdf google-noto-sans-devanagari-ui-fonts-20161022-7.el8.1.noarch.rpm d92409e642c58da1b1ae13a173505a765fb7fc3a59dd8b6212fb155d459cfced google-noto-sans-egyptian-hieroglyphs-fonts-20161022-7.el8.1.noarch.rpm b9ca8ce4b2fb1d0a5c91416388fc1715121d1b1800496f09dbd12482c4219f53 google-noto-sans-ethiopic-fonts-20161022-7.el8.1.noarch.rpm 3201e2e34512984a42f9a2166b34147a690a02e38318055ee099d2da9e3e8fd5 google-noto-sans-fonts-20161022-7.el8.1.noarch.rpm f5e5e9f24c260852eea2b74dbba5363d9081d08f74dc4870eeb4874ebc9fbc55 google-noto-sans-georgian-fonts-20161022-7.el8.1.noarch.rpm 05abb9fc5269f05e1e2a2b26a55c4891b0f6625ec1124ec7fe6aae50e8718a78 google-noto-sans-glagolitic-fonts-20161022-7.el8.1.noarch.rpm 606a186eab06888ba297c87e8c43bdfe6531b49feab432d8d53e35fca0641467 google-noto-sans-gothic-fonts-20161022-7.el8.1.noarch.rpm c1218c4756c88a48afa63dbe6239152bfabd1a415432be2ef67b3db41b261372 google-noto-sans-gujarati-fonts-20161022-7.el8.1.noarch.rpm 7301fe98ad704fcf073b2616aa52a4b0bbaec2463bf5406c70e7be03485424ef google-noto-sans-gujarati-ui-fonts-20161022-7.el8.1.noarch.rpm 4f68ad38e8c87c89f57b962263cf5ee62c17fc63bc7e0c7cbeb4deb60b43980b google-noto-sans-gurmukhi-fonts-20161022-7.el8.1.noarch.rpm 9e7b18d8d894e8cb7594ea6523393498a82f3a21f62aca7152bd2b6e014fec5b google-noto-sans-gurmukhi-ui-fonts-20161022-7.el8.1.noarch.rpm 9e56039ba8b27a03b4f98621ab71ab8ff3f3fe119c91c85596f908d908f04874 google-noto-sans-hanunoo-fonts-20161022-7.el8.1.noarch.rpm 828c13f0fce2bfa346fd7d9441c5d2e2cb04dfaea0fa1f789e8cc613e3a4bc7f google-noto-sans-hebrew-fonts-20161022-7.el8.1.noarch.rpm b92f5dd304b9eb29cc7f5250e54eaaf8b3d6e7cd435483c1addc2490ae11ced1 google-noto-sans-imperial-aramaic-fonts-20161022-7.el8.1.noarch.rpm 180f5c232a18e8578bb19660aac3530b2e401c62719ff44c773a060f52804617 google-noto-sans-inscriptional-pahlavi-fonts-20161022-7.el8.1.noarch.rpm d976db0a87a94ea3ba8da7c87f2f04bb2a55422ba79ba8417fb1c440d6ca8208 google-noto-sans-inscriptional-parthian-fonts-20161022-7.el8.1.noarch.rpm fe45186363e56bbd733ad113dfc400b516171d79332d4a1ab0704cf7946a45ab google-noto-sans-javanese-fonts-20161022-7.el8.1.noarch.rpm 6c142a3293c3ae57547a28e51bf01dfdaf997c92adce67de523b56d01e14962e google-noto-sans-kaithi-fonts-20161022-7.el8.1.noarch.rpm aad3715ff21c82d6ca2f9e4ef3182cda585abc76ed152b7b9ddfe127483ea089 google-noto-sans-kannada-fonts-20161022-7.el8.1.noarch.rpm f6eecafd4beea6b4f8445e2f448ee5b2c80838115d8b80d5fccfca60887cda53 google-noto-sans-kannada-ui-fonts-20161022-7.el8.1.noarch.rpm 7c99250cf2026843102512351ba0af21d9b0a3f59d003e5cec1742bbc54e78b0 google-noto-sans-kayah-li-fonts-20161022-7.el8.1.noarch.rpm 60b483a0c9ed8b2f1a20e08c6099d273d38732977488963dd8a7968e7fecf8c3 google-noto-sans-kharoshthi-fonts-20161022-7.el8.1.noarch.rpm cc5156d32dab923a94bedcb901fbd927928d54e101469c17be4cb888ddea846f google-noto-sans-khmer-fonts-20161022-7.el8.1.noarch.rpm d80e9a1fc77297e2862266f8115e7b1089d1dc8e818463d017da8912c8450383 google-noto-sans-khmer-ui-fonts-20161022-7.el8.1.noarch.rpm ddd7809f2d875216c0e522c639c8ea1461f9b184eaad3b5c88876a7fdd6bc612 google-noto-sans-lao-fonts-20161022-7.el8.1.noarch.rpm 0b6f08aac4d4a4232aa2f14482a40e6b333fe85260a68ab338dea88722fb21ab google-noto-sans-lao-ui-fonts-20161022-7.el8.1.noarch.rpm 2924d266d3dab3309f6c91ebdf14fae25d91e5edbe6c592ebe4171313dc41d19 google-noto-sans-lepcha-fonts-20161022-7.el8.1.noarch.rpm 60e73bad8007ef25e98a4eedd5f299c0c3698228728aa329849ba93e39c2f1aa google-noto-sans-limbu-fonts-20161022-7.el8.1.noarch.rpm cd867ab343bd34082155f9af40d1d42446215ee9cf9bbce0ad852d6cd788ec2f google-noto-sans-linear-b-fonts-20161022-7.el8.1.noarch.rpm 70e61c43aefdec1b04c8d84911600adaa5d061fdad6f703a358bd0d96dc8aeaf google-noto-sans-lisu-fonts-20161022-7.el8.1.noarch.rpm 3bd80ea7fdebd7625c81c7b889e99b82f8569f2288fe84cf8741406f3c7ce451 google-noto-sans-lycian-fonts-20161022-7.el8.1.noarch.rpm d56f26d69b432891d45ed7e8efa760c544ba4b993f48bd079c812790840bbcb8 google-noto-sans-lydian-fonts-20161022-7.el8.1.noarch.rpm 924fecc774847165e8482fd6f4a77003dba7099f80f7f18129a9f4888b0e1715 google-noto-sans-malayalam-fonts-20161022-7.el8.1.noarch.rpm 596a7997a9ba17df887547c705e7a694d2d99e4d1dfcefcb37ee8ef6c2a0cda1 google-noto-sans-malayalam-ui-fonts-20161022-7.el8.1.noarch.rpm b3bc779d1a6086f006fd5504fa465e8fd1d6fb7abdf26c44ae3991fbf3e2d115 google-noto-sans-mandaic-fonts-20161022-7.el8.1.noarch.rpm 43c39a98a28d9d95861800197ddc7e72ee5f430dcf4de6d8ed53e96f0aafc59c google-noto-sans-meetei-mayek-fonts-20161022-7.el8.1.noarch.rpm 5d80de8a140f4ff37d56978f5b6a698534fff3f46e4359c8225153e3dcc8d26f google-noto-sans-mongolian-fonts-20161022-7.el8.1.noarch.rpm 47ba6e340ec2de58d3fc5c698f7a6046a67446b7d5b238ccf09f833c48597dd1 google-noto-sans-myanmar-fonts-20161022-7.el8.1.noarch.rpm 78440d1722a5f7daaa95e4c302ab2d97739ac385968fbe85be5d7698ed363519 google-noto-sans-myanmar-ui-fonts-20161022-7.el8.1.noarch.rpm 1f327ecc610b021068746659a6a1a84d09fa5f4c50721b88223d4525b46b0a94 google-noto-sans-new-tai-lue-fonts-20161022-7.el8.1.noarch.rpm 718eed1d2f470e024b6994bdf80d5265ae659d228c46c2699826540031944848 google-noto-sans-nko-fonts-20161022-7.el8.1.noarch.rpm 7f35fbc6e542114c530841d076696a43b4879c38cb820045f5a388714fd9159a google-noto-sans-ogham-fonts-20161022-7.el8.1.noarch.rpm 1ceb4a4a1ad86f2b3c8987da6e5881118ae372f7f7da1b5698719a90156031df google-noto-sans-ol-chiki-fonts-20161022-7.el8.1.noarch.rpm 577fa59a3bd3b5653a44fc6ad111649d97c9f8fc69893b9808257e16ff8328f2 google-noto-sans-old-italic-fonts-20161022-7.el8.1.noarch.rpm e7059bf126c5bdfe66fc4dc27414cfabbb42a32c00f246e3d44d5b4cb1a3e66e google-noto-sans-old-persian-fonts-20161022-7.el8.1.noarch.rpm 36f7d58ad130d8886a5afdcc5a6a1c27ae32044d4224d7ff23f9ff4ca6c47bb7 google-noto-sans-old-south-arabian-fonts-20161022-7.el8.1.noarch.rpm 5146b3f7f9f7617ca1b85ec2e8ec3541d6dc21de917e578492f1a1a1614e6984 google-noto-sans-old-turkic-fonts-20161022-7.el8.1.noarch.rpm 78a54f8247040e17bd0ca4436f8f97780cb7ef8d0da7865fa0329943f056822e google-noto-sans-oriya-fonts-20161022-7.el8.1.noarch.rpm f4711424620ba201d257c9f8e0cab655a467e8a0016df3ec6465baf14287464d google-noto-sans-oriya-ui-fonts-20161022-7.el8.1.noarch.rpm 549382c75c021ab8bb71cdd4d591e75effeb71d26cdbbedf606d6a292c4a7963 google-noto-sans-osmanya-fonts-20161022-7.el8.1.noarch.rpm 462080e011048f6cd91e785c20e2d58a2bdbfbec20909f0ab49fdd9ce4c36cef google-noto-sans-phags-pa-fonts-20161022-7.el8.1.noarch.rpm 1654e2bf83c0009fd6f7492b6d3194bd05b0a81caa15ba1260d631547988538d google-noto-sans-phoenician-fonts-20161022-7.el8.1.noarch.rpm de9a02ab3108811c9ada8442977a0e6e27b17aebd05e57b4bd1bf4d0a89bc40a google-noto-sans-rejang-fonts-20161022-7.el8.1.noarch.rpm 86ecdff8779c5d2c47bf53bb962bc7ce15b0f257e1969ddd05c9419e25dc7ab0 google-noto-sans-runic-fonts-20161022-7.el8.1.noarch.rpm de7b23e118d889218329e95180fba6f5ee55fa32f1d46c4759edd7b3aa4c1f1e google-noto-sans-samaritan-fonts-20161022-7.el8.1.noarch.rpm c013cff0f199664040aa90b4bfbcd44ab0cd8f376a03f82bd9c2c6fe4ffd5a10 google-noto-sans-saurashtra-fonts-20161022-7.el8.1.noarch.rpm 2a162ead4e35e933fb9030df85f577c0f9daf9edbfeef8d8656b96ddcec399ed google-noto-sans-shavian-fonts-20161022-7.el8.1.noarch.rpm 1a722c9b472ef029e6924b8bf2f49f3a0fa5d9210ab5ef72ef8dbadf910798df google-noto-sans-sinhala-fonts-20161022-7.el8.1.noarch.rpm 732241415064377ba25a40b26b468fcbd73f2ef7d25d1a093004b6fad929d4db google-noto-sans-sundanese-fonts-20161022-7.el8.1.noarch.rpm 1b4041239d8d3a655a67c0afbe53224a59c95a523d8c619c1f920ae90df67eb8 google-noto-sans-syloti-nagri-fonts-20161022-7.el8.1.noarch.rpm e1d3b6bfe8c0808e5861fff22295a9353229fc9b8b1045089efc61994e0a0b4e google-noto-sans-symbols-fonts-20161022-7.el8.1.noarch.rpm 445f9a3ba6837607d3da06a1621d8058732aa9a0b72238632e4cf0d3641654a7 google-noto-sans-syriac-eastern-fonts-20161022-7.el8.1.noarch.rpm f4aeef574633a828f0d0046127b4eb11476275ab17d3161c713e46f289b78e5e google-noto-sans-syriac-estrangela-fonts-20161022-7.el8.1.noarch.rpm 2ec396f9d6b7daab1d326cb557f71bcb8b5fd6fbf26ababcf39e9510b91f189a google-noto-sans-syriac-western-fonts-20161022-7.el8.1.noarch.rpm 9bcf761f2a6b6515a4924697066dd10589d9860f248b520bb6765f1e5e791422 google-noto-sans-tagalog-fonts-20161022-7.el8.1.noarch.rpm 9513c313ac8baed19701397705eb80df22d453eb3ff7fee09daff328618ba8f7 google-noto-sans-tagbanwa-fonts-20161022-7.el8.1.noarch.rpm a320e1a5e5f4c4ddc9ad6c4bedd14790803e3203ab3497ee53e976e23638d4d0 google-noto-sans-tai-le-fonts-20161022-7.el8.1.noarch.rpm 0eddb4c72b753720d0cd41326aa32330f9264c5aaa4ed02ec2b50deb15988419 google-noto-sans-tai-tham-fonts-20161022-7.el8.1.noarch.rpm de23ad42f12dcde951a9ed2a9b2c8b2744a923ffe88f9e57588c59f0ef010e22 google-noto-sans-tai-viet-fonts-20161022-7.el8.1.noarch.rpm 36eead07805038f4f99a65d343ff728f3efa039432f3aab225a0896daaa07554 google-noto-sans-tamil-fonts-20161022-7.el8.1.noarch.rpm 2124b988ddc384ad951e6b582ffa4d151f46ef1fe86c2b3ea40e8217386d9506 google-noto-sans-tamil-ui-fonts-20161022-7.el8.1.noarch.rpm 8b662de72aa6d9f2512b93491ba95a1790d77266afda7fb0c3669146b02795b0 google-noto-sans-telugu-fonts-20161022-7.el8.1.noarch.rpm f461e093f472a9c7d1d1b6c2116e44ff41a2c2790eea193f201ce890817eef08 google-noto-sans-telugu-ui-fonts-20161022-7.el8.1.noarch.rpm 891ce2398cde591c82445b719e1ea9d7e90f8f6c7291f49c03efe6cc59d7d796 google-noto-sans-thaana-fonts-20161022-7.el8.1.noarch.rpm bf2bcd66091bafc88dc301f2ff0f4081f4ab3a80c21ff817d84ef6f527591e99 google-noto-sans-thai-fonts-20161022-7.el8.1.noarch.rpm 5c9f0078b7c5bc0e7c0811ad90949d361ac778b4657784258a6321c692a7b39a google-noto-sans-thai-ui-fonts-20161022-7.el8.1.noarch.rpm a6b013bc3f194c2c1f3bcddb01bdfa3c70eddec2b59c4923243400cde5e0f6cd google-noto-sans-tibetan-fonts-20161022-7.el8.1.noarch.rpm 7c749e6c13864fbf2f123062dbf078edc7bb4a086dc6f6f8bbcd5a470f8868ab google-noto-sans-tifinagh-fonts-20161022-7.el8.1.noarch.rpm d73b184e3ac70dcef918d04f6d71d732c669f3e7650bf1d9eb609bae557eb04a google-noto-sans-ugaritic-fonts-20161022-7.el8.1.noarch.rpm c2b23c6ef16b4449d292788dffa8ec4330a495a3400f2bd55b5a1bffec9f0afb google-noto-sans-ui-fonts-20161022-7.el8.1.noarch.rpm 3c2f8335cfd198916a192f431b8714a63370b80de5c4f11cf57f172c74c014e9 google-noto-sans-vai-fonts-20161022-7.el8.1.noarch.rpm 47d6ea20f593be3893dc23c6ef20adb49325fa534890049bac9cc70ed745ba61 google-noto-sans-yi-fonts-20161022-7.el8.1.noarch.rpm e602ac52168ec2649b85e01b2307f7f6888c6468dfd2cf28610d76e5a47d5eec google-noto-serif-armenian-fonts-20161022-7.el8.1.noarch.rpm 316d0b9104eb7df90cf05316a8549694a5ccc3eca1fa6f2d3b408d22017518c5 google-noto-serif-bengali-fonts-20161022-7.el8.1.noarch.rpm f975618990610842d350d936dcddcb18d49987d1c937bf7d759d85f713606e3d google-noto-serif-devanagari-fonts-20161022-7.el8.1.noarch.rpm 33a22bc760dc6e333b85008cbd9a54fda9185af5bf81d3dd51c88ad49460c75d google-noto-serif-fonts-20161022-7.el8.1.noarch.rpm bc2a72c11edfd2ffbb662adaf6e45ccc00ce8d6b8e2253b1419b64376073a891 google-noto-serif-georgian-fonts-20161022-7.el8.1.noarch.rpm 88370f2a2e7e9056e2838a2c6a503a79ec8496658c4a91993ed076f548c172f6 google-noto-serif-gujarati-fonts-20161022-7.el8.1.noarch.rpm a9780ebb04e2462dbc9ab3335edeb8068542131fb47ae73ab1033b81cdbef847 google-noto-serif-kannada-fonts-20161022-7.el8.1.noarch.rpm ad7511bdf37887e2327234151c9e7e350ea734dfde715c0836c0494fd66dc878 google-noto-serif-khmer-fonts-20161022-7.el8.1.noarch.rpm 633bd366630acc49451b90027b3e1891e01e97c2dd7e5763ec2d8ea19dcaa42c google-noto-serif-lao-fonts-20161022-7.el8.1.noarch.rpm 16b575e7835dba5057a82708e1cabd30340d51d237250dd3cd725f5a995b0b16 google-noto-serif-malayalam-fonts-20161022-7.el8.1.noarch.rpm dc01c2d61bfe5fa43a2c0fd5e8453c1da1922f5f08a905f566baa9abd3a9229e google-noto-serif-tamil-fonts-20161022-7.el8.1.noarch.rpm 26adb2a3043264f623e3b8056aeebfb7b5518e9507fcb7f8ba21c21f08282f60 google-noto-serif-telugu-fonts-20161022-7.el8.1.noarch.rpm 26e9e20667b482fc729cf245e916c81eb1a77165f6e963290e2854eee2a2dd67 google-noto-serif-thai-fonts-20161022-7.el8.1.noarch.rpm a1de6ac7f1c39cbf49e15668260901a0f8fd1337a0a3931477bbe6d2976cb4ef RLBA-2020:4792 omping bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for omping. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms omping-0.0.4-18.el8.x86_64.rpm 7c52cea22fe1414818800cf2e4b030ee2b22daac0d2cce173f57aff3f29893cf RLBA-2020:4795 rpmlint bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpmlint. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rpmlint-1.10-14.el8.noarch.rpm 4c1a93528d02390318976858c4daa1a77cf258c69c5d1e80b75f443544e53672 RLBA-2020:4798 python-justbases bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-justbases, python-justbytes. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-justbases-0.14-4.el8.noarch.rpm e194b11631a284bf9f7ece9b2fba00f1748bffcbcf540a6c943c4d8445c31e1a python3-justbytes-0.14-2.el8.noarch.rpm cac2a8bcd4ef610d9498f194540f62c4ded2894080b4396d01f44f73609c1b70 RLEA-2020:4803 perl:5.30 metadata for the Rocky Linux 8 module matrix (3/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 RLBA-2020:4824 ruby:2.5 bug fix update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLSA-2020:4827 Moderate: oniguruma security update Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix(es): * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for oniguruma. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix(es): * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms oniguruma-6.8.2-2.el8.x86_64.rpm b0e45f265d039cb2f8e12fd3c85ed1f95eaa44f37978c4a3faf169020907d6e7 RLBA-2020:4828 rpmdevtools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpmdevtools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rpmdevtools-8.10-8.el8.noarch.rpm 35b7558165c1564c655fba49a8acf0d03ed7c361d0dcde47cf85740e052c46b9 RLBA-2020:4832 torque bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for torque. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms torque-libs-4.2.10-25.el8.x86_64.rpm d8ea26158c65c5e8a729e117ee07c15cbbf864caa1f267f2dbe7bb830f3914a9 RLBA-2020:4834 new packages: gcc-toolset-10-systemtap GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-gcc-9.2.1-2.3.el8.x86_64.rpm 9773ebdd8bc8be47124faad82a588ac87521b1ccba5968aee2cadd7f446a7f87 gcc-toolset-9-gcc-c++-9.2.1-2.3.el8.x86_64.rpm ea925505982b6aef4b57ce7221b18c7c0af4d6cbf79703dbe7f1d78bc68c1897 gcc-toolset-9-gcc-gdb-plugin-9.2.1-2.3.el8.x86_64.rpm 9fdeac6aa41b7aa1d96d66458c0635f416fb181b4913cb987ff94e15f78455b5 gcc-toolset-9-gcc-gfortran-9.2.1-2.3.el8.x86_64.rpm fbb05fc9585b6e6a98572c78955654f77c0fbc1bf70c644379ded2908f63b3ab gcc-toolset-9-libasan-devel-9.2.1-2.3.el8.x86_64.rpm b3a980f8f8533d2c850c6ea94e64fcfb0ea95478ab043b1847309916e306efe3 gcc-toolset-9-libatomic-devel-9.2.1-2.3.el8.x86_64.rpm a44828c99683dee995ff1dcf9e76dfb18c621e9a37e412eebaef846732a610bd gcc-toolset-9-libitm-devel-9.2.1-2.3.el8.x86_64.rpm 38f6ffa33a061227cdc266ab1c6e31c4e81465cabe7c167ac1b69ec641d443d2 gcc-toolset-9-liblsan-devel-9.2.1-2.3.el8.x86_64.rpm 5a93eec6b35977c58c875613b92ed09b42bc27cb2eb4904ea10940d44d62c2a5 gcc-toolset-9-libquadmath-devel-9.2.1-2.3.el8.x86_64.rpm bd26ee22d060d9ee6192c90c62f30dbc3da18d7fc0bf97867b0bdda1073eaa3c gcc-toolset-9-libstdc++-devel-9.2.1-2.3.el8.x86_64.rpm 570fbb1b45eab5c8de6c14aeeff538333e7371d623995835b217f9610f34d7c8 gcc-toolset-9-libstdc++-docs-9.2.1-2.3.el8.x86_64.rpm 1d38b3f8d8083cf36b97b69d488f9ac7ce837515bb65131f765f41e6eec0467d gcc-toolset-9-libtsan-devel-9.2.1-2.3.el8.x86_64.rpm 37ce964fb081c4109ae2dbc90a7965e1c56184fb7fdfec030c1ceae70f19515e gcc-toolset-9-libubsan-devel-9.2.1-2.3.el8.x86_64.rpm 2a65df9b0cbd1661ed2deed9c0b23fe54fba4830823ffde1f5458fad3f95dcab RLBA-2020:4857 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * nsslapd-db-locks patching no longer works (BZ#1882472) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * nsslapd-db-locks patching no longer works (BZ#1882472) rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLBA-2020:4859 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443) rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:5097 eclipse:rhel8 bug fix update Eclipse is an integrated development environment (IDE). The metadata for the eclipse:Rocky Linux8 module has been updated to remove the following unused profiles: c everything To check whether you have the obsolete profiles installed, run: # yum module list eclipse The installed profiles have the [i] indicator next to their names. To ensure the eclipse:Rocky Linux8 module contains the correct metadata, remove the unused profiles and reinstall the module with the java profile: # yum module remove -y eclipse # yum module reset -y eclipse # yum clean all # yum module -y install eclipse:Rocky Linux8/java To install the eclipse:Rocky Linux8 module from scratch, use the java profile: # yum module -y install eclipse:Rocky Linux8/java Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for eclipse-emf, eclipse-ecf, apache-commons-compress, hamcrest, opentest4j, xz-java, google-gson, glassfish-el, icu4j, xmlgraphics-commons, jsch, felix-scr, apiguardian, junit, glassfish-jsp, lucene, jetty, junit5, apache-commons-jxpath, eclipse, univocity-parsers, xml-commons-apis, felix-gogo-command, sat4j, batik, felix-gogo-shell, glassfish-annotation-api, jzlib, glassfish-jsp-api, objectweb-asm, felix-gogo-runtime, glassfish-servlet-api. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Eclipse is an integrated development environment (IDE). The metadata for the eclipse:Rocky Linux8 module has been updated to remove the following unused profiles: c everything To check whether you have the obsolete profiles installed, run: # yum module list eclipse The installed profiles have the [i] indicator next to their names. To ensure the eclipse:Rocky Linux8 module contains the correct metadata, remove the unused profiles and reinstall the module with the java profile: # yum module remove -y eclipse # yum module reset -y eclipse # yum clean all # yum module -y install eclipse:Rocky Linux8/java To install the eclipse:Rocky Linux8 module from scratch, use the java profile: # yum module -y install eclipse:Rocky Linux8/java rocky-linux-8-x86-64-appstream-rpms__eclipse eclipse-ecf-runtime-3.14.8-1.module+el8.6.0+852+cc16a686.noarch.rpm c022be04f3a9c9808a10c02968cbfad7d42d3473797331752a61c36e9f5df38d apache-commons-compress-1.20-3.module+el8.6.0+852+cc16a686.noarch.rpm 54bfab89adfcbe6ce45d011bbe815251a7e087859fdd4c2d5f536f8d51d5e676 apache-commons-jxpath-1.3-36.module+el8.6.0+852+cc16a686.noarch.rpm f86dbab30d8a81766e5b614494bf372c3358398fbc913031eaa2df32ca51a98c apiguardian-1.1.0-4.module+el8.6.0+852+cc16a686.noarch.rpm 5d211569920bca4c30624745f955ff8bb888c78200e7674a26f12cbbe6d7a7b9 batik-css-1.11-6.module+el8.6.0+852+cc16a686.noarch.rpm da439b9e2feb947a1039d1249cf8fd29dc56b40c6eec7e458362a0602f2ed1fe batik-util-1.11-6.module+el8.6.0+852+cc16a686.noarch.rpm 5f697a0c964fe55f1d8c7c5655b764a9323861b69f575ddc75335619dd51e153 eclipse-ecf-core-3.14.8-1.module+el8.6.0+852+cc16a686.noarch.rpm 2b6551f4c6b7faaed75e686870d2f34566048ba7b7c28180acd0eb4a005a927d eclipse-emf-core-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm b3a066be91f18606ed687f9bc6a0295754810ab521913ddbdb79114c6614007b eclipse-emf-runtime-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm b50f7f15849c846af7d0ebd29c7ecef6b8b10b2651d79b07b8fd71bf83bbbdcb eclipse-emf-xsd-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm 1b1a18ff22c0353c2cf27275beed2ef81d55df5c803e20ffe3a755189a7842e5 eclipse-equinox-osgi-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm d2fc4ee364038cff7ca2fd9d5ee324b3c2917c8fe19f9cc2c8567cd2f22d68d0 eclipse-jdt-4.16-7.module+el8.6.0+852+cc16a686.noarch.rpm 5cbeeaa9ea911616176c976c1265f58a41c1a6fa776387cbfb86a60befcb8e3c eclipse-p2-discovery-4.16-7.module+el8.6.0+852+cc16a686.noarch.rpm 832cfb689a483c8454b46af419ab5f821a07e33fb1fb7938e3e036b4792f574b eclipse-pde-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm e10fa2a6f9fa5bd832b102474a5e56e30a3f43d529b0c610afb1d4b7bb272091 eclipse-platform-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm bc48bd19edd1e7cb1f3ec77432a3488c3d0fc897a67b72901bbc18ededf5238e eclipse-swt-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm 31b6d7f61a6397a5649ab93a070546075d19c7184e8349b5d3925158645bcf0e felix-gogo-command-1.0.2-11.module+el8.6.0+852+cc16a686.noarch.rpm 3a93e517847fc4c81b5402a07e4c56c29a8c429f4b334248479f369a995defb1 felix-gogo-runtime-1.1.0-7.module+el8.6.0+852+cc16a686.noarch.rpm a4a5f3b3ea3511eba6cf5291235c22ad00ac5b1c9cf635aa261f3e95ca3a4b82 felix-gogo-shell-1.1.0-5.module+el8.6.0+852+cc16a686.noarch.rpm 273ada9d85f59f99df697c94156dfafff6195c3c1b944dd886ea8cbc9089628e felix-scr-2.1.16-6.module+el8.6.0+852+cc16a686.noarch.rpm 8a67a0b3d084db0b4858321e5367fd991c1006d9db50224dee1eccccd37b31d0 glassfish-annotation-api-1.3.2-3.module+el8.6.0+852+cc16a686.noarch.rpm 703801e1ebfbf2db9652d0e01533b90244de682d93ef14a85747d96dce45f2e9 glassfish-el-3.0.1-0.14.b08.module+el8.6.0+852+cc16a686.noarch.rpm 294ccea2bf1e4ec3b1b5b22c72ecf1a7048c8fe4c788505268a3af11ba76b75a glassfish-el-api-3.0.1-0.14.b08.module+el8.6.0+852+cc16a686.noarch.rpm 8a4b2147c1e2c48ef79b28849c2d9abc2769916b4fd64e099cd7ba76ac6796b0 glassfish-jsp-2.3.4-6.module+el8.6.0+852+cc16a686.noarch.rpm 10ded3bb70fe97a33665f35d93b110af72549dd1674201c1e1e6960274dd0f9f glassfish-jsp-api-2.3.3-3.module+el8.6.0+852+cc16a686.noarch.rpm bc5159d48df06a63a147b1450232276cce31f41119248e7121434841525da050 glassfish-servlet-api-3.1.0-19.module+el8.6.0+852+cc16a686.noarch.rpm 701cd9989836037d2351416166746d199bc27a961975abf1abb1cc0d97d0dc97 google-gson-2.8.6-5.module+el8.6.0+852+cc16a686.noarch.rpm ec905915ae8d0fb45e77a70ed2b5c7d59141cf8d29ca5d4bc117d43a0e02caac hamcrest-1.3-29.module+el8.6.0+852+cc16a686.noarch.rpm d6961beb16096fc8cb043926865610afff28b8fdafb441480c952309f869cd28 hamcrest-core-1.3-29.module+el8.6.0+852+cc16a686.noarch.rpm bd758285f531c699073d64dc1dcd91de9c2deef1a8b88c8d6b9b0009cf42e909 icu4j-65.1-3.module+el8.6.0+852+cc16a686.noarch.rpm 1102f0b1275d7fb89dfe91af7698838927cad6378d87a0d272191a1b5c76c477 jetty-continuation-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm 1ebf769924a1d9310ca1f47b0f720c1c6bde93c19055d6e09816b89e17b2b2df jetty-http-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm d9fa84fc32ac55b4005d61f55f6cfd28974fa961d72ea798f98279edb0bb1cec jetty-io-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm 67bb386c7e94198c7e2fefd9010c2ceccb7fa4c3bec027a3a2b24c9a79881138 jetty-security-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm df6da93a9ad6b422e86060bb2f8f8713a14ee85b3da39af0f927c66a6a97f3d9 jetty-server-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm 0b79315d24eaebcc30dca6cc7836435fc6e9a763dda48220673362ee6f7fba13 jetty-servlet-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm 376d8d54e05c2c59ee805427c69859d645be3bb6389e729442048883c4297f79 jetty-util-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpm 2df8425fa30d85dfbc2cacbb99daf67b2cb1fc3b1528317a3e33edcf1b91de79 jsch-0.1.54-12.module+el8.6.0+852+cc16a686.noarch.rpm 7819f4825e0e1f5032ab3e830b2c31378c99d173ee5206e97fef9f6ae4815728 junit-4.12-14.module+el8.6.0+852+cc16a686.noarch.rpm 50c7ed83373b39becd030cabb7e8642e8b93a989c430c90f5c020cd1f22fa9a2 junit5-5.6.2-2.module+el8.6.0+852+cc16a686.noarch.rpm ffd97d82955713cbd27bcb1bad226bde853980b08c2e17bf773197129d7ae5ff jzlib-1.1.3-14.module+el8.6.0+852+cc16a686.noarch.rpm cde0e8f72aa6bb0e3e6c6e7dd8ab9b35ea357cdc3a28e0cc42f0e2f5e4445ed8 lucene-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm ac562d24219b7f6b075948e8072ce4ba1bc9f0ca70b7eded84210533a0216c96 lucene-analysis-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm dc5759041513365440d1d204e578a501c3348c7743ebeefdc90b630b79ec89cf lucene-analyzers-smartcn-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm 534c30d5d86143f31e6a43397c6186e5e78bf4f992931961a83c163835cd1d0e lucene-queries-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm 0bdc59a0ed4e582d7aacf63768889696c7d641ddc5ea73c76a5bb9c6de78d99b lucene-queryparser-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm 60af65c5e33288467ff96fad195a11970029e1eb172057c9a2aa7e91692264e1 lucene-sandbox-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpm ac1f7779560a51e86dc69919dbba3140a4f9d91f5cbffc29dc6aa76c2cb58c35 objectweb-asm-7.3.1-3.module+el8.6.0+852+cc16a686.noarch.rpm 280c6e526eee27c056bd66c775913d3de25276626fda634b0f8ba5b5286da26f opentest4j-1.2.0-2.module+el8.6.0+852+cc16a686.noarch.rpm e69408548274dcfc21b005ea1337e165ebbc8a777fc7ec9c82bfca624a6f5938 sat4j-2.3.5-19.module+el8.6.0+852+cc16a686.noarch.rpm 7073d09ef3cf849d253baa77593bf149a7bc31e812bd32e2a10134ad09e3106c univocity-parsers-2.8.4-3.module+el8.6.0+852+cc16a686.noarch.rpm 9f94b2b287f91b1e3d4644a0e833a0e4728c72aebf417e1ce52cb2e174f2db62 xml-commons-apis-1.4.01-31.module+el8.6.0+852+cc16a686.noarch.rpm 567ab7f5f432d4366046a8eae2d10cad1ebc1a13e9185e28fbc2a4f6d697b91b xmlgraphics-commons-2.3-4.module+el8.6.0+852+cc16a686.noarch.rpm 3cc01663d6dbea331c9ced9b6a39e51a422ebd9885ac3493706053a07c8fac68 xz-java-1.8-8.module+el8.6.0+852+cc16a686.noarch.rpm f420a85d668422c1ee2dc1ffdc2aaaa04fc56e00bab58225e378bfbed3b908a8 RLEA-2020:5101 nodejs:14 bug fix and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.15.0). (BZ#1891809) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.15.0). (BZ#1891809) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2020:5393 Important: libexif security update The libexif packages provide a library for extracting extra information from image files. Security Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libexif. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libexif packages provide a library for extracting extra information from image files. Security Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libexif-0.6.22-5.el8_3.x86_64.rpm e54c3df642c1d98430f783e10d314adeddf2ebab3fdf4a2da274af4a91f9980f RLBA-2020:5494 virt:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2020:5496 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898204) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-podman-api, libslirp, toolbox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898204) rocky-linux-8-x86-64-appstream-rpms__container-tools libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 RLBA-2020:5497 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898251) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898251) rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:5498 container-tools:1.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996 containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051 RLSA-2020:5499 Moderate: nodejs:12 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * yarn install crashes with nodejs:12 on aarch64 (BZ#1901045) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * yarn install crashes with nodejs:12 on aarch64 (BZ#1901045) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:5500 Important: mariadb:10.3 security, bug fix, and enhancement update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086) Security Fix(es): * mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180) * mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938) * mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760) * mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) * mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765) * mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789) * mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009) * Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017) * Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021) * There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086) Security Fix(es): * mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180) * mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938) * mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760) * mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) * mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765) * mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789) * mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009) * Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017) * Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021) * There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077) rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLSA-2020:5503 Moderate: mariadb-connector-c security, bug fix, and enhancement update The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases. The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993) Security Fix(es): * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Code utilizing plugins can't be compiled properly (BZ#1899001) * Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005) * Replace hard-coded /usr with %{_prefix} (BZ#1899099) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mariadb-connector-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases. The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993) Security Fix(es): * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Code utilizing plugins can't be compiled properly (BZ#1899001) * Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005) * Replace hard-coded /usr with %{_prefix} (BZ#1899099) rocky-linux-8-x86-64-appstream-rpms mariadb-connector-c-3.1.11-2.el8_3.x86_64.rpm 7e41a8173ee09b353a8e2052e6802488223928a6d840b765406606930b400d3a mariadb-connector-c-config-3.1.11-2.el8_3.noarch.rpm a766f0f5d7ca81d2cf761edfe23b15e847daca41579928bf6789f950478d3f41 mariadb-connector-c-devel-3.1.11-2.el8_3.x86_64.rpm 9a0ce0a6e724517550bd10188dc247491765bd5ecb774d0b160185951ea4186d RLSA-2020:5620 Important: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.5). Security Fix(es): * postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) * postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) * postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349) * postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350) * postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696) * postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.5). Security Fix(es): * postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) * postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) * postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349) * postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350) * postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696) * postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:0507 Important: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a RLSA-2021:0531 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for udica, toolbox, python-podman-api, libslirp, oci-seccomp-bpf-hook, slirp4netns, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2021:0542 virt:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * qemu-ga aborts after guest-shutdown command (BZ#1900578) * Report logical_name for disks without mounted file-system (BZ#1913818) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * qemu-ga aborts after guest-shutdown command (BZ#1900578) * Report logical_name for disks without mounted file-system (BZ#1913818) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2021:0546 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec is fragile in the presence of signals (BZ#1913294) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec is fragile in the presence of signals (BZ#1913294) rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2021:0547 idm:DL1 bug fix and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * IPA WebUI inaccessible after upgrading to Rocky Linux 8.3.- idoverride-memberof.js missing (BZ#1895910) * IPA should handle situations where krb5 library breaks FAST armoring with referrals (BZ#1914821) * ipa-kdb: support subordinate/superior UPN suffixes (BZ#1914823) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * IPA WebUI inaccessible after upgrading to Rocky Linux 8.3.- idoverride-memberof.js missing (BZ#1895910) * IPA should handle situations where krb5 library breaks FAST armoring with referrals (BZ#1914821) * ipa-kdb: support subordinate/superior UPN suffixes (BZ#1914823) rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2021:0548 Moderate: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.23.1). Security Fix(es): * libuv: buffer overflow in realpath (CVE-2020-8252) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-dot-prop: prototype pollution (CVE-2020-8116) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * npm: sensitive information exposure through logs (CVE-2020-15095) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.23.1). Security Fix(es): * libuv: buffer overflow in realpath (CVE-2020-8252) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-dot-prop: prototype pollution (CVE-2020-8116) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * npm: sensitive information exposure through logs (CVE-2020-15095) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2021:0549 Moderate: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3). Security Fix(es): * nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746) * nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3). Security Fix(es): * nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746) * nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2021:0551 Moderate: nodejs:14 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.15.4). Security Fix(es): * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * yarn install crashes with nodejs:14 on aarch64 (BZ#1916465) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.15.4). Security Fix(es): * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * yarn install crashes with nodejs:14 on aarch64 (BZ#1916465) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2021:0611 Important: xterm security update The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. Security Fix(es): * xterm: crash when processing combining characters (CVE-2021-27135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for xterm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. Security Fix(es): * xterm: crash when processing combining characters (CVE-2021-27135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms xterm-331-1.el8_3.2.x86_64.rpm 8629d4e72f706d5517709ad3bda5acb21001ae8d719e4d50edd8e45677061939 xterm-resize-331-1.el8_3.2.x86_64.rpm 15a174cdbba3b93c9dc25350b13385951de4f8bfd22f0732527728a6489d1ab0 RLSA-2021:0705 Important: container-tools:1.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, podman, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996 containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 podman-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.x86_64.rpm c2d84d68508ad6a5f13e002fde9bec2a1b8c4b11d90b1ba7a17f20ddaabba31f podman-docker-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.noarch.rpm be8182cafbea4dc23e96a23c5ba0369a54ad19f7e5343dc0d03b309e85a126e0 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051 RLSA-2021:0706 Important: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2021:0711 Important: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2021:0734 Important: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.21.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.21.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2021:0735 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.24.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.24.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm 870dbeeaa5f7b37574e9275de98cdf81fe4768b2e22737876605f8fce22d1d4c nodejs-devel-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm c3f560c1c3539be8785136e74c3969d7292b4c337141423871baebd523d85d05 nodejs-docs-10.24.0-1.module+el8.3.0+101+f84c7154.noarch.rpm 14e41f41751e32d29c7dcb89d504e776e064e7d3871dc2342d38c7a933043bda nodejs-full-i18n-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm 536c12bcc471e7a975674aa3218f437ff0a4809a85c370211d73636e743586a2 nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c npm-6.14.11-1.10.24.0.1.module+el8.3.0+101+f84c7154.x86_64.rpm 485c30db6030bf7e9220026a983a18c9fc0f551ef4428a43a06bf7e12f40f28b RLSA-2021:0744 Important: nodejs:14 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.16.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Node.js should not be built with "--debug-nghttp2" (BZ#1932427) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.16.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Node.js should not be built with "--debug-nghttp2" (BZ#1932427) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2021:1064 Moderate: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2021:1083 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * IPA krb5kdc crash possible doublefree ipadb_mspac_struct_free finish_process_as_req (BZ#1930562) * krb5kdc is crashing intermittently on IPA server (BZ#1935146) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * IPA krb5kdc crash possible doublefree ipadb_mspac_struct_free finish_process_as_req (BZ#1930562) * krb5kdc is crashing intermittently on IPA server (BZ#1935146) rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2021:1242 Important: mariadb:10.3 and mariadb-devel:10.3 security update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32). Security Fix(es): * mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for Judy, asio, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32). Security Fix(es): * mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLSA-2021:1744 Moderate: sane-backends security update Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers). Security Fix(es): * sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sane-backends. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers). Security Fix(es): * sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sane-backends-1.0.27-22.el8.x86_64.rpm 5e51281735365b78c5cbb2bbe580ee627ef9a0ae9ed491a174ac15ed7e1da50d sane-backends-daemon-1.0.27-22.el8.x86_64.rpm ceaf43c39768dac95eb46f0c8166d80385b70b64c8f6900324817b15a7aa0490 sane-backends-devel-1.0.27-22.el8.x86_64.rpm a1898f7f84202652fda3328dd7abd4d6911caf62e4ec05b986b7efaa5aa59d7c sane-backends-doc-1.0.27-22.el8.noarch.rpm c2bca9ba6c3a187210c85521c811eb69c39a4b34188789c94692f4214e0a1655 sane-backends-drivers-cameras-1.0.27-22.el8.x86_64.rpm 045035fcd28fbb83cdb665d99a12c262bcf93a7e87a5ab5d99e3bcc0f1bcf762 sane-backends-drivers-scanners-1.0.27-22.el8.x86_64.rpm ec81145a169e319c4f5c82274b1ea767ccb99c973dbcd485411b6440d7778381 sane-backends-libs-1.0.27-22.el8.x86_64.rpm c2b80bcdde2d92bd159c033a77ce66cc8d9f95806e9de209b0385687015152f0 RLBA-2021:1750 gcc-toolset-10 bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-10.1-0.el8.x86_64.rpm b41ee01dd7669723b7e624b20313163c16c5633aa7d28697fb3fa72db8b71591 gcc-toolset-10-build-10.1-0.el8.x86_64.rpm 75a25a624fe30073ba1da3f72beb62f9551eb7c38445413b12b60a277b5b5d4b gcc-toolset-10-perftools-10.1-0.el8.x86_64.rpm 4c6d56bfe9f684c0ce47de8a93043c9ec80f2a9b7d744437cb2b2483200e4d53 gcc-toolset-10-runtime-10.1-0.el8.x86_64.rpm 1c11a36181256ffb06b52d4113d396f293cfeae3868e24ea1de0aa32c0f4956d gcc-toolset-10-toolchain-10.1-0.el8.x86_64.rpm 3e9e18f10a85bdd93f24a817f8542eb818dd91aeb8123100575fa003acf19600 RLEA-2021:1755 new module: swig:4.0 The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces. This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for swig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces. This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__swig swig-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm 981d26677e3dda23830d9a31a22c7539f8ebf6475f390baa98cd3bac058bd1cb swig-doc-4.0.2-3.module+el8.4.0+386+8a292e6f.noarch.rpm 5468f8ba21746e1be94f3d85d8a6366e88bf3a51e140c301eb5cd7464f503fba swig-gdb-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm 7a5380ac73c17d68a5dc97bb6f0994cc912e393577365c784590b0755da0fa9a RLBA-2021:1760 libmpc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libmpc-1.1.0-9.1.el8.x86_64.rpm 4fbf751702394211896af9f253ad2f38c80f603e007a7c9ed2b9c8e5d97f2f95 libmpc-devel-1.1.0-9.1.el8.x86_64.rpm 256386b3cbf600bf2f9652c6ad57f47d5a7eac2125f6839b8348782389e2166f RLSA-2021:1761 Moderate: python27:2.7 security and bug fix update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm 6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91 python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9 python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326 python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm 5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543 python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLSA-2021:1762 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637) * QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) * QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707) * QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916) * QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637) * QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) * QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707) * QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916) * QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2021:1765 brltty bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for brltty. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms brlapi-0.6.7-32.el8.x86_64.rpm e12574dee65b73eb727b9e01f250aa5dda6f37ae78942daf3a7b3093f577bc17 brltty-5.6-32.el8.x86_64.rpm 7a8d74532ca43c68bec2e24920147afd39fbf8f1cb4af2439607de08467a9d96 brlapi-java-0.6.7-32.el8.x86_64.rpm b6eb6ab93760a709036f0da60c7c2da0b04a2ebc688437f611675024f5e4d852 brltty-at-spi2-5.6-32.el8.x86_64.rpm 7fad2f8c334c754975b00ac6481305ca9cf9a1a80ebe8e12e7a2e32f920fa9be brltty-docs-5.6-32.el8.noarch.rpm 5ec25c600859daf510d637ea02a0e14ce5d78362ecc8de1f57abc300280210a5 brltty-dracut-5.6-32.el8.x86_64.rpm d18672cc32943d29dce0be6c093f255aab4ba4b612dba80c8e7256d32cf0b7ee brltty-espeak-ng-5.6-32.el8.x86_64.rpm f8ef16ebeb5f499bb8ba362db96463d6fbc232a14188c3efae23ea6feaae2d78 brltty-xw-5.6-32.el8.x86_64.rpm 57b0c4f00d1a4a54b33808f910b57a29a3d00a6fd935e687a5830cd1249f5ba6 python3-brlapi-0.6.7-32.el8.x86_64.rpm 1f5637a51db2115ff4beaae2634252f34f975843dca3a4d92bf4b820694bb945 tcl-brlapi-0.6.7-32.el8.x86_64.rpm 25f5045a9611b5dadf55e0a53cdda928a83646f164b2959a691e3fcd5b7601e9 RLSA-2021:1775 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm 20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 resteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpm 92ea72f7a67d5de0fb940e1cbbc36752c56f02d056915d35be500fe51e146e6e slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLEA-2021:1779 libreoffice bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liborcus, libnumbertext. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libnumbertext-1.0.6-2.el8.x86_64.rpm a297230b7871a750b88dd9575330532e0fc2838a6fd8e7d8029ba41b3fc6e939 liborcus-0.15.4-2.el8.x86_64.rpm 27d2c59c48323cd4c572039cef4f9b81e05942efccc961cd33181196a2d3125b RLSA-2021:1789 Moderate: gssdp and gupnp security update GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP. The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928) Security Fix(es): * hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gssdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP. The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928) Security Fix(es): * hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gssdp-1.0.5-1.el8.x86_64.rpm 1140c0c9c62164c69a64b232db2eaca5c7dd1108b68dff7132b272a03c5fc8e1 RLBA-2021:1790 ibus-libpinyin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-libpinyin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ibus-libpinyin-1.10.0-2.el8.x86_64.rpm e8de7254d89399e087915d093fef05c3d7cf5c65687022d163dca69a85aeee28 RLBA-2021:1793 pyOpenSSL bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pyOpenSSL. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pyOpenSSL-19.0.0-1.el8.noarch.rpm 1cf5962508446261b2aa4b02dd687be8bb82191c25494216ea605e8af1931511 RLSA-2021:1796 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652) * podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652) * podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2021:1799 telnet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for telnet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms telnet-0.17-76.el8.x86_64.rpm 4bf95fac7aa4068028dc381f349f63c0c3778dc88197f1dd53e01ac40a6bd400 telnet-server-0.17-76.el8.x86_64.rpm f32edb8ceee19d8ba7b45a00c385f9f77c4270bf44afbd8dd286299cee31d95c RLBA-2021:1801 libgpod bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgpod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgpod-0.8.3-24.el8.x86_64.rpm 4fe6a1855a14fce2d8c15ecfa8f5fbf3bfa75c0e36bb9d520e78153e6b0deb20 RLBA-2021:1802 gnome-bluetooth bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-bluetooth. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-bluetooth-3.34.3-1.el8.x86_64.rpm 4405d99a81e84ec9f506c2d02a2c79c505575f721d5c97f8bf604112c4fea8f6 gnome-bluetooth-libs-3.34.3-1.el8.x86_64.rpm b61617cb2c800149a772cf9143bb5d8f50961534802606e8513c654dea7ac39c RLSA-2021:1804 Moderate: userspace graphics, xorg-x11, and mesa security, bug fix, and enhancement update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips. The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655) Security Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) * xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) * xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) * xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) * xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362) * libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363) * xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) * libX11: Heap overflow in the X input method client (CVE-2020-14344) * xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libwacom, xorg-x11-drivers, libX11, mesa, libinput, libdrm, libglvnd, xorg-x11-server, egl-wayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips. The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655) Security Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) * xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) * xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) * xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) * xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362) * libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363) * xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) * libX11: Heap overflow in the X input method client (CVE-2020-14344) * xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xorg-x11-drivers-7.7-30.el8.x86_64.rpm 4feb07c0b7dba12f36983fcf2eddfce96c747e61b92cb8833a148ca1ac4fadea RLBA-2021:1807 gcc-toolset-10-dyninst bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-dyninst-10.2.1-2.el8.x86_64.rpm 3628ca20014ba600e2deef311adf1f3ecaf8b169ea290d3c1755ad6781b2cc37 gcc-toolset-10-dyninst-devel-10.2.1-2.el8.x86_64.rpm 36ec6e021428699304c0fb462d494018b6d8d7da984f0f9e667fb4c32301f224 RLSA-2021:1809 Moderate: httpd:2.4 security, bug fix, and enhancement update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199) * httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984) * httpd: mod_http2 concurrent pool usage (CVE-2020-11993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199) * httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984) * httpd: mod_http2 concurrent pool usage (CVE-2020-11993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLEA-2021:1810 micropipenv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for micropipenv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms micropipenv-1.0.2-1.el8.noarch.rpm 19d23dbe8b285e8459e8800558fc7de59bb5a0eb39d8bfceabe5f47144a30bf7 RLSA-2021:1811 Moderate: libvncserver security update LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Security Fix(es): * libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247) * libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839) * libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397) * libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405) * libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libvncserver. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Security Fix(es): * libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247) * libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839) * libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397) * libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405) * libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvncserver-0.9.11-17.el8.x86_64.rpm 38ec5ff34fff0a426bd377186afed28a8370441f300af098d5959601147d09e5 RLEA-2021:1813 new module: subversion:1.14 Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a RLEA-2021:1816 perl-IO-String bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-IO-String. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms perl-IO-String-1.08-32.el8.noarch.rpm eb31671c09bc2bfbbca872cfa92a2b1caa57f1b96303b803d68fcb056e75f241 RLBA-2021:1821 spice-gtk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-gtk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-glib-0.38-6.el8.x86_64.rpm 8814c47eecaee1eb462199f94515b93833c611c26882e152ee257b84561fda60 spice-glib-devel-0.38-6.el8.x86_64.rpm b2a4d27b80d27dd2f8ab8f6d3d7de0a8878a0a2bb570e31d5aa635e91fcdad9e spice-gtk-0.38-6.el8.x86_64.rpm 7285e6a3292af38d0e24d515af5ec6e1976068c7ff14d5af58ac5f7df6568595 spice-gtk3-0.38-6.el8.x86_64.rpm 315f85dd0f0494fb42a94a3e50c518cdbd386dd5908f4b48a38931ab7a3986de spice-gtk3-devel-0.38-6.el8.x86_64.rpm 498331b3d6a778df41e04336354773e88f2ba3290e41831b2bd61d8b9c41ded8 spice-gtk3-vala-0.38-6.el8.x86_64.rpm fd440611163373050491b18223548fab12a21cfee52f2f7faba5b3e7fb09064e spice-gtk-tools-0.38-6.el8.x86_64.rpm 373e38bdff58b36b689e94de258778b07d44f14f84782355d57ec8caa4613cbd RLBA-2021:1822 perl-Time-HiRes bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Time-HiRes. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms perl-Time-HiRes-1.9758-2.el8.x86_64.rpm fae5102e437c83981a9c6cc1d957462bd4010e059ccd92d0c1542e6560ef1950 RLEA-2021:1831 gcc-toolset-10-strace bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-strace-5.7-2.el8.x86_64.rpm 43d2c8d98a0bc67d2b039967dd91195256aeec6f5f648b9f7e04d9ad4257ad03 RLEA-2021:1833 mod_security bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_security. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_security-2.9.2-9.el8.x86_64.rpm 0c307e12c65d00832938f7676bf9fc204db744eb8e48f310c4e68081de76dbd3 mod_security-mlogc-2.9.2-9.el8.x86_64.rpm 128c0e3b588c755cef6a9d74bdd9c11825e59a97461e23b94433ddab38d58c45 RLEA-2021:1834 nginx:1.18 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e RLBA-2021:1837 liblangtag bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liblangtag. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms liblangtag-0.6.2-8.el8.x86_64.rpm b2f6701fa925b087b454fb00b152cc3adad415d88a9fea28b0c6c401ace72688 liblangtag-data-0.6.2-8.el8.noarch.rpm 4769f05ed11e855cede6d77a472b2f56dd2eb51ff9a9695a26fd7f84bd4154b3 RLBA-2021:1838 libcanberra bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcanberra. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libcanberra-0.30-18.el8.x86_64.rpm 4250c90196fa1fd761ad985adfe702647b4a990829e33cd2bce7ad81007b4323 libcanberra-devel-0.30-18.el8.x86_64.rpm a9ba387d2876731c26bc4ff6b1f0588a29e01026140c4acccaacc68a425386aa libcanberra-gtk2-0.30-18.el8.x86_64.rpm 9ec58605dea28c7136b0236c5b5424e4cad7aa447a3cb68d4f5564888602f555 libcanberra-gtk3-0.30-18.el8.x86_64.rpm 58d60f6bc91fced10e23f0a37df0111e13e2ec2a652a1a279add5a6e3efa1d35 RLBA-2021:1839 gcc-toolset-10-systemtap bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-systemtap-4.4-5.el8.x86_64.rpm e54a70603f27c83eeee3ee144153296da6bc730668054187f5ebdaff9e0debdb gcc-toolset-10-systemtap-client-4.4-5.el8.x86_64.rpm e664a7166e068b4d3b709249791c6b20b15051277c3083910b1502a01a12cf58 gcc-toolset-10-systemtap-devel-4.4-5.el8.x86_64.rpm d124fe2423d1228e188491c9bd7056694ebd565b0e51d1a7d0834d802ab5165f gcc-toolset-10-systemtap-initscript-4.4-5.el8.x86_64.rpm 729435248b1ada8434729f638aad21d44a20d8a87be08562135321b98fa6ad89 gcc-toolset-10-systemtap-runtime-4.4-5.el8.x86_64.rpm 33863b7b3220086746258bafcbfbf167083e8b8c3ad5ef3fc1adc01dde3be385 gcc-toolset-10-systemtap-sdt-devel-4.4-5.el8.x86_64.rpm 7ef4e54e7fa1203cedfee393041404380e0265875b7741aea76f9774327d19d9 gcc-toolset-10-systemtap-server-4.4-5.el8.x86_64.rpm ca4d199fda08c1e62e16fa7241b51d80bb7dddffad0cb5dd804650c8320dfc88 RLSA-2021:1842 Moderate: raptor2 security and bug fix update Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples. Security Fix(es): * raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926) * raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for raptor2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples. Security Fix(es): * raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926) * raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms raptor2-2.0.15-16.el8.x86_64.rpm 1a7d901ba0d259189d3b83ebcfa33ee04cae242c19cb181b4bb78eecb0dccebe RLBA-2021:1845 sblim-sfcb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-sfcb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-sfcb-1.4.9-17.el8.x86_64.rpm bec650953f943da05bbb7c5a90fe7178c22bc66e6db00e29ceba86089732a1b3 RLSA-2021:1846 Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2021:1848 dconf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dconf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dconf-0.28.0-4.el8.x86_64.rpm 7b50268254a1a308f2ee2dc13783603d8da3a3e4d9723cca8d541007241c59d3 RLEA-2021:1850 jbig2dec bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jbig2dec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jbig2dec-libs-0.16-1.el8.x86_64.rpm b203ea84fb770705d42348816339f0b0ddb3c560f7a841dfe05bdfb5fd6640ee RLBA-2021:1858 sendmail bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sendmail. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sendmail-8.15.2-34.el8.x86_64.rpm 156730e9c4db72ebfaa54b95a87e07bffd94526da024db5dc2f961cfeac0754c sendmail-cf-8.15.2-34.el8.noarch.rpm a36f63c459f7aac2720ead056105802702f9e10a2f6a49721fd404d7dabc53bc sendmail-doc-8.15.2-34.el8.noarch.rpm 758ce1efd92433ff8b87228a7af6a2f0e0d4575508f86ef0c6500a338dc5714a sendmail-milter-8.15.2-34.el8.x86_64.rpm f02eef48d7b4802656658b8f9819d4a5d67ae1e70d46d05edd9ba2e3923588ab RLEA-2021:1861 pyodbc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pyodbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pyodbc-4.0.30-2.el8.x86_64.rpm db4d19f991a354d7c95135bd0ebdbf85b54294a154c87ba75dc929d799ae1227 RLBA-2021:1863 icedtea-web bug fix and enhancement update migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for icedtea-web. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java rocky-linux-8-x86-64-appstream-rpms icedtea-web-1.8.4-4.el8.x86_64.rpm feaac8dd236c1cb26df3883f0a87cda23e6adf12a883130ccb4bd258038f34ec icedtea-web-javadoc-1.8.4-4.el8.noarch.rpm 6169d567421f91ec5a71fbf28bbbca94ad61dda8421dbe60bdd1a3920fd5aa10 RLBA-2021:1867 targetcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for targetcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms targetcli-2.1.53-2.el8.noarch.rpm 5a7a8a86a342614db2b0e1b7a9e0f5fad7d96bc88b5698cc8f35972040ad4b48 RLEA-2021:1869 new module: postgresql:13 PostgreSQL is an advanced object-relational database management system (DBMS). This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLBA-2021:1871 perl:5.30 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl perl-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm be39133cd5aa9bfd0ce8ff6128a31858f7907ce317762fd852affb340341cfaa perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93 perl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm 4ae5d31a58e084256d22b67d1c4a35c947fb7829b40bea49b2ca54e21bda4908 perl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpm 3b4eaea2d1eaf8d161f48a771f08fac793d30846ad09b36883cce5952ff3ad2a perl-Attribute-Handlers-1.01-452.module+el8.6.0+878+f93dfff7.noarch.rpm 8ee59b6f6685970541cb905ef75a3682c077b86ccac773cd7e09161d67cdc0ad perl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpm b5b1b87db685204860ad90cc43b8ee94f9cd71824431bd6a81b8363c5e751e33 perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm ba92a2cb502c3000180f08e99fd70b5fe1d867c629fe7f88ae62e884a805992d perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpm 9f0471053a901dc7d005594d190e10e8c8b2fab6e1e43e8d7962c9abb86b1890 perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm 69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6 perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm ed229dccbc0b92ac2a641e672a1b62281cb7887ad180cf0eb7bf70a72d8190e8 perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 70b3d3861ab9c1695c9bd398d4bd822fed4f52f843ccb34d987b1c72fb6f6190 perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpm 8dac2514b5b2da9f4b0cb4d6e0e5a381eb88a40c888f56643175a0d4e68074d0 perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500 perl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm a3447e3b3260b007272f8c84ef84acb17cb71d37b7880d1ef6357951ac562315 perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94 perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm 37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215 perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67 perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm 49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16 perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm 401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpm 73ba6e41ae0df4855079b75bbf5b2131a5b0fb3f99f0ea9b91ad8812b5df0b02 perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm 847b4fb0ddf80554f9db4f306d9b404f77ff15198af23e1afe2abf866e91117f perl-devel-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 585f8362cf74ed848f3445bed0952f343ac30d51ae393244d5eed738adcadc7e perl-Devel-Peek-1.28-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 067cf2dc67c1e9c5a402034ec3b340e886228a66c99ae15b785109c57ff94161 perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 1da6e17c67943d6d69e57ebd15f72bfa43b6015870fdd338c76b117b2be9f67f perl-Devel-SelfStubber-1.06-452.module+el8.6.0+878+f93dfff7.noarch.rpm 2d5e00575dfa0fbcdaf020a04456459c776b478497f6f122cc4861713aec2e85 perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm 11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f perl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 497e2b909674fed7b47c3dfa281121621efded7d05d019363aff9bfad4c1a527 perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm 457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91 perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm 4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3 perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 7acf6021827fa52dc9a1fcebcb239d23d9096de93e0a6132f0fe4fd541f3f1f2 perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 4189d9a4acaa4add86f0991f50f74e444b59afb872b205e444480c428e247eaf perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 5e8ac50accc1d9281fedfb67c5f38066ac8d9e1237e1d7cc7fbef1e973fb89fb perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm 843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297 perl-Errno-1.30-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 6638a5f0666fb87c5a1b13ca99bd76fdcc01f29f8709d206655e62ea694afcd9 perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm 4e8daf0287ea71e64fdb9e6391f257d9ea6c23547d5894df74a595b3ff610199 perl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm 65b9ba1b7e84507cc648a422475283e27ed53de4097f1ff2121b9f9ff3d97c7e perl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm 043ff366aad10957c32292d322c3458202d739c703261b8cbfd14f58bb5da151 perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm f636b21815be2e444fa5b42e99e4328c024327af776bffaebd9d33825d346be7 perl-ExtUtils-Embed-1.35-452.module+el8.6.0+878+f93dfff7.noarch.rpm e3b71b76d50572759d35712baafd58373b9a07b5610284575d7678294d03c655 perl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm 857b4014bddf434d5e21745f92b52a4f046f666cbbdeade6c4043a1b8796e40c perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm 398bd10b093a537a73d3d0df58d4581b21c67d612279a37b22fd614d23adea17 perl-ExtUtils-Manifest-1.72-438.module+el8.6.0+878+f93dfff7.noarch.rpm 4d1776ec7edef8aa7ef06b53a9ccfe28eb78d28dbac1fcdc0f9826591cff9ba6 perl-ExtUtils-Miniperl-1.09-452.module+el8.6.0+878+f93dfff7.noarch.rpm 5b1840a6605732ecda572a10e704e82201b12a674f49f4e3a78cd9c25c4f5534 perl-ExtUtils-MM-Utils-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm cca7d27dbc8d3bb0f080aecd8c1f15e5164a9d9087bac91fffb21753ea601f17 perl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm d8b1feea37aabbfefe537f9b4b886a095d450334b9fb457ceb469a75d53dcd6c perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180 perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpm fc532cf1d81ed8b642813f397665294f4b8e78cbfa9aaff012563de356187cc4 perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpm 995e08ed28513f82e5821425a4d4fc6edc45ee0a783a1f26eacb6359b3f42e11 perl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm f404d9e30a5f8768ff3926e32b45b0b8334f72e3e92b0e4b25c64e05f727708c perl-File-Temp-0.230.900-439.module+el8.6.0+878+f93dfff7.noarch.rpm 67bff95e50d168699ea7a9ea2ec030daabd312f2aaa5d945ac34f92266216242 perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpm 5094b53d07808bfd255aa5b9a1315ad01f5d1892624a3381074d552d82ed562d perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.x86_64.rpm c8ba40590e844230d1f154071d9e092cb479fa4993a8352a0d9c7b3ed9764e01 perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm 1ff0c6c297133b9629712d61b0751dab739548a09a9ed1a014f89b19e210942c perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm 37fcc7a1a0384d0d2fed35aa935e2249dc65641c6ed36cfbaffb844dce6ea14a perl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpm 78bd8b6bb85141daa4c8a4ed9f292276d00dc3d79511de14a028deda013b6f89 perl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 22f6dae1203f60f7112d8a3bf69f730cca7e92ff26307fa0479297b263a5a853 perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpm 0ee7a2f08d700939b9878147d4a711c27fff146c037bdddd7f4375dfbe632c5d perl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpm 46aa912995002371271894c952f50b8f1fb45fd4afe94a1a0a12708173c5d73d perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be perl-interpreter-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 02d644ab73c948161e823d1c6944f52564dc8d06ecd73bba0b9957295350387d perl-IO-1.40-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 1b5f6a564f11bdb4ceeef49e03cc7b9e8ba622b99a3f74bbda31653a1bbdb1ec perl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpm e1b32c483db01fa644aa11da6316c65ae15c52cdc683702f2724e1bd74c36fc6 perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm 1a865597d7d0da824043c62c50cdd0d3fa02e1f9e1e3420b743a4cffa03d0b4d perl-IO-Zlib-1.10-452.module+el8.6.0+878+f93dfff7.noarch.rpm 274ec5cde7f09867747e7b5a0fe03632ea11a46c12d6795bf72d3347a6737312 perl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm 24140d4b859d7da7b5422b39bb33058cb4ed037ec81a33cb29331d61b8391d36 perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpm 0785aa352684de2b27e973a2414cabfd1f60ff94cb9b1c8f1595b8a773d74ecd perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524 perl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm fcf81923aca881d995501ac6adb0b600d85acbe1e146c92024e96bd92c8adfa1 perl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm b721a1d996c4455e7c4973dbe7740cc31e3f6956124c2b3bd9ad8005c98e5f3e perl-libnetcfg-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpm f9ab6fdfa12dec0592ef9a8b503a9c8211420f0e9dfdecb2d0e31175be92bd88 perl-libs-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 6a2d197b52df3e9e8d372ddb5735269efeda9c3915a22818b5877593cd957617 perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm b642ac31df8f05336d101b3607d855839335742ba4b80652bcd4d19fa8c71b2e perl-Locale-Maketext-Simple-0.21-452.module+el8.6.0+878+f93dfff7.noarch.rpm 5580a081788e52639ea7195fc9dc42a331ddee3c17d8b01dffc8fd4ed8d89078 perl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 1bc02c4b987dcdcba510201debe3955a9fb8212874e3d7ee8342cc5b248dceb8 perl-macros-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm a00992fdb69978b36a93933ab608b73c31c23ad22477d71e2f6a6cd50f576ab6 perl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm d12bc389fea342859c1ce3fa9a6116e31ae66d6225797ed145796ee1d73325d8 perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217 perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14 perl-Math-Complex-1.59-452.module+el8.6.0+878+f93dfff7.noarch.rpm f3417b4d9357bff6b547c14fe045cbf57152240481737d1e6bb38bb7d13d5dca perl-Memoize-1.03-452.module+el8.6.0+878+f93dfff7.noarch.rpm fece125172c411eab99d0801c835b1713860fce7cd859cc8e385a52c9d08e88d perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3 perl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpm df5dd4eb3e9897dba7b9d45123b567b21f33f83fe70141c3ed2fa6132d619c82 perl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm 20d8397c0ab7ad88baf463277dd8fc673e094ea05a4adda02fa0f692ff6374c1 perl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm cc8295684213d6c1f1b9bd7f25a88b9621fce85560e9a719a32121cb3b762361 perl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpm ad836cedbb118144fbb29c1adacf8745b0be196bed0e7c20a7918df0c7632327 perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpm 1d281d8bb79c2f3a7f8e8245faeac9d5381e450515d7e510b4bbf8f9313205e0 perl-Module-Loaded-0.08-452.module+el8.6.0+878+f93dfff7.noarch.rpm a98e64eacbd340f91a116ffc76ee54bf9a1172724e499dfb940f115da0a57d11 perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm 23471694783ed058ce2795ffffb3754ac5f991a18d78b9e6760850e3faef4b79 perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm 3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691 perl-Net-Ping-2.71-452.module+el8.6.0+878+f93dfff7.noarch.rpm e864c75d268bd9c134560ba2a1c2b035df4b9026c7c5880b25f09a06a764a242 perl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm 2107d6fe2bd4c30f879d05e9e91f3a67b669e9311a7d821bc1eaedc69362ac0e perl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm 4e7d56c452587e7eda8a6d95f035df77838d724beb89d8300f489bf05c4119c6 perl-open-1.11-452.module+el8.6.0+878+f93dfff7.noarch.rpm aba23b29cc51a254171cbe50bfa2b77c9aa795ed73d507c532d00d37f0770097 perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm 4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737 perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm 04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm 658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f perl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpm 030735bc0b0a45c4329c3cff957df2bc31efcaf85e8a83ac14caaf7590278bbe perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf perl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpm 68d69421e6ecdd0c17b838ce5cd87e6178e480b859e741d75790a38e001a0e3a perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpm 9233f630e519b178b9d2554a6567fa54427edb910b2305affe3fd505c3eebdaf perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437 perl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpm e9edbfc3c8c01620a652dd1dabfdaf9aaa6f8b245ffdc98aaa49d59185f5016a perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8 perl-Pod-Html-1.24-452.module+el8.6.0+878+f93dfff7.noarch.rpm fff84361d5bf54b52cb450af2c8c89420b80a02c1c4595ac2169907e320563df perl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpm f97ad11912e5d33ff4ecd9080ca24d427fbf5d44165f53d663e0affa77f2b01c perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5 perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpm 35d8c093f5f2aacfab1e753a4c0c2bcf2736885654ccd881b194eccb8a3490d9 perl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpm 684f8c4f2fad53955dc42f7e46620c817d77f6ada02b3585ed01890bc86ac7e0 perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpm 8e0adc72bb11846ec003cf0b3d8a7fda73b819b12cb4cd1f83cb74372e7e1917 perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 19c9476b75c247420525ff36ad321453c46d0262305cad01bfd0eea652a70093 perl-SelfLoader-1.25-452.module+el8.6.0+878+f93dfff7.noarch.rpm 6554f62819084c0bf385d680182d9b56880743886ebeab6d361157f29a6f3157 perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpm b60d7dc5e566fbe0b9282e1f90b628d86d87f6e7c091290737cddea24d9bdc1b perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm f303faa506dc1d7735a1fba64383acc4c4075c37a502e5f3a6793849dd3f50c4 perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpm b7f894a292d6278b60fb5754d1ed5ad9d199c8f84d140f47dbeb260d6a3eaa35 perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpm 75489ca0ff106abbfe0c4bcae3fed2348adfeba22114e664f4d4f000f43d3f08 perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7 perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359 perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpm 94c51f36928bb91516b6f64205a2589ac0da63b50f1b2fe2b39b8dd3e89cdb57 perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253 perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm 77b7f51b21e2373d909905b0d45191814fbb1c8dd9c855a250048f9437944533 perl-Test-1.31-452.module+el8.6.0+878+f93dfff7.noarch.rpm f381236a3739fde90a197fa1177fc4a2589b2d1b6d78ac6d1a0b88d78357b7a8 perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc perl-tests-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 3b5e10bdb757229457125f796ffa71dfbaf8635a4ad4cc218b91fce7a0ecfe3f perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpm fa90202ab3e84856ac931df1ec5dfe31e4854dae428d3dc1a888e17baeccb30b perl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpm a66f0ac7400eb036108d48bac612d9b6e2f35cb1c252f7f0cb16e7a5f1e062ce perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpm a6145f9481f9059c301eb1355d0cdd688feebab8d19fc2b2ebcd591737903628 perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm 21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5 perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8 perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm 0ad56d5e6405906910a2efe8448960cdb0b14fe3557e69cf8b59651e75a6abca perl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm e3e8703e0c6628e7814fe4c7533d995643a929b4fbb931708d6e22729b694f6e perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 2e5b2999050f52a5be6078a7024fa2d8696471958b37582c6ae57f869b22b247 perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm e95a1149d05da0bdfc99db4a561b0ffee93dd2d670951b8bf9e9f0bcd867473c perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpm c32bff30e752a3efa107b8a0d0a6758e720770d895c642fbd8434f86f54ef46e perl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm d7d4e67d3dad8f5cf8721b9842d490a23b2d2db38e107fdb785b5b84045aa8a4 perl-Time-Piece-1.33-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 0983e9e7fb85c4ce71777a0205c985ed57df8a543f13cb4ed349f9fd8fdb62c1 perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 329b8a55fd6c40d52610e15f55037edc8395d682ed5ceca6611930c6ec0c80fb perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 641de0fcef19c0f7ab506f797d92584ac6c17d3f1335d5fa6fb0d515c8220612 perl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm 6852a1483a15b008cb44a2881bae6beec4dd4e1e00d6743caf3d1e822e38bfa0 perl-utils-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpm 2a0972dc24a20292397915a852656304ffd8ec958239b0c9f1f226658179a158 perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm 96805b92a1012403138db9d46d761fcafc05517684b5ff73a5ccfbf75edb0d59 RLBA-2021:1878 squid:4 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2021:1879 Moderate: python38:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python38, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, python-ply, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e RLBA-2021:1880 mod_fcgid bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_fcgid. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_fcgid-2.3.9-17.el8.x86_64.rpm 96b06bcbf7c919d7860e97fdee65d347132301964163b676678f0edd3b06dd96 RLBA-2021:1882 inkscape:0.92.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-scour, inkscape. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__inkscape python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm 2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1 RLBA-2021:1885 spice-qxl-wddm-dod bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-qxl-wddm-dod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-qxl-wddm-dod-0.21-2.el8.noarch.rpm b28da22033bb81319f22ce360c8316ff7d50b1c405ea7fb772a5684826beb03d RLEA-2021:1889 libfprint bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fprintd, libfprint. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fprintd-1.90.9-2.el8.x86_64.rpm 6491c1b1a2cf6143b8fa443bef28504be7be0503f6e3c9dc8a55ca79065c2c5d fprintd-pam-1.90.9-2.el8.x86_64.rpm 1efdd9068c4be78be4a38ad0f81d2f7a7655b4275a3cc9b7bd63fdda1451ef21 libfprint-1.90.7-1.el8.x86_64.rpm 028164883c21054399e9240cfc0367a4ec61ff4b86801066ee110951b78afc06 RLBA-2021:1892 source-highlight bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for source-highlight. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms source-highlight-3.1.8-17.el8.x86_64.rpm 0e196806afe493edb18aa1a760819f175f69d698f5c748bab3f5c9dd9984e20b RLEA-2021:1893 new module: mariadb:10.5 MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLBA-2021:1894 abattis-cantarell-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for abattis-cantarell-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms abattis-cantarell-fonts-0.0.25-6.el8.noarch.rpm 467a74c9b44fd7ca2910712a83ed040fcbcaafbc7fda8b541bd1d6d8cfc6988d RLBA-2021:1895 libgovirt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgovirt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgovirt-0.3.7-4.el8.x86_64.rpm 545a6b1e83548cbcc04f46b3109ade9651b99c4c1cb7f0061c42e716d370aebc RLBA-2021:1897 maven:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLBA-2021:1899 gcc-toolset-10-gdb bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-gdb-9.2-4.el8.x86_64.rpm 72a19b8ae9245f67865cd410b7d5f357756735b86ea8b2287eeee52dd737b561 gcc-toolset-10-gdb-doc-9.2-4.el8.noarch.rpm 86571499188f38badc2490256a2476342b11c70891d3a9d27ce75c640781c5bd gcc-toolset-10-gdb-gdbserver-9.2-4.el8.x86_64.rpm c9cba6cf5dc0e84a17356ec5200c135b2d03ef5a5b68288b3de0fbc2e1a39087 RLEA-2021:1900 memkind bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memkind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms memkind-1.10.1-1.el8.x86_64.rpm 6e14104dcc6708e2351d57b77f26893e44c23e35b33cdf05078fe46c42524d9d RLBA-2021:1902 uuid bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for uuid. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms uuid-1.6.2-43.el8.x86_64.rpm f1e86f91c8e650975437970e0c91d0bf5c398eee60b6e0905400d65823ae17e8 RLBA-2021:1903 pulseaudio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pulseaudio, twolame. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms twolame-libs-0.3.13-12.el8.x86_64.rpm 029e7f5810df21c2da415b3c5a0a0732f5cdf2c185f82ae756706775913bd2c8 RLEA-2021:1906 libyang bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libyang. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libyang-1.0.184-1.el8.x86_64.rpm a18b82afa4780f61864a7cd2bd28a7bc870964039c91ee5a429fae5626178eae RLBA-2021:1911 container-tools:2.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2021:1912 ilmbase bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ilmbase. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ilmbase-2.2.0-13.el8.x86_64.rpm 4d46f7970d6415e15081a9f22f3d9afebc7467b373d8bbcd1d9704c236a3cc00 RLBA-2021:1913 SDL and gstreamer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for SDL, gstreamer1-plugins-base, gstreamer1-plugins-good. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gstreamer1-plugins-base-1.16.1-2.el8.x86_64.rpm 080de6123569b64faac1939ca663245bf7099e20974ca0c59ad7aa92ba870bae gstreamer1-plugins-base-devel-1.16.1-2.el8.x86_64.rpm fb49590c7cca49cf399a894fe5093e9e4077164cf97b706451498e6217814b31 SDL-1.2.15-39.el8.x86_64.rpm 9ed4e04c21f25fae0421f47c9334a5d58b123708004650b7817a3f5a6c8124c9 SDL-devel-1.2.15-39.el8.x86_64.rpm 39b8c51c2ad75b19a80ff692a5c73a3717f47748cd82caf03a0a4b3a74f37bbb RLBA-2021:1914 libsmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libsmi-0.4.8-23.el8.x86_64.rpm 48ede3425a13595c69ab1ec38b0ab3acb192b4da13173886b1b2b933f6c782bf RLBA-2021:1915 gpm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gpm-1.20.7-17.el8.x86_64.rpm 9576114888fa8c265da2bedc5de8789e3d5edc597d4ef6963354c72a46ef9839 gpm-devel-1.20.7-17.el8.x86_64.rpm da9cdd5ac686e1edbca85896c9507ef04eb92e9d9c57b43e6eec4541fb4de34d gpm-libs-1.20.7-17.el8.x86_64.rpm 9a1109ffb7ae23caa6a6776f2d5fe0b11b452a3779c9edc157c9dbaebd2a7987 RLBA-2021:1916 automake bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for automake. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms automake-1.16.1-7.el8.noarch.rpm cdb509c8eeff8702dd46562eea024cdbe930a70b8cb8592cda1305a0cb8c5e87 RLBA-2021:1917 tang bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tang. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tang-7-6.el8.x86_64.rpm ee9ae1dc56ca1d5b38b35add16d02f318dacf13c6957f8b02f1124b55e2049b0 RLEA-2021:1919 new module: python39:3.9 Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 RLBA-2021:1920 go-srpm-macros bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for go-srpm-macros. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms go-srpm-macros-2-17.el8.noarch.rpm 18ed6d3a24dac62dea1c6facc0045ddc89c05f450128561a9b063579727b1ced RLBA-2021:1921 docbook-style-xsl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for docbook-style-xsl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms docbook-style-xsl-1.79.2-9.el8.noarch.rpm c75d7bbcdb5fe5b6ca066fa140672e69eab050a305884ee5380618d1ba0ceabe RLSA-2021:1924 Low: spice security update The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es): * spice: Client initiated renegotiation denial of service (CVE-2021-20201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for spice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es): * spice: Client initiated renegotiation denial of service (CVE-2021-20201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-server-0.14.3-4.el8.x86_64.rpm 0b42ed068415f6f6755f7d7efbfdcb6f7f15d59d1a9a837df2d6bc5b1552be38 RLBA-2021:1930 python36:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python36 python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm fe5acf5b333e19f8028820c4fdc9736984d0e79466cc28d1605dbc766f3942a0 python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm 434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm 1d3f8a8f08584719452bea07bd3790bd3a282b39842f25f5bd9f40acffe1e97c python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm 284c71458cac84d2f339a1438ec01395f82d9f54935d0479274f5bb3882f913f python3-PyMySQL-0.10.1-2.module+el8.4.0+597+ddf0ddea.noarch.rpm f8fc550646c9ac5e7f2c076a7a7a341ce148be616d7e2415ed7ab35157835e00 python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d python-pymongo-doc-3.7.0-1.module+el8.5.0+671+195e4563.noarch.rpm 2e11f6f4f770a9b60d561dc8f80e554fac2919dfc041a3f18639fef6f328838e rocky-linux-8-x86-64-appstream-rpms__python27 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLBA-2021:1933 mod_auth_openidc:2.3 bug fix update The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_openidc, cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102 RLBA-2021:1936 scap-workbench bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scap-workbench. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms scap-workbench-1.2.0-8.el8.x86_64.rpm dbc084d9736353c535f44d800926704fbcd69953e841cf010a525332b1386e74 RLBA-2021:1937 protobuf-c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for protobuf-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms protobuf-c-1.3.0-6.el8.x86_64.rpm f3a99aed36ada0451b36b9682ef6b6d07f790d4cc157bf13e8d3c04856b7c489 protobuf-c-compiler-1.3.0-6.el8.x86_64.rpm 08916c494c2a4b29608e6ebe1d70f8960df4065c1ba0d80c4c45f3fcbec61348 protobuf-c-devel-1.3.0-6.el8.x86_64.rpm 4c57f3d2a16b8aab617e5e52087b065eb3955c14b1acf36e7aebe8d24e9d0b9f RLBA-2021:1939 libosinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libosinfo, osinfo-db, osinfo-db-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms osinfo-db-tools-1.9.0-1.el8.x86_64.rpm adc8c8996f88803b72ac5fc2325714318a2b2f03a22c77f4cc8d4e7797609e0f RLBA-2021:1942 ibus-typing-booster bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-typing-booster. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms emoji-picker-2.1.0-5.el8.noarch.rpm b0ea7833388d43f69702d5e0c2b71af58aa8821874411aeb3090a466a7fcc7a9 ibus-typing-booster-2.1.0-5.el8.noarch.rpm 7d2418858ad069c2dafc8b05c15f57b82b0909048c508cec05fb439af48b1209 RLBA-2021:1943 crash-trace-command bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash-trace-command. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms crash-trace-command-2.0-18.el8.x86_64.rpm 9998511793ac0e78c4972e891317b0bab2a10d4dd5c7a65a0a991726490e3c07 RLEA-2021:1946 tracer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tracer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-tracer-0.7.5-2.el8.noarch.rpm 2ff784b8c47308fe359a02880d75967a9b02893cffa151521f65dd15ca7d2df5 tracer-common-0.7.5-2.el8.noarch.rpm 524bbd9c63719d338077423b5af14aec807df7065848f01371e45c79b4e45e63 RLBA-2021:1948 ibus-table bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-table. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ibus-table-1.9.18-6.el8.noarch.rpm c6b5e4c48e6f2147bc59122720ba4b62a1f3b0ca48a1bacf7917ed348f53a846 RLBA-2021:1951 new module: container-tools:3.0 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLEA-2021:1955 jmc:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jmc, ee4j-parent, jaf, HdrHistogram, lz4-java, owasp-java-encoder, directory-maven-plugin, jmc-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__jmc directory-maven-plugin-0.3.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm cdc5571895b15a244639a7a8fb40e9f851303ba1809ea2ebfd2e4184b78d7c96 directory-maven-plugin-javadoc-0.3.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm c0c939f0fa8a2e652dca4ae7408f8dd1fceb4f72ece36f1e79c37ef4b3ef365c ee4j-parent-1.0.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm 1238f6bff74e9abcc8cd5ecbe3ca3d672d30baf5e25ef186caf54eb839034d54 HdrHistogram-2.1.11-3.module+el8.4.0+405+66dfe7da.noarch.rpm 1769e580d88893bc4a07b3cb1bbe4d6fef5d25c6f3dc113f5a2669a52c46952d HdrHistogram-javadoc-2.1.11-3.module+el8.4.0+405+66dfe7da.noarch.rpm 200c628bb67b200a081372ee71e6e047ff677ac0109ad7facd11dbc47faca336 jaf-1.2.1-5.module+el8.4.0+405+66dfe7da.noarch.rpm 8cf5e7153281991005aeebc36fb2682a1563ccd9ee01235d15f26f190f287ad6 jaf-javadoc-1.2.1-5.module+el8.4.0+405+66dfe7da.noarch.rpm 9a3f0e098c12962f572fbabc318529b8e1b506c1e7a77b83a41e177fb625064b lz4-java-1.7.1-14.module+el8.4.0+394+13a3c723.x86_64.rpm 9bb5f1fde802c20380728f69ca4c08d6279caa11f65a801c7347095d5687c31c lz4-java-javadoc-1.7.1-14.module+el8.4.0+394+13a3c723.noarch.rpm 245f94bfb83331301c0ff01518b70da7b759591de06c1bc9145aa82fc857b3d7 owasp-java-encoder-1.2.2-3.module+el8.4.0+405+66dfe7da.noarch.rpm a9437a61ea81da96e73368b14e8fe815d0819f62c4710d8a2b40896803f228e2 owasp-java-encoder-javadoc-1.2.2-3.module+el8.4.0+405+66dfe7da.noarch.rpm 87a1e57a334335da8869b63bde30b791a34ad727abdbe6c2b05787a34c1f7061 RLSA-2021:1979 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2021:1983 Important: idm:DL1 security update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:2259 Important: nginx:1.18 security update nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e RLSA-2021:2290 Important: nginx:1.16 security update nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20 nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904 nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462 RLSA-2021:2291 Important: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2021:2360 Important: postgresql:9.6 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (9.6.22) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (9.6.22) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgresql-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 0b1c99a3e81edc34c35bcce7ac55f6db1876fd0fe74d04258e3f9703810165b9 postgresql-contrib-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm e524c0629c6d38353c7da4ba6bfeaed2c82a39a5e1024fb9425c578d60e4c93c postgresql-docs-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 88df40af56e602aad0cd0ccff1891e214c7f252b061d1adcf8e75033d3daacee postgresql-plperl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 0109c22adfb0829ee7967550f1500a5101504890e82ff63ceec7ada1a8d0d0d6 postgresql-plpython3-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 020f1729ea269e28a16781d3666fcc0d6b0a4bbb9ac725ae84300cc7b049ec12 postgresql-pltcl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 8de17b6cb46b1d1a3aa5bc6842728e4e57da3a23175d3a8596a0cfc48c55a7db postgresql-server-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm c76ddbe828fec9fe1a71bb618dc2a6b705e01782c6845081fe78ae45debb4aa8 postgresql-server-devel-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 323b8b1c3f0f5b6790ce6e710859aefeda899a2195b72086eea50bc32e300c5d postgresql-static-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 120a9aaf53b223981e347dc1fd215de958a1b5279fc78c061093d07d5afb5cdf postgresql-test-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 11897a3ba65c0e88aa99c4502c19f94bc91db7124f5d60388d31ac996ebf9719 postgresql-test-rpm-macros-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 25ac98b62c359b013fba2af6bf95ce9ef44d1ee87611b2a92af9a526e2ceacff RLSA-2021:2363 Important: gupnp security update GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. Security Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for gupnp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. Security Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms gupnp-1.0.6-2.el8_4.x86_64.rpm 99156c05f5915a79b954b5a4e6d5d38b65d7c455f9a66af27e036a35635570cc RLSA-2021:2370 Important: container-tools:3.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2021:2371 Important: container-tools:rhel8 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3af0efabcac69789ce47fab592ecc29899095fcc2be8f8a6201db544376bc188 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2021:2372 Important: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.7) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) * postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.7) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) * postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:2375 Important: postgresql:13 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.3). Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.3). Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:2583 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm 74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e RLSA-2021:2584 Moderate: ruby:2.7 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999) Security Fix(es): * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999) Security Fix(es): * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000) rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 RLSA-2021:2587 Moderate: ruby:2.5 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626) Security Fix(es): * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626) Security Fix(es): * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLSA-2021:2588 Moderate: ruby:2.6 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627) Security Fix(es): * rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881) * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627) Security Fix(es): * rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881) * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968) rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm 2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm 338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197 rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm 0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372 RLBA-2021:2592 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984) rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:3020 Important: ruby:2.7 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 RLSA-2021:3061 Moderate: virt:rhel and virt-devel:rhel security and bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754) * hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416) * qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301) * Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754) * hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416) * qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301) * Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2021:3070 container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLSA-2021:3073 Moderate: nodejs:12 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.22.3). (BZ#1978201) Security Fix(es): * nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362) * nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290) * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.22.3). (BZ#1978201) Security Fix(es): * nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362) * nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290) * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2021:3074 Moderate: nodejs:14 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.17.3). (BZ#1978203) Security Fix(es): * nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362) * nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290) * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.17.3). (BZ#1978203) Security Fix(es): * nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362) * nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290) * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2021:3075 Low: libuv security update libuv is a multi-platform support library with a focus on asynchronous I/O. Security Fix(es): * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libuv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libuv is a multi-platform support library with a focus on asynchronous I/O. Security Fix(es): * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libuv-1.41.1-1.el8_4.x86_64.rpm 1a1e44d7537433919bdf760fe9a2bb545720b7d054706e5c3871cca3b40f0f31 RLBA-2021:3083 gcc-toolset-10-valgrind bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix(es): * incorrect pkgconfig virtual provides in devel packages (BZ#1968378) For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix(es): * incorrect pkgconfig virtual provides in devel packages (BZ#1968378) For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpm eaee7045eb86911441e2ca185719dac4846cf6761b34b1cd4503e66276f0b650 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm 4b0fc0732a44b410281e4ebb01b853a5ae5b49173e876bfba3064ea2a42410d3 RLSA-2021:3590 Moderate: mysql:8.0 security, bug fix, and enhancement update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693) Security Fix(es): * mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424) * mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804) * mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444) * mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042) * mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422) * mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860) * mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402) * mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852) * mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399) * mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870) * mysql: Server: Logging unspecified vulnerability (CVE-2020-14873) * mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385) * mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011) * mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038) * mysql: Server: Options unspecified vulnerability (CVE-2021-2146) * mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232) * mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208) * mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308) * mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307) * mysql: Server: Federated unspecified vulnerability (CVE-2021-2354) * mysql: Server: GIS unspecified vulnerability (CVE-2021-2417) * mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Segfault and possible DoS with a crafted query (BZ#1996699) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693) Security Fix(es): * mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424) * mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804) * mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444) * mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042) * mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422) * mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860) * mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402) * mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852) * mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399) * mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870) * mysql: Server: Logging unspecified vulnerability (CVE-2020-14873) * mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385) * mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011) * mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038) * mysql: Server: Options unspecified vulnerability (CVE-2021-2146) * mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232) * mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208) * mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308) * mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307) * mysql: Server: Federated unspecified vulnerability (CVE-2021-2354) * mysql: Server: GIS unspecified vulnerability (CVE-2021-2417) * mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Segfault and possible DoS with a crafted query (BZ#1996699) rocky-linux-8-x86-64-appstream-rpms__mysql mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f RLBA-2021:3593 gcc-toolset-10-elfutils bug fix update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix: * The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix: * The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013) rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm f64e85941a97279c482bbd079fbd153255a348556053cf6e40b7b1abea70c7bf gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm fbf71de210a57662e2215e22fe634b8822b0533020a47c1f6615e0e50b9c2e66 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm 47103bfcc834e8d9585ea457e023013726ea8fd98bfb6cc9ab1003ac9df38925 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm 20d78a08fcad187ce1fe69bdb260016abe2cfc43d6fe882099adfc1c11cb4b55 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm b27fdaf713c099c491534f785cc4418944976ced9ace65c6a1b4cfdc64441000 gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm 06e63e0c75d6871db6259dca49854a356e43dfc658de0edfb41b193111939565 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm 769e4bb8af44477862465592d22f364ae865f1f7cd86bf005b0a2e304ce20765 RLSA-2021:3623 Important: nodejs:12 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930) * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940) * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) * nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931) * nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803) * nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804) * nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:12/nodejs: Make FIPS options always available (BZ#1993927) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930) * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940) * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) * nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931) * nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803) * nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804) * nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:12/nodejs: Make FIPS options always available (BZ#1993927) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2021:3661 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLSA-2021:3666 Important: nodejs:14 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930) * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940) * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) * nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931) * nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803) * nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804) * nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:14/nodejs: Make FIPS options always available (BZ#1993924) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930) * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940) * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) * nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931) * nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803) * nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804) * nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:14/nodejs: Make FIPS options always available (BZ#1993924) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2021:3816 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2021:3918 Important: redis:5 security update Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for redis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__redis redis-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm 07ed98eddf06d6cf89b3b44f3d2437fb863fb94b8366cb76e071ee3949d87eab redis-devel-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm 88dc345660dcc3b1735cf173bdbee0cab0259caa738f353d60ebd210ce021a88 redis-doc-5.0.3-5.module+el8.5.0+657+2674830e.noarch.rpm cc89c6dc3eb7d9da7535a2c52fd8e647cf7a30943882c964ecfe17691cbd6d78 RLSA-2021:3945 Important: redis:6 security update Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for redis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__redis redis-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm 4eef6a7e2f37e49feb209a59bf02823274ca392247433e04dc4d20f43a1990cd redis-devel-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm 23152bf30dc357235e82eeaf7c6e53ea18f2e50f7bc3b9eaa1d38f99fa160a90 redis-doc-6.0.9-5.module+el8.5.0+658+72172854.noarch.rpm 122e5ea03b660cf7ca8077dfa41fc80b9aa56912ae5939b4f3c2cbd32d0fc4e0 RLBA-2021:4093 container-tools:3.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245) * 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264) * [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245) * 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264) * [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409) rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2021:4094 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Dirsrv memory leak (BZ#2003607) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Dirsrv memory leak (BZ#2003607) rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:4150 Moderate: python36:3.6 security and bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python36 python36-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm cc13e57ac650df29ee9ed66c0dac505cfbde741608604acfd60ff5ed455b3687 python36-debug-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm 43b88c0a96a9906b7aded4fbfd2d2bf4de6b1753dd6e0e84faec8106a66cab1c python36-devel-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm a9a046234a026579a675db98b8dc5a2dc0d354897b6f749a2264f097eb6a42a6 python36-rpm-macros-3.6.8-38.module+el8.5.0+671+195e4563.noarch.rpm 5d5cb6a94d730cd2f0891c146c7573420dfc826fc93d700ea925410a6ce2dba8 python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm fe5acf5b333e19f8028820c4fdc9736984d0e79466cc28d1605dbc766f3942a0 python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm 434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 python3-nose-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 168de63ea406adedd5a74f273c0b3d1aadc5667d846b3bdba00eeaf589425a78 python3-pygments-2.2.0-22.module+el8.5.0+671+195e4563.noarch.rpm ace34fc5c06e34c0b64edec161daab6c2bf43c1133a4db8114b6703e75938527 python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm 1d3f8a8f08584719452bea07bd3790bd3a282b39842f25f5bd9f40acffe1e97c python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm 284c71458cac84d2f339a1438ec01395f82d9f54935d0479274f5bb3882f913f python3-PyMySQL-0.10.1-2.module+el8.4.0+597+ddf0ddea.noarch.rpm f8fc550646c9ac5e7f2c076a7a7a341ce148be616d7e2415ed7ab35157835e00 python3-scipy-1.0.0-21.module+el8.5.0+671+195e4563.x86_64.rpm 496d5d8cfad3f4edb2251e0515c299893db4792d67cab28efc43d45d251b8f79 python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d python3-virtualenv-15.1.0-21.module+el8.5.0+671+195e4563.noarch.rpm 7361f47ffdde2c3fa7401442abefe24d77a49f83d37aaa6ca75342c14e89947c python3-wheel-0.31.1-3.module+el8.5.0+671+195e4563.noarch.rpm cbaa19578812079d4740b405915ba967621c5a6fe38e7233768ed66ec63f057b python3-wheel-wheel-0.31.1-3.module+el8.5.0+671+195e4563.noarch.rpm cffee93a34dda22e1c734f372ca0fa49d40d1eeba6f2096c008d4bad7088efbe python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960 python-pymongo-doc-3.7.0-1.module+el8.5.0+671+195e4563.noarch.rpm 2e11f6f4f770a9b60d561dc8f80e554fac2919dfc041a3f18639fef6f328838e python-virtualenv-doc-15.1.0-21.module+el8.5.0+671+195e4563.noarch.rpm 6e4ea32c00bc4246b137a8ffcfd8d138ae6f1b9535a1cd45d4097065ad79235f rocky-linux-8-x86-64-appstream-rpms__python27 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLSA-2021:4151 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 4af53602814c4e6074f48e25713ef6f8384bf956bdcefb1d33abd3c1071671ad python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 9de14f945b487d8dc1f04035a229c98f3f2cc7ec0522d921c10217b302ef997b python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm 6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91 python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-jinja2-2.10-9.module+el8.7.0+1062+663ba31c.noarch.rpm d273ecf02c532bb6e73c45d77e576f1b36560f9b9d913ac3f82f031b3503292e python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9 python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326 python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm 5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543 python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b rocky-linux-8-x86-64-appstream-rpms__python36 python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960 RLEA-2021:4152 modulemd-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for modulemd-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms modulemd-tools-0.7-6.el8.noarch.rpm 01640844480f9cef20b7fa975091cc940229c56a7a70aeda65cbb96e731a77da RLSA-2021:4154 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) * containers/storage: DoS via malicious image (CVE-2021-20291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) * containers/storage: DoS via malicious image (CVE-2021-20291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLSA-2021:4160 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information disclosure via pydoc (CVE-2021-3426) * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information disclosure via pydoc (CVE-2021-3426) * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57 python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm 49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12 python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm 2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55 python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm 58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190 python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0 RLSA-2021:4161 Moderate: python-jinja2 security update The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. Security Fix(es): * python-jinja2: ReDoS vulnerability due to the sub-pattern (CVE-2020-28493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-jinja2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. Security Fix(es): * python-jinja2: ReDoS vulnerability due to the sub-pattern (CVE-2020-28493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-jinja2-2.10.1-3.el8.noarch.rpm 6624b52c38082ab83ac01bbf3786d69fa2c657891a618341c6ad2fb24eeb69bf RLBA-2021:4163 mariadb-connector-odbc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mariadb-connector-odbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mariadb-connector-odbc-3.1.12-1.el8.x86_64.rpm 77f9ed66d4c10737a40f1dfe9d25177eae63e27d168d41e92b823d15840d636a RLBA-2021:4164 sil-nuosu-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sil-nuosu-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sil-nuosu-fonts-2.200-2.el8.noarch.rpm 1e07923894f365e4800ecd2bb2ab8416f14ce654202bdefcaf651b8bacb6c0ab RLBA-2021:4167 socat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for socat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms socat-1.7.4.1-1.el8.x86_64.rpm 12653938d941afafbaa7fedd576fea5ad9a69124b5003aef196b8b5d26154747 RLBA-2021:4170 libreoffice-voikko bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libreoffice-voikko. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libreoffice-voikko-5.0-6.el8.x86_64.rpm 68c67ec0e50e488c398f5470f9528c4851f615beb1549f1aaaa5d09ea61b1dba RLSA-2021:4179 Low: file-roller security update File Roller is an application for creating and viewing archives files, such as tar or zip files. Security Fix(es): * file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for file-roller. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list File Roller is an application for creating and viewing archives files, such as tar or zip files. Security Fix(es): * file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms file-roller-3.28.1-4.el8.x86_64.rpm 774249365a784f0f1ddec77ece69c5f945aea411d0fb82fe80f35b95e0f5ca61 RLBA-2021:4180 evolution, evolution-data-server, evolution-ews bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution, evolution-ews, evolution-mapi, evolution-data-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evolution-3.28.5-18.el8.x86_64.rpm 52099aaa38d080cab8e5ad7d2752560f444e7f9eebb0c9d2a7e04e0ee4125e1a evolution-bogofilter-3.28.5-18.el8.x86_64.rpm cc6330c94c49457a8d2f56b3cb453baa7f287c820d88772368121fe3652ffdcc evolution-help-3.28.5-18.el8.noarch.rpm c00ed48438b6959f73c813a2b666c8ef343fc0f3345817aa14fd0921ec2bf0c0 evolution-langpacks-3.28.5-18.el8.noarch.rpm 935263444cac801b4b8cbba1ac49b4a54eb24631c6d1c842f86f752384b04dae evolution-pst-3.28.5-18.el8.x86_64.rpm 3a8b77dd43293eaeccf413117992e0695e74c9aa6ff31edf4bc5253effdc9f98 evolution-spamassassin-3.28.5-18.el8.x86_64.rpm a493ffbbaa757d8dcff030bfc959f5d9ee6c4fc92caf48dcb0385e4144f8d858 RLSA-2021:4191 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595) * libvirt: Insecure sVirt label generation (CVE-2021-3631) * libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595) * libvirt: Insecure sVirt label generation (CVE-2021-3631) * libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2021:4193 rsyslog and its related dependencies bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsyslog, libfastjson, librelp, liblognorm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms librelp-1.9.0-1.el8.x86_64.rpm c6fc1c283dfd3d98e337bc9e4dfa643c53657c0fec5515713ba75fdac61842f8 libfastjson-0.99.9-1.el8.x86_64.rpm 427188c6f09a570c668cee4e22ab62832788c6f6c6a99d07126466308e04f13a liblognorm-2.0.5-2.el8.x86_64.rpm bc00a8717bbea75b192e417e9cbf3525f9ccd6dd328de5f49f883dabf8c686a7 liblognorm-doc-2.0.5-2.el8.x86_64.rpm 25face4c27d1c40f02b3738653637a107a64b7360f5c91d3d84e69172da02e2a RLBA-2021:4195 powertop bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for powertop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms powertop-2.14-1.el8.x86_64.rpm 729ffc74c690fbbff0b6e3f9ceee824079f3e70fe5d5f29a079eb606332821e5 RLBA-2021:4196 libgweather bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgweather. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgweather-3.28.2-4.el8.x86_64.rpm 4c69a5c6bd5a4e3cfacce7a740228f49cf1ae41c28511ade87c1f12b9eb032f9 libgweather-devel-3.28.2-4.el8.x86_64.rpm 04206eb4ee259438d53647ee5b8281a4f5330fac03f12ba6952a23613587f61c RLEA-2021:4200 new module: nodejs:16 This enhancement update adds the nodejs:16 module to Rocky Linux 8 as a Technology Preview. A future update will provide a Long Term Support (LTS) version of Node.js 16, which will be fully supported. (BZ#1953991) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. For information on Rocky Enterprise Software Foundation scope of support for Technology Preview features, see Technology Preview Features Support Scope. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the nodejs:16 module to Rocky Linux 8 as a Technology Preview. A future update will provide a Long Term Support (LTS) version of Node.js 16, which will be fully supported. (BZ#1953991) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. For information on Rocky Enterprise Software Foundation scope of support for Technology Preview features, see Technology Preview Features Support Scope. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 RLSA-2021:4201 Moderate: babel security and bug fix update Babel provides tools to build and work with gettext message catalogs, and a Python interface to the CLDR (Common Locale Data Repository), providing access to various locale display names, localized number and date formatting, etc. Security Fix(es): * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for babel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Babel provides tools to build and work with gettext message catalogs, and a Python interface to the CLDR (Common Locale Data Repository), providing access to various locale display names, localized number and date formatting, etc. Security Fix(es): * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-babel-2.5.1-7.el8.noarch.rpm 26dd61290b95ee471a82a445e9af1dc566452d8e92d6d330a03de4eb43e51984 RLBA-2021:4209 redfish-finder bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for redfish-finder. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms redfish-finder-0.3-6.el8.noarch.rpm 2816ac8e1697a09d9feb8e393f380209c7b52b005618712e67c33519d83fef84 RLBA-2021:4212 mailman bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mailman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mailman mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3 RLSA-2021:4213 Moderate: php:7.4 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110) Security Fix(es): * php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069) * php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071) * php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068) * php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070) * php: NULL pointer dereference in SoapClient (CVE-2021-21702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110) Security Fix(es): * php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069) * php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071) * php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068) * php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070) * php: NULL pointer dereference in SoapClient (CVE-2021-21702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLBA-2021:4216 xorg-x11-font-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-font-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xorg-x11-font-utils-7.5-41.el8.x86_64.rpm afd2b72c9233ef3489cdc0c47125bd19ccd8f93cf4ff0bd2f60213d3e6c22e53 RLBA-2021:4217 stratis-cli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stratis-cli, stratisd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms stratis-cli-2.4.2-1.el8.noarch.rpm ffe7f009e4a58be113042e2fe76c82c1e815d5a0d2c6c3f807213ce3fda16b19 stratisd-2.4.2-2.el8.x86_64.rpm 512ed0de3294b1af949e2af690f45b72ad1a8f2e19472b1dac715058d308a8b6 stratisd-dracut-2.4.2-2.el8.x86_64.rpm ead1ebd70d475ea2caf5ce0c19f03d66ad818ee36fc044fb137c1ce759b7162e RLBA-2021:4218 udftools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udftools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms udftools-2.3-2.el8.x86_64.rpm 98bdda0c742d835d9875a0b6da1453a13ae1b63c1ab35bce343898029bca5c4b RLBA-2021:4219 libinput and libevdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libevdev, libinput. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libevdev-1.10.0-1.el8.x86_64.rpm 5a7495b56a09a76c54ad5fce64f6adbeda62d1cc6bd0accce4c9386ac9bff4fb RLBA-2021:4220 xapian-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xapian-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xapian-core-1.4.18-3.el8.x86_64.rpm 53e29be7231b6ebf376f7c89e6d654597c4931af8dd219787cb9ac630da69d3b xapian-core-libs-1.4.18-3.el8.x86_64.rpm 31cb47e61ca8961dde64cd276b4e991594462e0ac63e3054263f617fd04fd3d0 RLSA-2021:4221 Moderate: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm 2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2021:4222 Moderate: container-tools:3.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2021:4224 libwacom bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libwacom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libwacom-1.6-3.el8.x86_64.rpm 289ee5b010e498d615a969b48e600668c2351bd34b2e2908b24fc57d827494a9 libwacom-data-1.6-3.el8.noarch.rpm 7e5450f5dc8a0ebb6181f737709bfa81cd5879251d77ccf6aa28b1b8024e5f11 RLBA-2021:4228 rshim bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rshim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rshim-2.0.5-2.el8.x86_64.rpm 97e027fb20b53d88f4943792d036df6a87be61e8c2e5360c617b349bb115ba83 RLEA-2021:4229 google-noto-emoji-fonts and pango bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for google-noto-emoji-fonts, pango. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms google-noto-emoji-color-fonts-20200916-2.el8.noarch.rpm 1361deafeac4dd12c648898ddb7d3ecf58becbe687b6da95e3bf1899d1c1c944 google-noto-emoji-fonts-20200916-2.el8.noarch.rpm b8a87ada948fe61bb422a66a54b6b7dae60b63269fd1430cf4d004af12d29ae2 pango-1.42.4-8.el8.x86_64.rpm 481dc7c787260e8d261cd4f7d7499105def3a3a64835e4f7f4ed6ab0ddf92723 pango-devel-1.42.4-8.el8.x86_64.rpm 2782d37b80b2e47d284ec7395f60a3bcbb77edf63f1f4ead25ad1b2dccd464c4 RLBA-2021:4230 ipa bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:4231 Moderate: libwebp security update The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009) * libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010) * libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012) * libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013) * libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) * libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330) * libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331) * libwebp: excessive memory allocation when reading a file (CVE-2020-36332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libwebp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009) * libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010) * libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012) * libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013) * libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) * libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330) * libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331) * libwebp: excessive memory allocation when reading a file (CVE-2020-36332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libwebp-1.0.0-5.el8.x86_64.rpm f3a9a91ed62713359b0255f51c68185ac36426fbe542469c22fcf709df97bfad libwebp-devel-1.0.0-5.el8.x86_64.rpm 274e1428df907f6f75a7093330bb69359132f90e1398978b3cc5b282db668d23 RLEA-2021:4234 mesa and related packages bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-server-Xwayland, libepoxy, wayland, wayland-protocols, libdrm, xorg-x11-server, egl-wayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libepoxy-1.5.8-1.el8.x86_64.rpm fa45b6c15f3a168ecb19032e0e2321541e1ac5bc8775d28491889b32696332bd libepoxy-devel-1.5.8-1.el8.x86_64.rpm f3df3fb27f03617cca795772e3d8450ec6347161fcae7af29676f18b7b60ac73 libwayland-client-1.19.0-1.el8.x86_64.rpm f8be8d0b50f23d997f7643d9dba4d149a1b29f26c61ce6bb85f8b136cb2265d7 libwayland-cursor-1.19.0-1.el8.x86_64.rpm 2d9e5c9557e076c1730c407955d4959668bf72c1b33f257ba240a221e19daea9 libwayland-egl-1.19.0-1.el8.x86_64.rpm 22c6e952f8edce3aaf3dd0caaf3c2544b4cae56a0f0bc11c47ae9263c935cd6f libwayland-server-1.19.0-1.el8.x86_64.rpm 81752663a48a83b6251f80cbbc8f49e19032cbdb2452a83647034f2a372e259b wayland-devel-1.19.0-1.el8.x86_64.rpm 7641020d95b21798a2bea97e7cd1676d4637229d58dd129a7d9be11d4133d4a5 RLSA-2021:4235 Moderate: jasper security update JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Security Fix(es): * jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828) * jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272) * jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926) * jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jasper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Security Fix(es): * jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828) * jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272) * jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926) * jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jasper-libs-2.0.14-5.el8.x86_64.rpm 5830d55c1e5a8b07c706d339f3deb917c7d0a4364160859ccbd59044315ca93c RLEA-2021:4239 pki-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm 20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 pki-servlet-4.0-api-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpm e5e14595fb89c52de31e9c18905ff0f305c68812d2756b12c2991c6da74d5548 pki-servlet-engine-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpm 73172dac5348a21d14d062762eeea65d223ca1bb1ab8b63c47e7b8685c8ef79a python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 resteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpm 92ea72f7a67d5de0fb940e1cbbc36752c56f02d056915d35be500fe51e146e6e slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e rocky-linux-8-x86-64-appstream-rpms__pki-core ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f RLEA-2021:4242 new packages: gcc-toolset-11-dwz GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-dwz-0.14-2.el8.x86_64.rpm 414ba44d288436081a409b4e578b86c1f284347262b45f47cc0fe4c07af80bf9 RLBA-2021:4244 dwz bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dwz-0.12-10.el8.x86_64.rpm d4682e21463097454b01d788a980f13c2377cdc5f757d6a446c30ed1061ba00c RLEA-2021:4246 cmake bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cmake. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cmake-3.20.2-4.el8.x86_64.rpm 9d21c01f081a4b8f553192a92fe4d5fcf48530fe318383c12d8b2b78114b81e5 cmake-data-3.20.2-4.el8.noarch.rpm 3eb6cae9285351ed5df68d5f98d396dab1f5125577a0c42381640da78854be55 cmake-doc-3.20.2-4.el8.noarch.rpm afd4d5f0d1eb996de0186288a429f72d37e08b1dd99a496be29a53f5412514f3 cmake-filesystem-3.20.2-4.el8.x86_64.rpm d7d94d53b80ea0fca0c7c6af95e71260daf4fb15240928d201d8c0aa6f1455eb cmake-gui-3.20.2-4.el8.x86_64.rpm e67e49c592112e86feb8459cd94ed0c5e31428a9bf87bd0fe7413863c330bf08 cmake-rpm-macros-3.20.2-4.el8.noarch.rpm 77231aae5f117ce89706ca1918261d89d013df1471294267211ad0e5b6bf3e11 RLBA-2021:4255 copy-jdk-configs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for copy-jdk-configs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms copy-jdk-configs-4.0-2.el8.noarch.rpm 84ec4532ff1042cad6ce9340a36e6522af0e09eb2bbe77152b5af79aaff1d2b7 RLSA-2021:4256 Moderate: graphviz security update Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains. Security Fix(es): * graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for graphviz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains. Security Fix(es): * graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms graphviz-2.40.1-43.el8.x86_64.rpm 2be0fa27c439694487dacbb62531a62dd1d0fd76b5c145c5f9fc810708b73287 RLSA-2021:4257 Moderate: httpd:2.4 security, bug fix, and enhancement update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690) * httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690) * httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLBA-2021:4259 new packages: gcc-toolset-11-dyninst GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-dyninst-11.0.0-2.el8.x86_64.rpm 52aa51970a45cb360d40b51fc6950ac1d378f03f7e441f3302847fb4a0416b23 gcc-toolset-11-dyninst-devel-11.0.0-2.el8.x86_64.rpm 892e60f0d4b29630fa5239a1c9d88c344c4cbd697bae563cf5a06bb9347d14cc RLBA-2021:4263 new packages: gcc-toolset-11-valgrind GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-valgrind-3.17.0-6.el8.x86_64.rpm 22e3c8bb50f033855ffbb6f0a0cd5584ad40c22096494a26e73921a9f311e957 gcc-toolset-11-valgrind-devel-3.17.0-6.el8.x86_64.rpm 4fa4a361e3a93cd0f3167f9c3c324001858ab8647df00d1654dd80b89b52f132 RLBA-2021:4264 cloud-utils-growpart bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cloud-utils-growpart. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cloud-utils-growpart-0.31-3.el8.noarch.rpm 18d89bc1cd3b035cf124512c7878cf4e636001bd1cd982efddc321623ae2fe8f RLBA-2021:4266 cldr-emoji-annotation bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cldr-emoji-annotation. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cldr-emoji-annotation-39-2.el8.noarch.rpm 909ccf54467dbdd5edbe12253e5bfcb85367712b47b5e46f139bb8fd50ebbba7 RLBA-2021:4274 new packages: gcc-toolset-11-ltrace GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-ltrace-0.7.91-1.el8.x86_64.rpm 440eb2bf1e4b352c859409c520a72ec4afa00268b06a568a952766dc1ed61470 RLEA-2021:4275 postgresql:12 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLEA-2021:4276 postgresql:13 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLEA-2021:4277 mod_security_crs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_security_crs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_security_crs-3.3.0-2.el8.noarch.rpm be66db99becaa558aac5933314c0783c9e43732c0e07a090e039229acde4ff9f RLBA-2021:4279 new packages: gcc-toolset-11-make GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-make-4.3-2.el8.x86_64.rpm 580e8e84640ba2dccd1fbc460b3c2581c1d6ccfd130a29e427590785dbc244bd gcc-toolset-11-make-devel-4.3-2.el8.x86_64.rpm 44e8f297fa2de647b81fdb7e54560792707abe9c3c3721ee9d4a7b93a804acc2 RLBA-2021:4280 autoconf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autoconf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms autoconf-2.69-29.el8.noarch.rpm 1a4bd3963411aa30fe199196d2ef58405310adda90a6060903518dfd37892857 RLEA-2021:4282 new module: ruby:3.0 This enhancement update adds the ruby:3.0 module to Rocky Linux 8. (BZ#1938942) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the ruby:3.0 module to Rocky Linux 8. (BZ#1938942) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 RLBA-2021:4285 libvoikko bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvoikko. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvoikko-4.1.1-3.el8.x86_64.rpm 5c7ee590aa167c204857ef2e994e26be9c8ac3b74a0a5907dbb266fdddedc00f python3-libvoikko-4.1.1-3.el8.noarch.rpm 893e612a10890c76e4bcefab2513eb6c34085f801b00b1d2e28c8417956873ed voikko-tools-4.1.1-3.el8.x86_64.rpm b0f7a35b787c63187c9175d9435a7773bf9d1911543fa6e3769191347017f150 RLEA-2021:4286 lpsolve bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lpsolve. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lpsolve-5.5.2.0-21.el8.x86_64.rpm e476606c04389d6be46b60f23064e4f60ebf06df3686442956f9a3c078911d45 RLSA-2021:4288 Moderate: libjpeg-turbo security and bug fix update The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libjpeg-turbo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libjpeg-turbo-1.5.3-12.el8.x86_64.rpm 71a9f44edce13938e9fb1557ec88d9d923fe2ea547fdb3cb0926489d04e93c01 libjpeg-turbo-devel-1.5.3-12.el8.x86_64.rpm 777786c85899f62d57f0cb029424e4b6cd928de19aea0cd7ecf369a7353b245a libjpeg-turbo-utils-1.5.3-12.el8.x86_64.rpm 8f7e075b1ddbff3238735af3cb79ed0883dd1a8b7c2a35afb473d4507d707a4e turbojpeg-1.5.3-12.el8.x86_64.rpm 0a042fe31a447a3204ffa910a05cec647e16d7952f7f19d32a8e24aa2680bd2e RLEA-2021:4289 sblim-gather bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-gather. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-gather-2.2.9-24.el8.x86_64.rpm fc460831084b0f087a10aa0011b5c7ee044622bcb040a401a4e0e8cb77e508d5 RLSA-2021:4292 Moderate: squid:4 security, bug fix, and enhancement update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384) Security Fix(es): * squid: denial of service in URN processing (CVE-2021-28651) * squid: denial of service issue in Cache Manager (CVE-2021-28652) * squid: denial of service in HTTP response processing (CVE-2021-28662) * squid: improper input validation in HTTP Range header (CVE-2021-31806) * squid: incorrect memory management in HTTP Range header (CVE-2021-31807) * squid: integer overflow in HTTP Range header (CVE-2021-31808) * squid: denial of service in HTTP response processing (CVE-2021-33620) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384) Security Fix(es): * squid: denial of service in URN processing (CVE-2021-28651) * squid: denial of service issue in Cache Manager (CVE-2021-28652) * squid: denial of service in HTTP response processing (CVE-2021-28662) * squid: improper input validation in HTTP Range header (CVE-2021-31806) * squid: incorrect memory management in HTTP Range header (CVE-2021-31807) * squid: integer overflow in HTTP Range header (CVE-2021-31808) * squid: denial of service in HTTP response processing (CVE-2021-33620) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLBA-2021:4298 pyparted bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pyparted. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pyparted-3.11.7-4.el8.x86_64.rpm 78e4ef6771cb8ef1d187a15434b7063d4e95f83fc84a924085dd879494670473 RLBA-2021:4307 ipmitool bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipmitool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms exchange-bmc-os-info-1.8.18-18.el8.noarch.rpm 4a31d488720ee841ce30d3bda59e805351b6b7976c20ddc28b4a7d6ea4baa626 ipmievd-1.8.18-18.el8.x86_64.rpm 6f60b773a641fd698637567c687565d7c0f61c8012b102beebdfc19733677a58 ipmitool-1.8.18-18.el8.x86_64.rpm 4499de1e8f15fb44c99a77be0b38f895522b39f21a0c2ea503338f7055984bde RLBA-2021:4309 python-rpm-generators bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rpm-generators. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-rpm-generators-5-7.el8.noarch.rpm 6a1020de171188f81815c1afd2efd06227d114be9f5f0f83efc47cd45f50884d RLBA-2021:4311 varnish:6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for varnish, varnish-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__varnish varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm b9e50c31d639d02ea7ac7dfd44542da1eb99e9e500ff67d94cd101de8939fb2c varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm a8db537b818eb564f557f5c29fcbae4d49c524380c6dfbd3d863dcafcea915d4 varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm 67d172546cc350ba9674f91c3a1cd72149280cddff3ad7851ead00923b1378f6 varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm 9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e RLBA-2021:4313 python-ldap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-ldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-ldap-3.3.1-2.el8.x86_64.rpm 721a8e6a717b034e306d1b21ffb2d3c6d9f175bd27c818e3a25d3ea416e410a1 RLSA-2021:4316 Low: zziplib security update The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for zziplib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms zziplib-0.13.68-9.el8.x86_64.rpm b14f7c6ee1108658863a2c7254d5c2e1829fa9ee54c13ad089854f7d42e14c2d zziplib-utils-0.13.68-9.el8.x86_64.rpm fe43deb8bc190c8a2a423b7a5621122b253abe8459dbe4d78d767c3b1cc04a81 RLBA-2021:4318 apr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms apr-1.6.3-12.el8.x86_64.rpm 23636f805dc36996a57264a872409dd6c1ef9150dfa02dca7b2fa0a6016ce46b apr-devel-1.6.3-12.el8.x86_64.rpm 3e1190a514704461ab4528e39d1abb2da8be8e23327c822791750a4ba864cc5b RLEA-2021:4322 unicode-ucd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unicode-ucd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms unicode-ucd-11.0.0-2.el8.noarch.rpm 04bc0503d057701556aad5918d466d41c36877fd58183445017f34175e11a5ad RLBA-2021:4323 saab-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for saab-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms saab-fonts-0.91-18.el8.noarch.rpm c66fe7899c5ac30176a23d20a250b34d63af83382fae61ceec0898c902ab4940 RLSA-2021:4324 Moderate: python-psutil security update psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python. Security Fix(es): * python-psutil: double free because of refcount mishandling (CVE-2019-18874) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-psutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python. Security Fix(es): * python-psutil: double free because of refcount mishandling (CVE-2019-18874) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-psutil-5.4.3-11.el8.x86_64.rpm 93541c8c1475fbd127831e367cbf33db3c0881499f84ff19b057d1d64af12c6c RLSA-2021:4326 Moderate: libX11 security update The libX11 packages contain the core X11 protocol client library. Security Fix(es): * libX11: missing request length checks (CVE-2021-31535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libX11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libX11 packages contain the core X11 protocol client library. Security Fix(es): * libX11: missing request length checks (CVE-2021-31535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libX11-1.6.8-5.el8.x86_64.rpm 66600448091b07b90d26aad07eef05f65693d5ede2d1272c7d5b75a07b2deaa2 libX11-common-1.6.8-5.el8.noarch.rpm 98f5d2c3d2a2da96383645800c79d4794ee2387ad58378e65c16e32d62204190 libX11-devel-1.6.8-5.el8.x86_64.rpm 2e1561f3442cfafcae05e05640156a198cfaa3509df21a931f9ae945b51f7040 libX11-xcb-1.6.8-5.el8.x86_64.rpm 8aba2186142e2053bb7e06f871ba1fd5b71e4822ef2e6d8f8d7dcabe250e5302 RLBA-2021:4327 perl-GSSAPI bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-GSSAPI. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms perl-GSSAPI-0.28-25.el8.x86_64.rpm 4c8d266e4446421ac55fdf9fa865f8c3603a67d45473f93926c2543d8c2f1cf8 RLBA-2021:4328 scrub bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scrub. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms scrub-2.5.2-16.el8.x86_64.rpm 55f4085d7fae3b814497e5a3a380c91667e4e124099432e36032927d3fa643a0 RLBA-2021:4329 jmc:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jmc, ee4j-parent, jaf, HdrHistogram, lz4-java, owasp-java-encoder, directory-maven-plugin, jmc-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__jmc directory-maven-plugin-0.3.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm cdc5571895b15a244639a7a8fb40e9f851303ba1809ea2ebfd2e4184b78d7c96 directory-maven-plugin-javadoc-0.3.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm c0c939f0fa8a2e652dca4ae7408f8dd1fceb4f72ece36f1e79c37ef4b3ef365c ee4j-parent-1.0.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm 1238f6bff74e9abcc8cd5ecbe3ca3d672d30baf5e25ef186caf54eb839034d54 HdrHistogram-2.1.11-3.module+el8.4.0+405+66dfe7da.noarch.rpm 1769e580d88893bc4a07b3cb1bbe4d6fef5d25c6f3dc113f5a2669a52c46952d HdrHistogram-javadoc-2.1.11-3.module+el8.4.0+405+66dfe7da.noarch.rpm 200c628bb67b200a081372ee71e6e047ff677ac0109ad7facd11dbc47faca336 jaf-1.2.1-5.module+el8.4.0+405+66dfe7da.noarch.rpm 8cf5e7153281991005aeebc36fb2682a1563ccd9ee01235d15f26f190f287ad6 jaf-javadoc-1.2.1-5.module+el8.4.0+405+66dfe7da.noarch.rpm 9a3f0e098c12962f572fbabc318529b8e1b506c1e7a77b83a41e177fb625064b jmc-8.0.1-4.module+el8.5.0+676+5f023c1e.x86_64.rpm bd544cc77d0049e0a4f0781b8b45f79d1fdfe7ff83a95ec4c03b980892140c98 jmc-core-8.0.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm 612cb3ec890392a776edadc5a19d37b1b77624b58df5bcfef6d13858014834e6 jmc-core-javadoc-8.0.1-2.module+el8.5.0+676+5f023c1e.noarch.rpm a2ee0526ff552417c1db0462ba0310c8f0102705a98843fa8da3129c1a70440e lz4-java-1.7.1-14.module+el8.4.0+394+13a3c723.x86_64.rpm 9bb5f1fde802c20380728f69ca4c08d6279caa11f65a801c7347095d5687c31c lz4-java-javadoc-1.7.1-14.module+el8.4.0+394+13a3c723.noarch.rpm 245f94bfb83331301c0ff01518b70da7b759591de06c1bc9145aa82fc857b3d7 owasp-java-encoder-1.2.2-3.module+el8.4.0+405+66dfe7da.noarch.rpm a9437a61ea81da96e73368b14e8fe815d0819f62c4710d8a2b40896803f228e2 owasp-java-encoder-javadoc-1.2.2-3.module+el8.4.0+405+66dfe7da.noarch.rpm 87a1e57a334335da8869b63bde30b791a34ad727abdbe6c2b05787a34c1f7061 RLEA-2021:4331 New packages: ansible-collection-redhat-Rocky Linux_mgmt and python-pyghmi For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-collection-redhat-rhel_mgmt, python-pyghmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pyghmi-1.5.29-1.el8.noarch.rpm a5b93ca14507537ff24149b64441a1ce35470a51ecd2686df8b3e769e548cf8d RLEA-2021:4335 tesseract bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tesseract. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tesseract-4.1.1-2.el8.x86_64.rpm 7e804dcc73b5431686744c78849dd6abe1906a3a2d947143cd04cc22e11bcec1 RLBA-2021:4337 numpy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-numpy-1.14.3-10.el8.x86_64.rpm 88426273e627094ce60d92e2f38d7d8e7a24d64f5e09ba5cd30ddc7aa4d03d0f python3-numpy-f2py-1.14.3-10.el8.x86_64.rpm 26f0c3b1f51b2806a59e14b7f03c97a80d3420c80b3aeabb5ccc94f2520bc2d5 RLBA-2021:4338 python-coverage bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-coverage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms platform-python-coverage-4.5.1-9.el8.x86_64.rpm 2440743216f1852078cab6ac55e74643d943ba61b58f1df96677ac6c68ae328c python3-coverage-4.5.1-9.el8.x86_64.rpm 508eb87fcf60df12f9b13ffa9bbf3c5159e90478a343d519e47aef4858818529 RLSA-2021:4339 Moderate: grilo security update Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements. Security Fix(es): * grilo: missing TLS certificate verification (CVE-2021-39365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grilo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements. Security Fix(es): * grilo: missing TLS certificate verification (CVE-2021-39365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms grilo-0.3.6-3.el8.x86_64.rpm 406faa8be9d8e3cecbdb5d88224218bc8064a1ba7c0232000e18e516e394825d RLEA-2021:4345 pcm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pcm-202107-5.el8.x86_64.rpm 92ae3ce4eda9c08e467fbdd8c8f41056ca9e78500a631407a8028f726648b02d RLBA-2021:4348 brasero bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for brasero. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms brasero-3.12.2-5.el8.x86_64.rpm b44d64dd22fb33e76e2e1d190be29a9ae36a78fcf4089ea35f5ba60b3376f9b2 brasero-libs-3.12.2-5.el8.x86_64.rpm 932ab06fe910ca25148f898c4fdfe8cb862a0101f13407012498b2231552dae9 brasero-nautilus-3.12.2-5.el8.x86_64.rpm b4cfeaf97a50976c95f4a3f7de0c394acd5b20598d9dc38c25227cf97044d9fa RLBA-2021:4350 setroubleshoot-plugins bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setroubleshoot-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms setroubleshoot-plugins-3.3.14-1.el8.noarch.rpm f22c8a85ae65d42461748dd87cffd48bd13104b11b4b2eefcbae707514129d8c RLSA-2021:4162 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-psutil: Double free because of refcount mishandling (CVE-2019-18874) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python: Information disclosure via pydoc (CVE-2021-3426) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-psutil: Double free because of refcount mishandling (CVE-2019-18874) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python: Information disclosure via pydoc (CVE-2021-3426) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpm d85f27c4100a37c74577e44e0a1d7691b2320c26c1fe40d981594be3a8287633 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029 python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpm 9b3dbb19e62de13d9396994f865fe252d5816356d9321c3cd64fe5775f9d4218 python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm 2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm 74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm 3c6af4f697c00c5adcd95066875ad9822fdc705e974cdea514749be83dd17d52 python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm b038bdb9b50ede04d3b94fcd7e0f06625a6fee2c99be14ead3a15bc9bcdb5cc2 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm 288302321a47ab51788ad97666b0a258279ad9b0a4dba03818e20f84e517f0dd python38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm 67c84dd6faadc937503b43a5381fe9fa4aa3db54bb96b83621c2d1a0c4c9f948 python38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm c50b9253593f355f6e89721a5b6ee9025e5d8c1ea227cbc2d54b0b8fea12cf08 RLBA-2021:4533 ibus bug fix update The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems. Bug fix: * Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems. Bug fix: * Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064) rocky-linux-8-x86-64-appstream-rpms ibus-1.5.19-14.el8_5.x86_64.rpm d640b203a5d7f39666096bd8f6431de2754458602329d3ad9e0cdda2149127a3 ibus-gtk2-1.5.19-14.el8_5.x86_64.rpm 17fb91d21b32c0eafce99b60fc54f24908f5296dbf505f5d865cf0c8478f4d2b ibus-gtk3-1.5.19-14.el8_5.x86_64.rpm d6616deb0b59c7ffb51448f8970150cc2569882c1a796770734a1f54a4209a22 ibus-libs-1.5.19-14.el8_5.x86_64.rpm 55ec665058ffe34aebd18ce73c6f723a7653a852f4e5f6bf8290a3d1e0048e5d ibus-setup-1.5.19-14.el8_5.noarch.rpm 3023e6ce9e07f6a6740e46d4414d976759674ea8de02e1601e6e87a8e0795e91 ibus-wayland-1.5.19-14.el8_5.x86_64.rpm bd1554851ebce67c9961e0d1dfa0a847f8aad00fb24993ef8ba0dc384b5a206a RLSA-2021:4537 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2021:4585 Moderate: gcc-toolset-10-gcc security update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gcc-toolset-10-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-gcc-10.3.1-1.2.el8_5.x86_64.rpm 7540704c3174809261e03b7d7097217feb9f86a4c86140a4652566bcede4fbc3 gcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.x86_64.rpm f3a6e586abf184a36ae0cebb2e25a7c3fb30b9a7cf66107c7c81939bbee76bc3 gcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.x86_64.rpm f0f5e192cad7b410e5b12dde407b68fd42cbcb92aee3c4701ecf2eb07db7afd6 gcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.x86_64.rpm 225c5cd4667683d1b04d3a8ddcfc294ec0d4c5c0a16c4f56c4dd2da8b1ed0c8a gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.x86_64.rpm 78c0a8ba02a1769d00a7fd8467d37b102c6735e83db543ebcc5ff0ac5b89a6be gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.x86_64.rpm b4134855699223e24c2653af1eb983a60ba445c1bd565bf84fc6931f46b5b926 gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5.x86_64.rpm 47ff618b2d2a9c2a984c9cc41f39ac203fd42d0f2c9c4ff1d2e1453dde3369f6 gcc-toolset-10-liblsan-devel-10.3.1-1.2.el8_5.x86_64.rpm bfea9c7e7c421f7bf3dfe32906e4dfffcbc40a1533e3c1ca769e74fcf6031dc6 gcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5.x86_64.rpm 167bf467d120ca7d903ae0b7d452291073cdeb99ac106ca5286ffe60390d797f gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.x86_64.rpm 2f60776c2c62359175409514403a7159949660820ed10c89c6936b47e319a852 gcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.x86_64.rpm 4986f05abecf7adafb7d3a7eaf2f895bf4832416ea56a008e5dfb231d0f0ca04 gcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.x86_64.rpm eb951d4a541f5c80632df6ca914cc7f1dcc30b494559f7f1f4e73f52aea5daf2 gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.x86_64.rpm d4b17d92538129104ce44e190628d899cc1298da157c28ae4304f99ddd1bda94 RLBA-2021:4604 httpd:2.4 bug fix update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856) rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2021:4826 Important: mailman:2.1 security update Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) * mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mailman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) * mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mailman mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3 RLSA-2021:4916 Important: mailman:2.1 security update Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mailman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mailman mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3 RLSA-2021:5142 Moderate: idm:DL1 security update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:5171 Moderate: nodejs:16 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610) Security Fix(es): * nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918) * nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959) * llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610) Security Fix(es): * nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918) * nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959) * llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 RLSA-2021:5235 Moderate: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.9). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.9). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:5236 Moderate: postgresql:13 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.5). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.5). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:5238 Low: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930) * QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930) * QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2022:0258 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2022:0290 Important: parfait:0.5 security update Parfait is a Java performance monitoring library that collects metrics and exposes them through a variety of outputs. It provides APIs for extracting performance metrics from the JVM and other sources. It interfaces to Performance Co-Pilot (PCP) using the Memory Mapped Value (MMV) machinery for extremely lightweight instrumentation. Security Fix(es): * log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305) * log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for uom-parent, parfait, uom-systems, uom-se, si-units, uom-lib, unit-api. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Parfait is a Java performance monitoring library that collects metrics and exposes them through a variety of outputs. It provides APIs for extracting performance metrics from the JVM and other sources. It interfaces to Performance Co-Pilot (PCP) using the Memory Mapped Value (MMV) machinery for extremely lightweight instrumentation. Security Fix(es): * log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305) * log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__parfait parfait-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm d74b8a16aaf91c0284612b3cf94d57f00f56a475aebb987a125aff36182d21d4 parfait-examples-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm e2383b3c6d55bcf6fedc1010dd22919aa39aae946aa32c5afa6cad5659221d86 parfait-javadoc-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm 20039e3c65483231dbd4992913db91bd8c6e63528fa32fd666ada3b424fc4f92 pcp-parfait-agent-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm 0d23958c274471efff4ddbb52719a5664ccdea76b620f09f43d453ac29c7177d si-units-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm 6d238596ee6d6869db170d90a9e9839e5c028ff1678dc08a7e8378978eb08b0b si-units-javadoc-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm a20389dc20459d8e277b084b313764a9171b7a63c2a83066dcf5c7de70f09aa5 unit-api-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm 45f3ea7141aeeab01121669fb9d1c71287d16b63126ead63ee3a0fa485fb6e34 unit-api-javadoc-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm 14e336b8562c8c326f1bf24d01515952681212155fdeee137857ba73261b7b0d uom-lib-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm 94e383d27797c3563dd284f31e97761f3c859fabd6d43e6e2ddcfe2d66026d59 uom-lib-javadoc-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm e28c245a0b6063f0cbae3e3dd0f8512c857d581acd0425605e372967df6e2d61 uom-parent-1.0.3-3.module+el8.3.0+214+edf13b3f.noarch.rpm 665b5f7355b65fd698defae938b12f45a0cbd09982662343e43d1e75bd76c628 uom-se-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm 1c5a33c14a4db1f5c1dde1b82c0847034c2b6643969a5d5511dade96439129f9 uom-se-javadoc-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm bb06bb8d9e6d73cf8ed4d8a4c53289397dff79610badd5740d5e98c5250083f5 uom-systems-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm ff8729c2bfb1bc8ee1d487882734d0e07fcf552e6eb3223b7d2ddd1686880b14 uom-systems-javadoc-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm 1bcb94fdab29d21ff7974980bb81f9d5165e81eeeaea52f0360905b1a9f8a187 RLSA-2022:0323 Important: nginx:1.20 security update nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030) Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030) Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 8b9098490e0ed579ef134c2c7e9e47fae539d6d5242e50d33138965f578345cc nginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm 7086e83c8fa422089958552247e2ba103f5dc7c0ced95e75eec92411801fceed nginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm fac39bbea57753abe2912b2ba86b7b230c90e2945572328bae797e0f1c95c4ab nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 22ac42d3d46d47b8a58587447b601e7609f0f66c75346558c7075201e24c1b47 nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm d906cd3b87784901f32f1ad92120afc85c8b21d9dec7f08c1a0f5ce95a217256 nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 38f76d35fd980728308e94451574909e04fc39cecdbcdb9e0db195cfa2101bbc nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 7e8970264c09a96068a63b604e536a5e9c36636d45352158be17327f1fa8a3f7 nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 7d251e53fa3837429092951a3d2fb89c1439ac9798ae72a0f7ee86dc2548c75f RLBA-2022:0348 container-tools:3.0 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2022:0350 Moderate: nodejs:14 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609) Security Fix(es): * nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918) * nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701) * nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712) * llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959) * llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609) Security Fix(es): * nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918) * nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701) * nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712) * llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959) * llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLEA-2022:0352 container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLBA-2022:0357 pki-core:10.6 bug fix and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Bug Fix(es) and Enhancement(s): * Reinstall of the same ipa-replica fails with 'RuntimeError: CA configuration failed.' (BZ#2024676) * ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2029023) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tomcatjss, jss, pki-core, ldapjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Bug Fix(es) and Enhancement(s): * Reinstall of the same ipa-replica fails with 'RuntimeError: CA configuration failed.' (BZ#2024676) * ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2029023) rocky-linux-8-x86-64-appstream-rpms__pki-core ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f RLBA-2022:0358 virtio-win bug fix and enhancement update The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Rocky Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. Bug Fix(es) and Enhancement(s): * virtio-win RPM for 8.5.0z (BZ#2033400) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virtio-win. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Rocky Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. Bug Fix(es) and Enhancement(s): * virtio-win RPM for 8.5.0z (BZ#2033400) rocky-linux-8-x86-64-appstream-rpms virtio-win-1.9.24-2.el8_5.noarch.rpm d8a68c30a4ce25e2ab7ecd7805ad646b12939d374c5bf0d1230e45c06fdb7075 RLBA-2022:0361 virt:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2022:0418 Important: varnish:6 security update Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for varnish, varnish-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__varnish varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm b9e50c31d639d02ea7ac7dfd44542da1eb99e9e500ff67d94cd101de8939fb2c varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm a8db537b818eb564f557f5c29fcbae4d49c524380c6dfbd3d863dcafcea915d4 varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm 67d172546cc350ba9674f91c3a1cd72149280cddff3ad7851ead00923b1378f6 varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm 9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e RLSA-2022:0441 Important: aide security update Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for aide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aide-0.16-14.el8_5.1.x86_64.rpm cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa RLSA-2022:0543 Important: ruby:2.6 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm 2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm 338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197 rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm 0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372 RLSA-2022:0545 Important: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 35b1eb070daa09c0d94dfb8309d9246462588237b6ad7d097d09c3ff407d096e rubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 276974bce2b60db0a7af8e3c22f2ed904de58b105b059402ddb8011f5fde1cc4 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLSA-2022:0643 Important: python-pillow security update The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms python3-pillow-5.1.1-18.el8_5.x86_64.rpm c3b196ec79ed44cbba9c193e5da4687349ed47692644581fa5028742c74ff5fc RLSA-2022:0672 Moderate: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 35b1eb070daa09c0d94dfb8309d9246462588237b6ad7d097d09c3ff407d096e rubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 276974bce2b60db0a7af8e3c22f2ed904de58b105b059402ddb8011f5fde1cc4 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLBA-2022:0882 redhat-support-lib-python and redhat-support-tool bug fix and enhancement update The redhat-support-tool utility facilitates console-based access to Rocky Enterprise Software Foundation's subscriber services and gives Rocky Enterprise Software Foundation subscribers more venues for accessing the content and services available to them as Rocky Enterprise Software Foundation customers. Further, it enables Rocky Enterprise Software Foundation customers to integrate and automate their helpdesk services with our subscription services. The redhat-support-lib-python package provides a Python library that developers can use to easily write software solutions that leverage Rocky Enterprise Software Foundation Access subscription services Bug Fix(es) and Enhancement(s): * Add support to upload to and download from S3 (BZ#2028540) * Add support to upload to and download from S3 (BZ#2028543) * Add support for handling JSON response from API's (BZ#2028546) * RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028550) * Add support for handling JSON response from API's (BZ#2028553) * RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028556) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for redhat-support-tool, redhat-support-lib-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The redhat-support-tool utility facilitates console-based access to Rocky Enterprise Software Foundation's subscriber services and gives Rocky Enterprise Software Foundation subscribers more venues for accessing the content and services available to them as Rocky Enterprise Software Foundation customers. Further, it enables Rocky Enterprise Software Foundation customers to integrate and automate their helpdesk services with our subscription services. The redhat-support-lib-python package provides a Python library that developers can use to easily write software solutions that leverage Rocky Enterprise Software Foundation Access subscription services Bug Fix(es) and Enhancement(s): * Add support to upload to and download from S3 (BZ#2028540) * Add support to upload to and download from S3 (BZ#2028543) * Add support for handling JSON response from API's (BZ#2028546) * RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028550) * Add support for handling JSON response from API's (BZ#2028553) * RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028556) rocky-linux-8-x86-64-appstream-rpms redhat-support-lib-python-0.13.0-0.el8_5.noarch.rpm a3713475fe27990e2a8dc87fbc2deea8afae8e7fffa8ae2cfc144982b1698c06 redhat-support-tool-0.13.0-0.el8_5.noarch.rpm d08b6effb550f05dc9fe44817af7b6f66c20cab1dc7a1f6f639f046f0e8cd2e4 RLSA-2022:0886 Moderate: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2022:0891 Moderate: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2022:1049 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2022:1556 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514) * MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532) * Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533) * Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514) * MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532) * Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533) * Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550) rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLSA-2022:1557 Moderate: mariadb:10.5 security, bug fix, and enhancement update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515) * mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524) * Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515) * mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524) * Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542) rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLBA-2022:1560 pki-core:10.6 bug fix update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Bug Fix(es): * ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2061458) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tomcatjss, jss, pki-core, ldapjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Bug Fix(es): * ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2061458) rocky-linux-8-x86-64-appstream-rpms__pki-core ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f RLBA-2022:1561 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Error replacing a replica with CentOS Stream 9 (BZ#2062404) * reinstalling samba client causes winbindd coredump (BZ#2065719) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Error replacing a replica with CentOS Stream 9 (BZ#2062404) * reinstalling samba client causes winbindd coredump (BZ#2065719) rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2022:1563 virt:rhel and virt-devel:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2022:1565 Moderate: container-tools:3.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961) rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2022:1566 Moderate: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm f05e3a5804bc41a2cbe15e7dd640a8b1f466adb07480ac7090f9e125f180d54a buildah-tests-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm 75c858735e75051b96c44ac94a357625b3459f31c4714ced8fe9b7be74b2e235 cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 podman-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm 2bb6b433aeffad66524fee9505a40bbe68e2caccb3210657ed8c8da6fee1e276 podman-docker-1.6.4-28.module+el8.5.0+770+e2f49861.noarch.rpm 06f24ab416c7a333cca3796d9702eb1adf49c4ccb9595715dda0cfd6e0b64158 podman-remote-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm bc4b311ff224a47fcbdbb1e270c032aafc2705b1312e96b5dc45b2b45aacc364 podman-tests-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm f77b5368ea0054f95286a0d27bcd7867bb9e793de93550f8a956403c02c79ea7 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm 2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2022:1761 gcc-toolset-11-gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-libasan-devel-11.2.1-9.1.el8.x86_64.rpm 8c531bddbe5c1e180d660086855220b674d590560b3fe16bdcf5bec6c03565cd gcc-toolset-11-liblsan-devel-11.2.1-9.1.el8.x86_64.rpm 7ea82f68a26c5141760207388077e010f4588b4f9b70355062d551a7a960a902 gcc-toolset-11-libquadmath-devel-11.2.1-9.1.el8.x86_64.rpm d55d5364205ac1921cf4aa34f0366fcdbb1af4df4a24cea8bf6ae24776568dcb gcc-toolset-11-gcc-11.2.1-9.1.el8.x86_64.rpm 55b7a4d78981bdaa96e1714d261c6d0cc5765d33b99601e6dd1910af466ece5e gcc-toolset-11-gcc-c++-11.2.1-9.1.el8.x86_64.rpm dab6a4db71182b486a96d0fdd8d00d9f8fb79950de4dd7e3a9fb2a5c550e6c31 gcc-toolset-11-gcc-gdb-plugin-11.2.1-9.1.el8.x86_64.rpm bbadb1f377705308377525bda83d4670fbfef3aa9349ff8247a73c6858c11cbf gcc-toolset-11-gcc-gfortran-11.2.1-9.1.el8.x86_64.rpm 50bbacaef62a786cf61e2953a9dd545b43196bd4fe5f85578be6ca2a46ca27a2 gcc-toolset-11-gcc-plugin-devel-11.2.1-9.1.el8.x86_64.rpm e85a7a32d6fa3bc19b04bb8794efc10deacc41a2e1ecef5d0f46727886b5a743 gcc-toolset-11-libatomic-devel-11.2.1-9.1.el8.x86_64.rpm 0e931bbc87d9727198466655485c6d3a7245ed4b1d17e6d4fb554645c33791c1 gcc-toolset-11-libgccjit-11.2.1-9.1.el8.x86_64.rpm e13a692af85fafbdd5b6c998a780a99c43ee8d4818b8fa6bc354f25be6d1820f gcc-toolset-11-libgccjit-devel-11.2.1-9.1.el8.x86_64.rpm 5832a93871a5901f23a9fdb1238e06a5f92d0ba2a065076755af6432aaef904e gcc-toolset-11-libgccjit-docs-11.2.1-9.1.el8.x86_64.rpm a55a1e9b527968edae0d9c1837fbd0d8150d2647ee2a43a9e8937628d0665f2d gcc-toolset-11-libitm-devel-11.2.1-9.1.el8.x86_64.rpm de730760d63d865954eb6d526717a8d5ca5242905dafaf1cd8b5710e88eb2c1d gcc-toolset-11-libstdc++-devel-11.2.1-9.1.el8.x86_64.rpm dacb6447df8255683e9f59207e25eb1d3d0a623d338bf643d30f43827399545d gcc-toolset-11-libstdc++-docs-11.2.1-9.1.el8.x86_64.rpm 14683e54880445a43df79bb23fc77e5d4b8d5c99c05da399f82a6348f25eb46d gcc-toolset-11-libtsan-devel-11.2.1-9.1.el8.x86_64.rpm b66e5ba1f658b4496922a4bc5d5860fc05195a1c8e04d8fff7fcf9640d6125fd gcc-toolset-11-libubsan-devel-11.2.1-9.1.el8.x86_64.rpm 5b4d8b23fb0a11f41583725ee2c7b3bcbde1eecd19108e38628e2d1b7bf731b0 libasan6-11.2.1-9.1.el8.x86_64.rpm 4d7f7522004e9f9ade90c1bda34985df154802745e64820e8b5ff0fca25b18d7 RLSA-2022:1764 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860) Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860) Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpm d85f27c4100a37c74577e44e0a1d7691b2320c26c1fe40d981594be3a8287633 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpm 7867930af945070f981bdaa8645a2cbabe1c20d36c2afd88a03cec102bfef2cd python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029 python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpm 9b3dbb19e62de13d9396994f865fe252d5816356d9321c3cd64fe5775f9d4218 python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm 2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm 74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm 3c6af4f697c00c5adcd95066875ad9822fdc705e974cdea514749be83dd17d52 python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm b038bdb9b50ede04d3b94fcd7e0f06625a6fee2c99be14ead3a15bc9bcdb5cc2 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm 288302321a47ab51788ad97666b0a258279ad9b0a4dba03818e20f84e517f0dd python38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm 67c84dd6faadc937503b43a5381fe9fa4aa3db54bb96b83621c2d1a0c4c9f948 python38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm c50b9253593f355f6e89721a5b6ee9025e5d8c1ea227cbc2d54b0b8fea12cf08 RLBA-2022:1770 evince bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evince. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evince-libs-3.28.4-16.el8.x86_64.rpm fb8c9b16a783e917de4cbedd8f687777b790874348c8a818c26e43b9946b1026 evince-3.28.4-16.el8.x86_64.rpm 4b89edf257c0c87227a5dcea0e42852933bc381cabd0b85117f819cc47abd048 evince-browser-plugin-3.28.4-16.el8.x86_64.rpm d772b8a7820f4606899ae37f2ea1ca79d3a8e6f66c8a18801470b572616a22e0 evince-nautilus-3.28.4-16.el8.x86_64.rpm 4de0dd97df1d0379eeac86c9fd9731bd67b67b0f9c295a9f37d8a2c1f6d2badc RLBA-2022:1784 js-d3-flame-graph bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for js-d3-flame-graph. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms js-d3-flame-graph-4.0.7-1.el8.noarch.rpm a10198dd214d7c058c6210e5532acf0092dd08731dc079d8912f46fc89b56699 RLBA-2022:1789 certmonger bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for certmonger. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms certmonger-0.79.13-5.el8.x86_64.rpm 9a594693b16cc0399de587c611d818d10c15fc5321b99c3bec7bc8c725360f3d RLBA-2022:1790 libpinyin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpinyin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpinyin-2.2.0-2.el8.x86_64.rpm f7cc05cac86c98616dc9f56207505c2e980f7bd0feba15a5007056e7f8c65478 libpinyin-data-2.2.0-2.el8.x86_64.rpm e4d105f0edecc9ef1b34463a0ad865cc4ec4a2be853820cfd277f0f1452eeaa4 libzhuyin-2.2.0-2.el8.x86_64.rpm 3bc4c86c897dac5e0aa555966bd9abccf88cb3e8aed5f3d1a9306b47604e1545 RLBA-2022:1794 libmemcached bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmemcached. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libmemcached-1.0.18-17.el8.x86_64.rpm b01aa0dec0396ea605e5e144b56b26ac5ab6c5f512fe8c26af4e95cc2fe74fd1 libmemcached-libs-1.0.18-17.el8.x86_64.rpm 79f88c46d4fc83d343996e1959c868674ff4542061026f0278702808ee4d4aa9 RLBA-2022:1800 accountsservice bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for accountsservice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms accountsservice-0.6.55-4.el8.x86_64.rpm 111ac52115876ea83896c95c7fc1d4885ef7916bfccc1c67cc9ae5c3ac1f2aad accountsservice-libs-0.6.55-4.el8.x86_64.rpm caf042716f9d89983e8d36a58f3d48ed8d0d30e02871e160fdff59e59b17084e RLSA-2022:1801 Moderate: gfbgraph security update GLib/GObject wrapper for the Facebook Graph API that integrates with GNOME Online Accounts. The following packages have been upgraded to a later upstream version: gfbgraph (0.2.4). (BZ#1997941) Security Fix(es): * gfbgraph: missing TLS certificate verification (CVE-2021-39358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gfbgraph. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib/GObject wrapper for the Facebook Graph API that integrates with GNOME Online Accounts. The following packages have been upgraded to a later upstream version: gfbgraph (0.2.4). (BZ#1997941) Security Fix(es): * gfbgraph: missing TLS certificate verification (CVE-2021-39358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gfbgraph-0.2.4-1.el8.x86_64.rpm a87c20bff6e5d12e128387db8895f77c29aecac5b482e7231f2b406409156147 RLBA-2022:1818 libnotify bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnotify. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libnotify-0.7.7-6.el8.x86_64.rpm b77107b01be0756468f03b12b034843555134ff13043edfc9e0e4ff1a048cd99 libnotify-devel-0.7.7-6.el8.x86_64.rpm 0a3e2b1920bcf1cc6cb537d4365d32e4e11d85b7a484eff139d61156db594de5 RLBA-2022:1822 ibus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ibus-1.5.19-14.el8_5.x86_64.rpm d640b203a5d7f39666096bd8f6431de2754458602329d3ad9e0cdda2149127a3 ibus-gtk2-1.5.19-14.el8_5.x86_64.rpm 17fb91d21b32c0eafce99b60fc54f24908f5296dbf505f5d865cf0c8478f4d2b ibus-gtk3-1.5.19-14.el8_5.x86_64.rpm d6616deb0b59c7ffb51448f8970150cc2569882c1a796770734a1f54a4209a22 ibus-libs-1.5.19-14.el8_5.x86_64.rpm 55ec665058ffe34aebd18ce73c6f723a7653a852f4e5f6bf8290a3d1e0048e5d ibus-setup-1.5.19-14.el8_5.noarch.rpm 3023e6ce9e07f6a6740e46d4414d976759674ea8de02e1601e6e87a8e0795e91 ibus-wayland-1.5.19-14.el8_5.x86_64.rpm bd1554851ebce67c9961e0d1dfa0a847f8aad00fb24993ef8ba0dc384b5a206a RLSA-2022:1823 Moderate: mod_auth_openidc:2.3 security update The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786) * mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791) * mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792) * mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mod_auth_openidc, cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786) * mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791) * mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792) * mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102 RLBA-2022:1827 librdkafka bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librdkafka. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms librdkafka-0.11.4-3.el8.x86_64.rpm a4b09561b1efb5a87696b0604671810e62aeca4dcd470ec07b9f0e4c0f677b19 RLBA-2022:1829 virt-viewer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-viewer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms virt-viewer-9.0-12.el8.x86_64.rpm c8ab81e91ad618ba06c071cd61b6445eff11083e644705ae4cbaf2c0738ff7d5 RLBA-2022:1834 pesign bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pesign. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pesign-0.112-26.el8.x86_64.rpm 60dc0388fc7f3541b208ef7084efa30bf0aae086a5874efaf751cab420bd4b8e RLBA-2022:1836 redhat-support-lib-python bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for redhat-support-tool, redhat-support-lib-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms redhat-support-lib-python-0.13.0-0.el8_5.noarch.rpm a3713475fe27990e2a8dc87fbc2deea8afae8e7fffa8ae2cfc144982b1698c06 redhat-support-tool-0.13.0-0.el8_5.noarch.rpm d08b6effb550f05dc9fe44817af7b6f66c20cab1dc7a1f6f639f046f0e8cd2e4 RLBA-2022:1838 nss-pam-ldapd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nss-pam-ldapd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nss-pam-ldapd-0.9.9-5.el8.x86_64.rpm 1c7a0729e994b202a859ea9c573239de2e6f62ff4a20c907d5e7f626e8b3d313 RLSA-2022:1842 Moderate: exiv2 security, bug fix, and enhancement update Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422) Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for exiv2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422) Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms exiv2-0.27.5-2.el8.x86_64.rpm cfc76de579f2e1df9d8f0a31087465508607573be2a4b0955dae956b542ce538 exiv2-libs-0.27.5-2.el8.x86_64.rpm 6b50be335ac80aa78e50ecd8a69564ea80b5a0cee93e48b74f5061c7d4e390c6 RLBA-2022:1855 mesa and related packages bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdrm, libglvnd, mesa. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libglvnd-glx-1.3.4-1.el8.x86_64.rpm b01e2356538e6d15e2eb5b21902e6ed0b400186bac257c2d13a2b5cc9d2ad4c6 libglvnd-1.3.4-1.el8.x86_64.rpm f1163ceb211495b2a91499a2141c16733e43d7c66693e32d22fd820149258df0 libglvnd-core-devel-1.3.4-1.el8.x86_64.rpm 42500c9215dd43b4e96fc7e43647dfa84b9da8733ae83dadbbe261bac9861c63 libglvnd-devel-1.3.4-1.el8.x86_64.rpm b4ca66f315566cde4f6937b8c22f44326ec74e330807658fd83b0b1aa47ba5af libglvnd-egl-1.3.4-1.el8.x86_64.rpm 2ef9230943c2926f32bf154b8e658fffcc0d688581c7336501b28b959f21bab6 libglvnd-gles-1.3.4-1.el8.x86_64.rpm 233c89561015a077d8233167b5ae05346ae76c8bc01a8b60cbd21a24c0c44f40 libglvnd-opengl-1.3.4-1.el8.x86_64.rpm 09abf13b00e3ed08ee9c785a6387b55ae1104c93e9d27797d6ace76080bbc4e1 RLBA-2022:1868 freeradius:3.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeradius. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__freeradius freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 1e8b3b99d9fc3b5342025649b5896806e159286d54e6904a98791df010bef14f freeradius-devel-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 70f19035db8bc4a89bc155e860276414d9458861c130acf2c11c13f86b3b91c1 freeradius-doc-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm f3c8b43ec991aa6dc7edc64348c8a23e8bff4adba392b62707d9b44199ba430e freeradius-krb5-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 27b16326b6c4650e7e0c33027b2fadb02f4a10311f13afc38eab9d5d7cf5b556 freeradius-ldap-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 2ad0a32f55c4eddd09aac0c5185a7e88ef5fe062df601c07925b50ef93a367ec freeradius-mysql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm a9af343bd4e84800c15760b58c83f2a161756dd1df1b8fe5fa825b02e2ea9089 freeradius-perl-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 8485e5f25b08399e5bd292fb848281c058edfbe9b4b8e5f569cd8f12e8e0ac09 freeradius-postgresql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 02fd34ed5aac035cf2bbe5e520c79be88ff0432b89b7dcdb60fb611c807c1680 freeradius-rest-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 4c341c6244c5fa2d45b62da76cd4dc23c6cbe3b32d0f42722486960f3d767f33 freeradius-sqlite-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm c6a11c1d56dd96e69867d49c91a1bd1ed95d429ebca2e5a63b9f7487a6a4aeb6 freeradius-unixODBC-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm d1c7b7b0d12278c9ac2aa57a4e9a5fa87c49e2840458cf10542f3b0416c3e198 freeradius-utils-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm d72976b00fbf0c97038a8951eea8444e2dd9cdc9e583bd873ec87dfd7cab6977 python3-freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm e3ef89fceddc589a575ade624e50f9da072396c0b860ef217d5b166b1ebbb45b RLBA-2022:1871 corosync bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for corosync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms corosynclib-3.1.5-2.el8.x86_64.rpm 7849214cea901afad69a3246b2548cf903ba9714faeb24bdbec52342fe78ac48 RLBA-2022:1872 gcc-toolset-10-binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-binutils-2.35-11.el8.x86_64.rpm 23f870f3c02d15a65fcdbd64c5090f526ca6ddb157ac297e2c914d0d1bc25231 gcc-toolset-10-binutils-devel-2.35-11.el8.x86_64.rpm 5c4e4cb0067ea909a4a0fa13385cc9978afffdc01f2a7c5c55ba42bf5ccc7262 RLBA-2022:1873 gcc-toolset-11-binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-binutils-2.36.1-2.el8.x86_64.rpm e4de3c87cb5ed806dbe98810514d659919aa53d371e56ade88f03f412a25cbbb gcc-toolset-11-binutils-devel-2.36.1-2.el8.x86_64.rpm 3e2ac4ad76bdbe5c9c1f39fd49ee626211d9e58282b188ee2464f9b75324986f RLSA-2022:1891 Low: libpq security update The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. Security Fix(es): * postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libpq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. Security Fix(es): * postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpq-13.5-1.el8.x86_64.rpm 871c6b4ca25f1c2d48340cf813ea64a4f100249f6b5826bc2a9b1d1d375831fe libpq-devel-13.5-1.el8.x86_64.rpm 59f455a4b0422a4618ca16c3e22854c86fd67e80e1c79a0887d678e909e2c677 RLBA-2022:1895 libecpg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libecpg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libecpg-13.5-3.el8.x86_64.rpm a4e29a1002f40223c0380a1fd3a6257f4a9f76b97cd17641afe19a564f219a93 libpgtypes-13.5-3.el8.x86_64.rpm 2fdebefb15fc6e9104d0008a93f0e914a853c7a4806e4132395b21cda066d823 RLBA-2022:1899 spamassassin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spamassassin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spamassassin-3.4.6-1.el8.x86_64.rpm 9e5317a0af1ce3815d80fbb4604e16d7ecb8bd9deeff0167ad037ac5ac004e46 RLBA-2022:1905 gcc-toolset-11-gdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-gdb-10.2-5.el8.x86_64.rpm 507fd1b65448322eb4f7be5b9bc505287e1c57ef187a4547c687f517e70e8968 gcc-toolset-11-gdb-doc-10.2-5.el8.noarch.rpm 69f2d660a0b8bba2d069e2fbb00a66b15087eb0a64b4d0d73bdcb0d59e0affcd gcc-toolset-11-gdb-gdbserver-10.2-5.el8.x86_64.rpm 4672600d290a3509945c9330e81420f0ad327bd98da8cb23f68d12fd53c83274 RLBA-2022:1922 mdevctl bug fix and enhancement update The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdevctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel. rocky-linux-8-x86-64-appstream-rpms mdevctl-1.1.0-2.el8.x86_64.rpm c9b7910936d7fabc88c66452df359e90494a2d3ebc7f0ba8bb07ecc66c7cd9a5 RLBA-2022:1927 mozilla-filesystem bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mozilla-filesystem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mozilla-filesystem-1.9-19.el8.x86_64.rpm dd82ce2bc279b2c69a478f85b58431ffa2c4b152f9a2751c6553b8ac3532fc05 RLSA-2022:1935 Moderate: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Local privilege escalation via PHP-FPM (CVE-2021-21703) * php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Local privilege escalation via PHP-FPM (CVE-2021-21703) * php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLBA-2022:1937 gcc-toolset-11 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-11.1-1.el8.x86_64.rpm e09d7949c64eebf62003d85a59868b567fbde7b2237bcceaa14a3149b303d2d5 gcc-toolset-11-build-11.1-1.el8.x86_64.rpm 1025dd8704d707157905fed44971dc96e2893698b993b94db993ee2ec971b761 gcc-toolset-11-perftools-11.1-1.el8.x86_64.rpm d32231d4a47739e03ce4fc39394d26413e5844554c7e93b37c5c8eb434826c61 gcc-toolset-11-runtime-11.1-1.el8.x86_64.rpm d57f1b8ca87240cd4dbd58f549e85673c39be4ae19c5890ac297c2235c96f9d8 gcc-toolset-11-toolchain-11.1-1.el8.x86_64.rpm 20b579e339bc9e8eecaaa22cf1e75b1beb722b0cdecfb97587642614409e3647 RLSA-2022:1939 Moderate: squid:4 security and bug fix update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm 7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a RLSA-2022:1964 Moderate: fetchmail security update Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client. Security Fix(es): * fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386) * fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fetchmail. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client. Security Fix(es): * fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386) * fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fetchmail-6.4.24-1.el8.x86_64.rpm 684c206b13c58381b25384d7b4b66507cc796811c738a4356b5b91904f4e9210 RLBA-2022:1965 plymouth bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for plymouth. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms plymouth-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 00b086a9069c7f5eb967de8f56e31c1560bb0e49d5c28cbc95b7f921d713f0a8 plymouth-core-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 76ae32a05325b0c1bb3907f4a90cc8f8468fd8c81815eac54d5fe9242c1d10dd plymouth-graphics-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm bb4826aa5ede058a2253013b199fd6531e53e96786b40e33b8057617c9ca24d9 plymouth-plugin-fade-throbber-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm ba76ac771f037ca36c4619df4be0b37c46cf4cee9bf512ec6d07d6bce6a4b102 plymouth-plugin-label-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 181eddf9e8a7b96fa5d7150a703f7d603d7ddd43ce1736943c17c2400c29c114 plymouth-plugin-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 82b113585a40bd7677a0ee48df618096dc991987ab52a49b72809714134bfb4a plymouth-plugin-space-flares-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 2ffb9c0ebf8bfe32100d18ebbbbc106f5cf96d7b69f36a341c63ca1bcc578d22 plymouth-plugin-throbgress-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm d0fbc8b21f3a8fdb6c2504d276f47eab45e99dcaa2fbd3bdb528cdd9019c1762 plymouth-plugin-two-step-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 4d7d08bdf934fc99bde6c8ccbad38fe8daa2447c52b5868a002c7c8420757aa2 plymouth-scripts-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 2477fb861b4aa2cf66a64457d3785549ae4c72f6da4dde2ac6c13763c84ce2ba plymouth-system-theme-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm d8dc8eb03f4b4a505124e7eada3974a8b912e5b14840738854575203e175691f plymouth-theme-charge-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm b47cc533faf9caee9a6c824572f08774b47281973a986d5f9f59e61aee973a1e plymouth-theme-fade-in-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm b7e8e98d969700edd6ecea353ccb9f5cc1ed4d16535bf0bc31185f84ad1bc49c plymouth-theme-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm b51b3692c1c547df089297070953537cacb7eecf0ff4134698e3201183c6d184 plymouth-theme-solar-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm a0db572c9a96cd00d6e678bebfacff850925ecc06928601bdd395e536e7c3694 plymouth-theme-spinfinity-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 6c5560e1521809493b6baab6ae08adc77b574538721dc2f9601a3676c554604d plymouth-theme-spinner-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm ac40b96199a4f11778bbeb3bb774babad457275d85feffb3931d4768d234b5de RLBA-2022:1967 python-suds bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-suds. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-suds-0.7-0.11.94664ddd46a6.el8.noarch.rpm 25c5d401b6029f3e08e127a4ccbfb43d002b577f5240833c3f2a311cdc451e3a RLSA-2022:1759 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355) Security Fix(es): * QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748) * ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285) * ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286) * ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287) * ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289) * ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266) * ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267) * ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268) * ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269) * ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251) * ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252) * ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253) * ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254) * ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255) * ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256) * ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257) * ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258) * ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259) * ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260) * ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261) * ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262) * ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263) * libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485) * hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) * nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716) * libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975) * QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145) * QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158) * QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355) Security Fix(es): * QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748) * ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285) * ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286) * ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287) * ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289) * ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266) * ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267) * ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268) * ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269) * ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251) * ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252) * ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253) * ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254) * ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255) * ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256) * ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257) * ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258) * ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259) * ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260) * ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261) * ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262) * ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263) * libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485) * hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) * nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716) * libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975) * QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145) * QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158) * QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d RLSA-2022:1762 Important: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 RLSA-2022:1763 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57 python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm 49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12 python39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm 5204c287450cf1579ca958d4b8e807cb70b5b7f55903604f6e8c64b9da8df019 python39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm eb25c5ade496b7c9d8ac56a635c29813f9e7b57f108e146e4be32678bea3874d python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm 2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55 python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm 58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190 python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0 RLEA-2022:1767 nginx:1.20 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 8b9098490e0ed579ef134c2c7e9e47fae539d6d5242e50d33138965f578345cc nginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm 7086e83c8fa422089958552247e2ba103f5dc7c0ced95e75eec92411801fceed nginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm fac39bbea57753abe2912b2ba86b7b230c90e2945572328bae797e0f1c95c4ab nginx-mod-devel-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 1bef73d9ec96e3ea6dbc20bea0dab1a592f5fc5afc14aafe4179ac9ddc81dc79 nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 22ac42d3d46d47b8a58587447b601e7609f0f66c75346558c7075201e24c1b47 nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm d906cd3b87784901f32f1ad92120afc85c8b21d9dec7f08c1a0f5ce95a217256 nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 38f76d35fd980728308e94451574909e04fc39cecdbcdb9e0db195cfa2101bbc nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 7e8970264c09a96068a63b604e536a5e9c36636d45352158be17327f1fa8a3f7 nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 7d251e53fa3837429092951a3d2fb89c1439ac9798ae72a0f7ee86dc2548c75f RLBA-2022:1769 libgit2-glib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgit2-glib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgit2-glib-0.26.4-3.el8.x86_64.rpm d1edcdc02b09b6d0bbea2ea82193f142fcd5a46d65f23b033c9a73ecfad6006d RLBA-2022:1779 usbguard bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usbguard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms usbguard-1.0.0-8.el8.x86_64.rpm d0744bfbb307d7373e66581992f59b65d2bc6eeab255998e4381db97daf9b32e usbguard-dbus-1.0.0-8.el8.x86_64.rpm 70124d46923db66036b4cc4124524754b889bd02fe7d1ce90a767ca7ba245126 usbguard-notifier-1.0.0-8.el8.x86_64.rpm c4fb2066028324a13f65fb5413819cc016084822aa6d808b81da0a1829face57 usbguard-selinux-1.0.0-8.el8.noarch.rpm 529f010cb3eaff7413b133380a7f0e22e35ffd099e62dbc13b78c77df37d0bd2 usbguard-tools-1.0.0-8.el8.x86_64.rpm 1968b7e0ed6e8504071df5dacfb780cfaa42667009563a9256ab2ca245b09742 RLBA-2022:1788 jq bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jq-1.6-3.el8.x86_64.rpm 2195fdec718ee82c3274825465f936cd3b2457323da254f681e77f9883e0e5ef RLSA-2022:1793 Moderate: container-tools:3.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2022:1797 Moderate: compat-exiv2-026 security update Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for compat-exiv2-026. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms compat-exiv2-026-0.26-7.el8.x86_64.rpm 78164a9e0f93342ed57af835a136e2d845c635b614a5c9464778a78d4cfcab43 RLBA-2022:1802 gcc-toolset-11-elfutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-elfutils-0.185-5.el8.x86_64.rpm 945d9ae78b45022525fa7d11189f3745e1b7d071d13ca2923f9ebfdff7b0c979 gcc-toolset-11-elfutils-debuginfod-client-0.185-5.el8.x86_64.rpm 70192dfdca07e1c592b29582ce1be8c30ff08b0f302551f8a3ffe7dbcdf2993a gcc-toolset-11-elfutils-debuginfod-client-devel-0.185-5.el8.x86_64.rpm ca7b65fcf980bc7d5e81a50ca4b99f380458289c580093cc7afff2b339763e8c gcc-toolset-11-elfutils-devel-0.185-5.el8.x86_64.rpm beba053cc78152742b044218e4c2e5cc23de10ded7746bfda094d93694392c92 gcc-toolset-11-elfutils-libelf-0.185-5.el8.x86_64.rpm 49a8d44581c79eaaa4677a61a41e43542085da9aceca8544d0d882294f151ec0 gcc-toolset-11-elfutils-libelf-devel-0.185-5.el8.x86_64.rpm edbde0836414eeb7484506c342e1ba1b991aa3e0edc3b1796718aa9d8a1a4d86 gcc-toolset-11-elfutils-libs-0.185-5.el8.x86_64.rpm 796dd175cba886d5a8de41243bf75e1dbf212801fcdd4a64361f6f5e4bd344c4 RLBA-2022:1803 fence-virt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fence-virt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fence-virt-1.0.0-2.el8.x86_64.rpm 76c7d89484468bf87ddaebe27482659d8034dff50f29182fbda8edcf2ba2ecf1 fence-virtd-1.0.0-2.el8.x86_64.rpm f4aa67de39a9ce7c6fa45fdd7f8210c8f3b93cefc300a1600aee9ddd61cc4182 fence-virtd-cpg-1.0.0-2.el8.x86_64.rpm 3b3dfc81f909a2e420d6cb5c0362e467634306b3933cd9c659571aa34fd9c231 fence-virtd-libvirt-1.0.0-2.el8.x86_64.rpm 5c5678b035ddd27c35cc0fb2fc3c1ffb7a47d39e34e96ce51cec9d09980efe64 fence-virtd-multicast-1.0.0-2.el8.x86_64.rpm 66e6ba450474fb77e5a22d22de79c20ce3207bf768db31776ad7667519e17378 fence-virtd-serial-1.0.0-2.el8.x86_64.rpm 8edc8ef1d257d76b4bdc3694b7077724c21a7138fa92252294dcf6ca70fc31ba fence-virtd-tcp-1.0.0-2.el8.x86_64.rpm c67ee2384ba6ca843e8d988552f624c92ca4e2050e54ee64208082c35b736546 RLSA-2022:1808 Moderate: aspell security update GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker. Security Fix(es): * aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for aspell. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker. Security Fix(es): * aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms aspell-0.60.6.1-22.el8.x86_64.rpm 35a21a9a576b4ce6f4b34851a880ece09a2baaf51d16df49edbcd76b8e19f243 RLBA-2022:1809 tcsh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tcsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tcsh-6.20.00-15.el8.x86_64.rpm c23f4421eb59f2a1f06c6956a2972b13f3341529d1557d5e2ef2d204ef4cf5e5 RLBA-2022:1811 ypserv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ypserv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ypserv-4.1-1.el8.x86_64.rpm 077ca96ec9ba1f447a80706d068c4f84284b4a8f982961f0e229f316d64a31c1 RLBA-2022:1816 new module: container-tools:4.0 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 RLSA-2022:1820 Low: udisks2 security and bug fix update The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for udisks2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libudisks2-2.9.0-9.el8.x86_64.rpm 13a2d984b5d4a21f35ab57ddd95914c27ccc916993620b4dab9bbd697ee2911a udisks2-2.9.0-9.el8.x86_64.rpm 5d4821126edacaebbe000dd9896ebb8dc63993f6f5da7e689e9968f946738a22 udisks2-iscsi-2.9.0-9.el8.x86_64.rpm 56eaaef8707e7c62a15fb4ce052a398cca4de48677e8ef3b7b9d10e96184cce2 udisks2-lsm-2.9.0-9.el8.x86_64.rpm 375eeb6adab3d131e8d96cbc816da721444799bcbf8f60c6b45d7b0f23016578 udisks2-lvm2-2.9.0-9.el8.x86_64.rpm b9ad578c257ddfc2788078ef33be243cde33c0a9f6793529b334c2ebaa860412 RLSA-2022:1821 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python: ftplib should not use the host from the PASV response (CVE-2021-4189) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python: ftplib should not use the host from the PASV response (CVE-2021-4189) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 4af53602814c4e6074f48e25713ef6f8384bf956bdcefb1d33abd3c1071671ad python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 9de14f945b487d8dc1f04035a229c98f3f2cc7ec0522d921c10217b302ef997b python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm 6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91 python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-jinja2-2.10-9.module+el8.7.0+1062+663ba31c.noarch.rpm d273ecf02c532bb6e73c45d77e576f1b36560f9b9d913ac3f82f031b3503292e python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.x86_64.rpm 1257203382679fe9daa7dee565a99b8ffdbcefd743bda938d3facb7c15e9a571 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9 python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c python2-pip-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm 424e634426f8d83d229c9960f37b448d1c68e8e656c8d820294ea9cf7262f368 python2-pip-wheel-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm edfdfe37a85d18af2192a371b7949e9dbb34e31f1acb4fde35483074d0e61e75 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326 python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm 5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543 python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b rocky-linux-8-x86-64-appstream-rpms__python36 python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960 RLBA-2022:1824 gcc-toolset-11-annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-annobin-annocheck-10.23-1.el8.x86_64.rpm ddf7846e76fa48303cdd2029f4206cef963671e30f1e375d4dd02d8441df3243 gcc-toolset-11-annobin-docs-10.23-1.el8.noarch.rpm 90db9c3ab986d12c8d5548d35741638e00d68e51b0c19fda613f4e44ab22b8ae gcc-toolset-11-annobin-plugin-gcc-10.23-1.el8.x86_64.rpm 07d28a08396431cbb871eae01a77fb6b37528d86320a1aa7b8ae3589e113e3c3 RLBA-2022:1825 python-resolvelib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-resolvelib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python38-resolvelib-0.5.4-5.el8.noarch.rpm 4df9a9ad94a685368c3a54f945f5b64477f08a45b1e83718cd66fa092e527750 RLBA-2022:1826 sshpass bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sshpass. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sshpass-1.09-4.el8.x86_64.rpm 52ad1cf18599607e0a1a6010acd13d3f6ebb97f89523896db7b5758a207e41e5 RLBA-2022:1831 postgresql:12 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLBA-2022:1832 postgresql:13 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLBA-2022:1833 inkscape:0.92.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-scour, inkscape. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__inkscape inkscape-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm 99fbc2bc4c7cb4c339ab096f89359ea28bbc9324b584a62cd23d89c2fc7fcd51 inkscape-docs-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm 903c394461f3f339c0c1881d384ad702f33e682dc2bd7b118641dae07702bb75 inkscape-view-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm e021d3d754d7b16da3852a2d0ee69b05cf3e06d5354f8fb6050c72a7c2af475b python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm 2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1 RLBA-2022:1840 gcc-toolset-10-annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-annobin-9.29-2.el8.3.x86_64.rpm 78d18254087a9645cd5c3ab866058af10025caf2192a6fc77e1aa94ff1af9a8e RLSA-2022:1851 Moderate: pki-core:10.6 security and bug fix update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for tomcatjss, jss, pki-core, ldapjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-core ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f tomcatjss-7.7.1-1.module+el8.6.0+788+76246f77.noarch.rpm 086e5c953de53c42f6ae4abcd32e4c9126ba1dd9a028a7a2624a7d8bff1fa27b RLBA-2022:1852 fido-device-onboard bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fido-device-onboard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fdo-admin-cli-0.4.5-1.el8.x86_64.rpm 0b4d42006f2771bf69064e0f5c0760ccb4a501707ebdb8109b690623f9c13287 fdo-client-0.4.5-1.el8.x86_64.rpm 771890a1d457afd6b520fc64f6eb22395791ff9aa648741ebd4639e1ae5ce237 fdo-init-0.4.5-1.el8.x86_64.rpm f3a2ca65e4946f41048b2e57277e8101b597e61a0ea22ac7ee891bc08eac6189 fdo-manufacturing-server-0.4.5-1.el8.x86_64.rpm 79ec5f43b0adceefe49d81473ff9e1a67e83cc84bfc4c6d5caa392246535336f fdo-owner-cli-0.4.5-1.el8.x86_64.rpm 3975e1444499f5da7d4c92f7b5a76b75a0aa4e0f5a7c000ef2f9bdc9fef63553 fdo-owner-onboarding-server-0.4.5-1.el8.x86_64.rpm 5064445c720560843ac32fa04dbfca0bb4adfeb36a8117d1cf90b7a292aaae01 fdo-rendezvous-server-0.4.5-1.el8.x86_64.rpm 45d55ff49176c1387639103a20d31fdb1d7acc3b0aa682c733ebbf520e6d5dbc RLSA-2022:1860 Moderate: maven:3.6 security and enhancement update Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-client-4.5.10-4.module+el8.6.0+844+4401f2ed.noarch.rpm 2a57d054836c857182ff749dc7be558ee1a5f07b00522cae3cf3f3d87c914217 httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 02dcbeb9256307b3d4e05b330cc1b19315500c03a4309b032db1a7ee3f4b5407 maven-lib-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm ece3ed809322707652d98d21a587efcda7cd2dd195adc5eac9000510ad645087 maven-openjdk11-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 312291f926d1ff4969ce01835823bbe596fa6eeb2f9d678e4855fdb051961d30 maven-openjdk17-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 41a59d80aa9b8b60c4c5e2daba8b2ebcc4ae6d33583379342ff21d924a0cfd88 maven-openjdk8-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 93eeecde30df6567f71618ed96f9bda171f5a55ef954dd6506b467615e462913 maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLSA-2022:1861 Moderate: maven:3.5 security update Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__maven aopalliance-1.0-17.module+el8.6.0+843+5a13dac3.noarch.rpm 645e5fcc65f5ce6a5e7c644af9aab686e5168eb67dfd41299b949b73980385fe apache-commons-cli-1.4-4.module+el8.6.0+843+5a13dac3.noarch.rpm 9cf097d54e58ae1b8fd93d9b45f21f4af852b93f03e628386bcd0c88fc09745b apache-commons-codec-1.11-3.module+el8.6.0+843+5a13dac3.noarch.rpm 605d7fd276cc1605f057689518327458da2d3e3bbc9ca913a6c22523af7e05f7 apache-commons-io-2.6-3.module+el8.6.0+843+5a13dac3.noarch.rpm c150457c26d08f11ab2742a26b5603ac0421309db274d1fb9291609513952291 apache-commons-lang3-3.7-3.module+el8.6.0+843+5a13dac3.noarch.rpm 0bec3fe86916400b445c090e2ac59fa15e67b85634d5d19db6be1bcfa35f53cc apache-commons-logging-1.2-13.module+el8.3.0+133+b8b54b58.noarch.rpm d1ce83ba6cb3e4a97216feb51b8f37d3bbd6d163343165ff58cc15cb5340f14a atinject-1-28.20100611svn86.module+el8.6.0+843+5a13dac3.noarch.rpm 860817f72225f53de2c34d05aec257a5d30619b2a66ac51d3e72c64b362a950b cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm e8d491fba0eb58a0c39d874c349f74791897d4081e994974882c75018a06fdb3 geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm 2816206b8a4525c74be3dd28945359d43c37633863851e98787e4c7785c009fc glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpm 17afe1f510bcc20dd864bd1d4ce9ef4ba137175ba3c1741f9006e00dbd48ec24 google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpm c8b1e0ebe1f806d22ee98e61211e3765171361d54c8aa43d237c47756d4413f3 guava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm e3dbd918aa5734109e5025fcff46aa6cd3a7d681c15b47b3839ccd014318b579 hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpm f9013313a092e35684dbfa9b11557e1603fe59feaa126da2cf2915c103413541 httpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm 7c7e53a1beada7fd2cfdae8f50acedd99d62bb3f92ee4cce8c7e8bd8e1e9f520 httpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm 6254441dd7d139fca7bf71c3efd602ae15c8d4ca4c448d26de3807a94f2250cd jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpm 86a01e3eab084e992222cf94a07c1591b41cf818904e7472d549b3d9f4fd2efa jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm 493532237bdca6b7839c897c1a96cdbe6f954348baf86f9e61abaab5b1ce1b07 jcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm ec223715ffea5512ef05f8360522ec30d7052669260bb9c86ae92f6710aa4168 jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm d53adb7c5604a6c4b463fd8356426c62a0e287bbc2cfbae244eb30eb68ed108c maven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm 8d0715634168a0feead5c2200b92f87700932e0482c656fd6d46804779e1cbf3 maven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm 53d03a2e69c1418fda008f86abe12366522fc7db4a6460e02364f332f8aa78d5 maven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 15ca161ef8ce0b64553cc1e9a6c08c7c52233756722ab7b02b71443b22d76bb5 maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 183df0d4f71c063a2120049da9cf587068a3c4afd57f31edbdab23d2cd42f87b maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 72909fd412a649f39c80a3aeac0785ba97622f59d0c490f5784bea61d6f9f22e maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 890e312f32d987ad806ead574436896a3fdb69cc4c701d10a8a5cdeed4f335f0 maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm d62eccdd6992ca5b358305ab16e27b68f98b9cf3b8b3d31b860dc1afe772d4c0 maven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm fe818f18b5bbfea7d1d477e35e8207ec850c4303dc4bdfd97f1c4fd5a788107c maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 0348dc46c7235cbdb54e577a5c7e3bf67bf3990c5b5224da5a8dd810581b0aa9 maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 4c51162d25acfb25c357e2b78536d0439b499a894e89bd888970ae2ae7952e6b maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 7c235cf78744f6520a54c1ec8eea4e9f8adeb990d58958f07f1ffa16951fed0e maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 97503c4b45752870defade5f80b65af78a64e63bdb7ec31c7131f9478aaedb0e plexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm 92f2c95dd389e6f28bdb5336069b9843e2d77e93561cd94114e795b648669963 plexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm 86ef908e4b8b5f6b75d79fb71c9e941d77070240f9f520da09a8f02f76d68c55 plexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm 4df6c9152b37c8c6f3242626c80b8138dbc2dcc2c16e362e6b7f9bd5fc011e1d plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpm ea5b1b2a881c5ae1c82442c1642dbd21de75bf72f84186f1a04e06af74491791 plexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpm 3b64df7a26462444ef46b693adf0d9d4aa4022a17cacc936d2a76fed0c9466b4 plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpm bd6542f8ea1aa47b0b5b280828f4828dada693a8ecfe1e9eb55a1ebc300f75ad sisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm a417c7920d1c835b4342cf7f278800e79764ca5337c6d42e25e06f4484e6c98a sisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm a3be327bd921aab3011f3e1aa3639e45ef82c9fe97e29416851ef69300d9f4c4 rocky-linux-8-x86-64-appstream-rpms__scala jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpm 71f32b6fe08073c78cb2584b57563d05c063c8dfc6a71be37f424c67daf95938 rocky-linux-8-x86-64-appstream-rpms__pki-deps slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a RLBA-2022:1862 virt-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms virt-install-3.2.0-4.el8.noarch.rpm f13631961b3c5f73652822b4766f9a1a61269dde8dbcfd304d6eec53282e32d5 virt-manager-3.2.0-4.el8.noarch.rpm 3c45b10c17c93a29e393d7849163945f71fa32d43d91fbacfbb8b509eba94b56 virt-manager-common-3.2.0-4.el8.noarch.rpm fe1626498e6043d89d32a967eb9edeadc6211a8ca1104b74b6d7044b7ba276f1 RLBA-2022:1875 adwaita-icon-theme bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adwaita-icon-theme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms adwaita-cursor-theme-3.28.0-3.el8.noarch.rpm 3b35985ea1acf4036276f55b8831b41875279082a9c57232a1c028a5399bb65b adwaita-icon-theme-3.28.0-3.el8.noarch.rpm 2407bf478cec673be1f78f6b7ac92e18b8e5929992534578ffde85cff251c0d1 RLBA-2022:1878 git bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for git. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms git-daemon-2.31.1-2.el8.x86_64.rpm 1172b644c3b23ffeae9a503dca48a343f697f371a77479522ce92c5a63ba4d87 git-2.31.1-2.el8.x86_64.rpm 0539d1de6615e832592ac547a7ccc3a7a7cd8a134d4ba4fbc7be791a0c61ed6e git-all-2.31.1-2.el8.noarch.rpm 36e84d25fa924b9d8e897cf4926c20698f1324425ac5c9f93a4290bffd915509 git-core-2.31.1-2.el8.x86_64.rpm 17b04d086666e514b8f7bc9c81a0e3c97d924b8ad1c5171dfaa12e12286f7701 git-core-doc-2.31.1-2.el8.noarch.rpm 024495aaaac25b8159877171d753e6ac24bd41677249cfc065792e76bc615b3a git-credential-libsecret-2.31.1-2.el8.x86_64.rpm 8867bbe1b88d44b70ae0ca8059b138885627b416874044732797a0288eafd500 git-email-2.31.1-2.el8.noarch.rpm dc4c21ad86d01eaba0813ab4eab28183006b7bd1a7666deae56f472075bb564a git-gui-2.31.1-2.el8.noarch.rpm 9fbac33ada979bb1086a94c50e98c060aadd9f598d5c1318585c0986ca657722 git-instaweb-2.31.1-2.el8.noarch.rpm 9f2fd320848f12dc5632030eb9336d6ac25f17578ca7d1146e858f1ab53c2e44 gitk-2.31.1-2.el8.noarch.rpm 003c3d1dc4c018b3784a5b55a3f3d23d29aff2b3812829e221bc04c6b1187423 git-subtree-2.31.1-2.el8.x86_64.rpm 69b10ce2ae22f6ce41c4bb3b1d379d21f46685b42440c9c540351653e78174f2 git-svn-2.31.1-2.el8.noarch.rpm 1897ac4e96bfbd05d750f8e4a0eaeec8b390d60afa193a7f6796168e55f55925 gitweb-2.31.1-2.el8.noarch.rpm ea8caa52549a785a1773f3f4ee8666a8e12bfc8aecef4880870b2a5c74f35ae8 perl-Git-2.31.1-2.el8.noarch.rpm d02463730699f65617a1c3fe4a29b8d955c9f337547fd79410b59de2096573da perl-Git-SVN-2.31.1-2.el8.noarch.rpm 88cb54d628e7da095c2deb6e20c955c04760f5c4686d29013d3481590c9f69ae RLEA-2022:1884 idm:client and idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2022:1889 texlive bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for texlive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms texlive-euler-20180414-25.el8.noarch.rpm 7debf8882af04eaa062a640c26431715c3402afa6cd2a3696741566cb92833bd texlive-filehook-20180414-25.el8.noarch.rpm f763b1e0291ecd5f46b924540a3a013677b1fb1e0ef7d36a0b84c98b26145235 texlive-fontspec-20180414-25.el8.noarch.rpm f1082b86789497fcdf53485e887248b340eb719806736c3fdde83cdbc815c6ef texlive-environ-20180414-25.el8.noarch.rpm 1164632e4d523dab808654e313fb853a6bd4cc22eabe3c147fe1f7e8483f7c78 texlive-20180414-25.el8.x86_64.rpm fca0165b3f00ccbee923dff753995b6b6ceedf08fb38d88f524ef4da2d4112e9 texlive-adjustbox-20180414-25.el8.noarch.rpm ae011dbe779b1df6055cdab83865e184cc8089e032644328b9175639dc59bb06 texlive-ae-20180414-25.el8.noarch.rpm 6e905e809230887b6e8a386d236cefd199954b85130b67df7e29624c6bf4cd3f texlive-algorithms-20180414-25.el8.noarch.rpm c81d5a614e695afd20dce5f749a93a160af06df2d20bcabe526d94922aec4eeb texlive-amscls-20180414-25.el8.noarch.rpm 459892f2e8fcae0bbb0c38dacb89fb6a50997b2f1abe759b38176ed06874e8bb texlive-amsfonts-20180414-25.el8.noarch.rpm 4b4b2242dca9f44a353f737d2f8bb69356b61636fb55d953f1353b1d89a354b0 texlive-amsmath-20180414-25.el8.noarch.rpm a0dfe125feb0bdbb737be04b7305f3a6d877b833bbcfd73616499bc4811d5c0d texlive-anyfontsize-20180414-25.el8.noarch.rpm efb7ad5e995bf24e6ffacc959b368b02105a6bf1e1645bbd2111a7764420e59c texlive-anysize-20180414-25.el8.noarch.rpm e61521fa3902da550dcf3ca9da3616540ed70e67164417aea3df39683faf7041 texlive-appendix-20180414-25.el8.noarch.rpm 3b375df089e9b2d69c6a758f40dc823c708fefd421c34f11bacf942d2b3d7c26 texlive-arabxetex-20180414-25.el8.noarch.rpm cae22672b1f4b213a96ae7f1cf2c5a90d87b236a5968fe7de44efce761ab833a texlive-arphic-20180414-25.el8.noarch.rpm 5f822437b7c934964f4f8caa1946ad8a9cab7181883dfaa295ad5268215bc994 texlive-attachfile-20180414-25.el8.noarch.rpm e3b88649b6fced18a214ddff57cca1c233065f73459c672ae1d49497cf045293 texlive-avantgar-20180414-25.el8.noarch.rpm 0e8432d82862698c0b4691e52bbdcc4322f8872755f498c7936c8e7a6bdd5ffb texlive-awesomebox-20180414-25.el8.noarch.rpm da55567dd39f004d50c1e9db3c8dd3e22b51930fce30a69b8711e3ef9c79999f texlive-babel-20180414-25.el8.noarch.rpm ff9bb0ff7b5a44b45b1c885545007f9cab5b740e1a3917c36ad5c899300afda1 texlive-babelbib-20180414-25.el8.noarch.rpm 55a073dcfd46e532abf6ee7d19e258c3b90a4250b7c1fd30d6370c87099e16e0 texlive-babel-english-20180414-25.el8.noarch.rpm e4e11539cfc94f7a0ca43889aa742f00ba377a868595fcdc8e9e79d321132e1a texlive-base-20180414-25.el8.noarch.rpm e90446c9541d26677b9cab779a760936bc145bb329a5d790ae04ada98ed7c108 texlive-beamer-20180414-25.el8.noarch.rpm 86d6b74d07086b52218478525d8c2a8ff4283ce7bf44f1cb2c0daa0e0fc855c0 texlive-bera-20180414-25.el8.noarch.rpm f6b4920563d8b27c1019e09b81702d6671f6d87fcdd35c6bab46b192b3ab7cf4 texlive-beton-20180414-25.el8.noarch.rpm 3c3a701e1c7ba76a69230862aa4dd4f1b157993470f0306bfdb226308b98abe2 texlive-bibtex-20180414-25.el8.x86_64.rpm f64cbef8d54f64fed525e64ba5211cb613417aa9111b22f1efa7d5fda84e1085 texlive-bibtopic-20180414-25.el8.noarch.rpm 3194ab38bb507f8f0f83fd0c4d9c8457b079ff66d125e646bf15ea8008184d39 texlive-bidi-20180414-25.el8.noarch.rpm 1f4406f8737ecd3736e263ed6a97f86614bee54b2af4c9b97840a5a62000b5a7 texlive-bigfoot-20180414-25.el8.noarch.rpm 82d718d89b8c87d52ae9ed5b7705ff8e6bef10c0704b065a0e7b6967cd0af0dd texlive-bookman-20180414-25.el8.noarch.rpm a6cb6fc191d4a31d2c9a0b1ced169213285be962da174452bea381e761b2ac8d texlive-booktabs-20180414-25.el8.noarch.rpm 900f16491c97dd2e51c12b81a5d51191cf9d9825f97caea3c2566ed16bdfd681 texlive-breakurl-20180414-25.el8.noarch.rpm 3a251185fefb2b2bf51091af53c906d2eabecbfcd4eea089ac4459f39417db71 texlive-breqn-20180414-25.el8.noarch.rpm dae4180acf480d03ef60d1269e082ae5f69273c2fba1640bb0f94f51b98c3aa1 texlive-caption-20180414-25.el8.noarch.rpm 7bf93d6bda158f65fe084932de344e9c3433f2a020ded7f7f7acd209c3144550 texlive-capt-of-20180414-25.el8.noarch.rpm 24361f4b10f87d6c8267db8bcb9446278b5bb2c5277ddc542e0fae50cf9358f2 texlive-carlisle-20180414-25.el8.noarch.rpm 266b87404829d306207eb9386329de828ef9dfc9af16969c2d159103a1f87e88 texlive-changebar-20180414-25.el8.noarch.rpm 87b878b073a441e6722a43bf193690b8eb1c510a37a4d37b1063287bc7fb6e08 texlive-changepage-20180414-25.el8.noarch.rpm 2e997c9da065f25ce03ce67c73046c6a16c90dff6d8c350e782418adae92edc1 texlive-charter-20180414-25.el8.noarch.rpm 93266dfa283a03bf209f11f507120e04164e438ab4277da31ca1ffab8b1c76c2 texlive-chngcntr-20180414-25.el8.noarch.rpm c4e2f54d1789524f4dc8b272fe1898a779f476b1cd91146cddbc237ab0b2dd57 texlive-cite-20180414-25.el8.noarch.rpm 3db3c0889178adcf8a4ddc6546d8bd07251107da16dc9bc9886b87b848a9a369 texlive-cjk-20180414-25.el8.noarch.rpm b054038461079165797e8f3dcb6cf1b17dc2443a157f203dd0c244f7186d3910 texlive-classpack-20180414-25.el8.noarch.rpm cb6380339c7ca5da8393bee14d5e4b7b62155028894540dde1c493f3382b250b texlive-cm-20180414-25.el8.noarch.rpm 4b712b128fcc2acdd7168f06e6c492374130d4292969181bf3b2475ebfc4a5c2 texlive-cmap-20180414-25.el8.noarch.rpm 12e3a3b8b6285826d8887c1c8e315560bb309f9e73e75eab5d327938c1734b3f texlive-cmextra-20180414-25.el8.noarch.rpm dc9ac4bb7f56d8aad81cd70a3b362ab8d37106ecc43c4ce34718b0e9daabc4a5 texlive-cm-lgc-20180414-25.el8.noarch.rpm b0af107974000979206fce50893ffb061f1ad1f41babead50f6ff3e347138e37 texlive-cm-super-20180414-25.el8.noarch.rpm bc6f15eea9a0ec65807187f86350ad449af5867267b72863d30311ba791c6235 texlive-cns-20180414-25.el8.noarch.rpm 4fc21e45aa490b5a0015ed16999f53cbb46bcc6729e0541426899ff749e8a5a2 texlive-collectbox-20180414-25.el8.noarch.rpm 993fc97131f9865611062c7535e7beb09a82a2eb07010abc2f27891c2bbc18a4 texlive-collection-basic-20180414-25.el8.noarch.rpm e08e24cf5584c7da4a94225b86e30a3f2aaa64d58d2478c712d4358ccf54eba7 texlive-collection-fontsrecommended-20180414-25.el8.noarch.rpm ef06315141a8efb0b705e2cc421b0afed7d55c16ad6c48839392902914516b0d texlive-collection-htmlxml-20180414-25.el8.noarch.rpm f0479643b7c0e4c288896bd0f278236ee02c05254b3340c4f86faf6ec3a37201 texlive-collection-latex-20180414-25.el8.noarch.rpm 8493c67d76b032bc3b47ab0313ac460b5fb562724c086be76c6d118796af8cf9 texlive-collection-latexrecommended-20180414-25.el8.noarch.rpm 43a8048769f9a6d4c1c48571a3b0e75e9171725a63c01c1ecdd7f2b462731ce6 texlive-collection-xetex-20180414-25.el8.noarch.rpm b59b51113f2410358f99ecb36bba67cbf3bca777040d5649271a5189d4a03fe6 texlive-colortbl-20180414-25.el8.noarch.rpm 4b5e74f283d3c7e9df6d372370615cd50422b4103a446b5fcf85dcbe22112563 texlive-context-20180414-25.el8.noarch.rpm 74d2591b8fcd7ae0f541b37b7c607e848e474b3bb656410ebced1b9874272c63 texlive-courier-20180414-25.el8.noarch.rpm 4074f2a3b7af9e49d32f073e73c87d7291e82ba81fef5e471e7f4d1305416a5c texlive-crop-20180414-25.el8.noarch.rpm 2227ff46fd6e8c789105c31ac9c5fd8074d88a90c4fc6f9b9c5daf2203dadefe texlive-csquotes-20180414-25.el8.noarch.rpm 5072af2122eca21cff7b669d07d2fdb349ebb63a3f17ceb73da526699284c51a texlive-ctable-20180414-25.el8.noarch.rpm d6fd80302edb02073fc18038a36271238ef379a413ac263f6f53ac9e13cff978 texlive-ctablestack-20180414-25.el8.noarch.rpm 6d0e40dcdb9e44e75e414277dd97b341b675520ec04aeec9baeb5a7f113dcd9f texlive-currfile-20180414-25.el8.noarch.rpm 60814c1dd8bb5fa40a1854e98459f309197b9941ab0cae6d1f2abf23217e171e texlive-datetime-20180414-25.el8.noarch.rpm 167bb4b0dc2f6789ed2a002fa0119c6f2565d7aa059eaf3df48095c311e2ae31 texlive-dvipdfmx-20180414-25.el8.x86_64.rpm e0e256a8933512a4538f08a24c98eb7cecde65159d6557cbfdc20c5d7d64d2cc texlive-dvipng-20180414-25.el8.x86_64.rpm ba9da0905b5eb35c2132251e289b4a678b4fe64cf63a20334cce10b4377e03f1 texlive-dvips-20180414-25.el8.x86_64.rpm ae5ef7c07d69ca9468b9277d2920ab38a1ca9a7a16944a6cb61fff708010229c texlive-dvisvgm-20180414-25.el8.x86_64.rpm bd712ec77ae18d3ba1e1e5acadd71c603c5f0859d96ff46524f287578406628a texlive-ec-20180414-25.el8.noarch.rpm 1fc6a8529a3d44c4431f170912594a0fb18f960310a9f2ef0167aeabe4c90d73 texlive-eepic-20180414-25.el8.noarch.rpm 3f0a81a13f4a525849d444ac3cddcb42ad4b2fc16703be7dc34262c1559c0259 texlive-enctex-20180414-25.el8.noarch.rpm 5f961e5f85fddcdba82eef0d582c0caf0df50205f75c341862668a82bb231538 texlive-enumitem-20180414-25.el8.noarch.rpm fa0af899af69457ebcee4541f9646ffc239f30d764731e6774c343a08a9e3c77 texlive-epsf-20180414-25.el8.noarch.rpm 39d0a343cebb1ccdae1af654e3cd356b1731e11760a621b27c5573d62f4640f7 texlive-epstopdf-20180414-25.el8.noarch.rpm 59822cee9df3a444922eccd1b88eae4d487097eb1da976a94d5aeff93bb1213f texlive-eqparbox-20180414-25.el8.noarch.rpm 30397f4d32e42a90b029d495274efef400961e7e8a6cd2b8a9efb38dc9934214 texlive-eso-pic-20180414-25.el8.noarch.rpm 886c72b65ac519271f61210102bfb6c0b05e4110e12a24204016de4bd6e90ca4 texlive-etex-20180414-25.el8.noarch.rpm fe6f963e4799e0efc8452e0f26ac3222ce49785cab6a55d201b6279737f7bd84 texlive-etex-pkg-20180414-25.el8.noarch.rpm 9ce0887cf15faa6571b99bd6e99af573f208087aa8f669cc670a28b513398142 texlive-etoolbox-20180414-25.el8.noarch.rpm d078d77a5cf5f14a3f4bc0a9bf13bcbc7403087753ebfb1730dbfcb59c41c309 texlive-euenc-20180414-25.el8.noarch.rpm 3268a48e7348838de68bc37fa2cab0225da3739f1591d3044cbfb55f6e2dcc8a texlive-euro-20180414-25.el8.noarch.rpm 7a32ca4e50a81cfb339c4e49c47e2dd056fef71ae8198ab74e4d554511e5d7dc texlive-eurosym-20180414-25.el8.noarch.rpm 1ea6df9016691a1668b2959cfc887597158c0c5c26943780a8f8abd3f35ec498 texlive-extsizes-20180414-25.el8.noarch.rpm 25165ace726d47f37be296fa366602ed45a8a04aae4aa73f3bf7a2e2b8d09545 texlive-fancybox-20180414-25.el8.noarch.rpm db00055abda0a1ae077985d08482bc80f820b1f001da99a1d5363e038adce7af texlive-fancyhdr-20180414-25.el8.noarch.rpm 38f5bd06ba84baeb43fa5fc325cb452f438850be0dd8eb773149a41c07994d09 texlive-fancyref-20180414-25.el8.noarch.rpm 9d074e5f81a09540131b3420e58ed15f8a4ce330d9942e4bc17bbb743f671257 texlive-fancyvrb-20180414-25.el8.noarch.rpm 3915a5acfebaf64925d0ea7dbd8e14a45ab89e323d0dbd573eb49523c2e2363a texlive-filecontents-20180414-25.el8.noarch.rpm 7a16731f199bc304ea78f32b034e7bc05d6dd8e21f7861a95deab957d3373ac6 texlive-finstrut-20180414-25.el8.noarch.rpm 2b18cbe5906e25e0820e3b819c23995e16419bba767098f8672bf58d03421a09 texlive-fix2col-20180414-25.el8.noarch.rpm 3daf468c40068993e8886fe55b8ee21ef7dd9250085d967555e53cc5f49fcdc7 texlive-fixlatvian-20180414-25.el8.noarch.rpm 4ecbefaaab8a9eca42750a092273a873a4989f84ab67f9eae2e4ea1eb9989dc2 texlive-float-20180414-25.el8.noarch.rpm 49610b8dfbfafe0d87697dcfc1e88b430e78c60d4581fb7f9568d2cd2ed451e1 texlive-fmtcount-20180414-25.el8.noarch.rpm df8c2b157228d6b918c3ee7624cbcb78550702f73f20b04ba0444983e540d5aa texlive-fncychap-20180414-25.el8.noarch.rpm d4cd132c053cbace5917d0a9107f7977c4878462da62bebe8fa8cd8e4a881c6d texlive-fontawesome-20180414-25.el8.noarch.rpm 878f40541575a61af8429165e2ba391625089149bd4bd737ee0801c4b86f1657 texlive-fontbook-20180414-25.el8.noarch.rpm e09f9b8cd44049009e717e6e47f58cddca43e695ec428879ff408fdea38ff89a texlive-fonts-tlwg-20180414-25.el8.noarch.rpm cb91e013b0a462a59a9ecea7d7a76aaf333619930e8981b47d1788d8b193a987 texlive-fontware-20180414-25.el8.x86_64.rpm 3ec4004806a8b3d3af8f4d98e282998837882393dae947be60e49d863a0fc479 texlive-fontwrap-20180414-25.el8.noarch.rpm 642fe8615e66507fc0126d985e15adab7673130f6cdc8a927db39dcd23ede3ef texlive-footmisc-20180414-25.el8.noarch.rpm 60613537d74909dbbc964a420e2537fb07e59cb06fe414087180d3976f6e35bc texlive-fp-20180414-25.el8.noarch.rpm d82ce702a5229c56f009896944066a0552d99b452b8b46046511dac2b6f0251e texlive-fpl-20180414-25.el8.noarch.rpm 7102affb1c85762dc6280bdcdc662ae6745d5db2714c33db3b27982e29faeb49 texlive-framed-20180414-25.el8.noarch.rpm b79dec5f59d7f096916642b2bc079e860911350e75b8700169f578cae59ea298 texlive-garuda-c90-20180414-25.el8.noarch.rpm 8efb8844b4b4ec2d0cfd873bae2d6aac64d828a14ddca1efd899c911408170ae texlive-geometry-20180414-25.el8.noarch.rpm f798179b77880d4550b3db5e80bcec0086cad1f6ce6512946dee62fb88aa62df texlive-glyphlist-20180414-25.el8.noarch.rpm 2b043f1d6d903eab9212a25e3852c19161bf418e6a5b646d2a1474d73644400b texlive-graphics-20180414-25.el8.noarch.rpm 743f0bf90a63e1ae922b0994e44105738cbef59f718710efb0a4d607fc5cd98c texlive-graphics-cfg-20180414-25.el8.noarch.rpm a3ab6698567ff1db3db332367f5f4e780e216cab72460f77525c98095eb0a58a texlive-graphics-def-20180414-25.el8.noarch.rpm 1ad672b18c80324c6aaf8ffb0d747dc998192157a36d7c31780ed39a2507808a texlive-gsftopk-20180414-25.el8.x86_64.rpm 0774bd23840df0f8b8741c7aa4ad47fae98db9ef4ee089a6e4bf60022f261862 texlive-helvetic-20180414-25.el8.noarch.rpm 00cedc721b33f6a2cafbd6a9eb4d027d07bd4789c8ff12e6973657761fa5d400 texlive-hyperref-20180414-25.el8.noarch.rpm 44128eaa6d5687f7df3b95a6566d8cc4356cd4fb0ca5ec7f0dcc6c32ec219f35 texlive-hyphenat-20180414-25.el8.noarch.rpm 0f4da6a18bbffe186329b71d51d0fcdcd1438536e415668e8f3c34156ae06e53 texlive-hyphen-base-20180414-25.el8.noarch.rpm 621258b17f1fb7fb747a9512c434bbb1acf54b4dca8936c89beeec1b42ffea9f texlive-hyph-utf8-20180414-25.el8.noarch.rpm 2dc38e1131fd329015d453e3d3833c94ac9eaf9b627c68eb19ea337963ccb334 texlive-ifetex-20180414-25.el8.noarch.rpm c0ff6d5dd4e66b3c740e6473b4509af77042180a855268beaa5535c2e2a557b2 texlive-ifluatex-20180414-25.el8.noarch.rpm 3c9555dd232f77eea0643e7a485050ee8eca04469ad313803a4b30bd3a735a0e texlive-ifmtarg-20180414-25.el8.noarch.rpm 6292141c20ace8f90a49d199a35d9a7936bedf8df2fa1209f3d16b0f4f8a063e texlive-ifoddpage-20180414-25.el8.noarch.rpm 8b918dfbbb271bcfdef1f24b53c431cfb407fd84c756afac622ef3572fe235c3 texlive-iftex-20180414-25.el8.noarch.rpm 2a18f6eb33816a826fef8e524f2c38470c796e18329ce9cc8cf6b62b2554d7df texlive-ifxetex-20180414-25.el8.noarch.rpm de25e4ef32f789e48e79697ae7382fb64905abddb37b3b29b1d7d4973fc952eb texlive-import-20180414-25.el8.noarch.rpm a7b0e363a79aa8d3df466f9231f082c0a316e622c9994ec91741f2cb2d7fae16 texlive-index-20180414-25.el8.noarch.rpm e47a93db86acf644e7362e1fe17cd74f50b19788699db29d2fc73f29940e19a6 texlive-jadetex-20180414-25.el8.noarch.rpm 881f96fc1c0095fa5ad9741906ccd1f92772a594e129d89126e0b733e6083aea texlive-jknapltx-20180414-25.el8.noarch.rpm 9c4877ea7334a875f599e8207a03e05777246fecd2044abb436159c4c1acbe46 texlive-kastrup-20180414-25.el8.noarch.rpm 4b93c2acbd83bab1e66a3adb683f268158b0c43f6a602a2ba93d2c61c3318247 texlive-kerkis-20180414-25.el8.noarch.rpm 9ef7cf3bc6b2c3b8271a7df9b5868edb31e54bd2ac2c48ac67636a9512e56e48 texlive-knuth-lib-20180414-25.el8.noarch.rpm e69d83493a3da333753165398c2e6ba681095441315110f452cf7109b63d8ed8 texlive-knuth-local-20180414-25.el8.noarch.rpm 406722c988dc743597782e5632690ca0ed2c5cc5b602ce93bf983ef4eb83dae7 texlive-koma-script-20180414-25.el8.noarch.rpm e918c4fe6aee479325e200711a357ffdc37ae2bd1ff7851b6fcec01e95538a6f texlive-kpathsea-20180414-25.el8.x86_64.rpm 76516edd4f5c824824220b8b1da6741ad6ea0942d2716bfc7e88080cb2d5dbbd texlive-l3experimental-20180414-25.el8.noarch.rpm 02628a3e06ec9d780fe419eb50a227dc9103de88b3c040ca79eca15dc05b06a5 texlive-l3kernel-20180414-25.el8.noarch.rpm 63f5f3c3823e15bb2e67d26456c4c067dfc6f37449269fc8997bfcca597a19cc texlive-l3packages-20180414-25.el8.noarch.rpm 203456b816a7a7b836f5f556090c7b465568d7c208e954eb4a419a40b57b2b30 texlive-lastpage-20180414-25.el8.noarch.rpm 20c6981bfa9f31088ada533b2f8852b7c43bd807b819cae469503b5b425c9a2d texlive-latex-20180414-25.el8.noarch.rpm bfcf8d50ba4036104454a5f7d306168f3175135db7ede24c985a875367565a9f texlive-latex2man-20180414-25.el8.noarch.rpm 4c24c4fa7ba221fd71debc326b91948d8d3442143dde349cf2266c05fbcd6a0d texlive-latexconfig-20180414-25.el8.noarch.rpm f6350887bd843aae014e05be4dd1b68c3d8a1bb979f0c3854874e60fc85d75d1 texlive-latex-fonts-20180414-25.el8.noarch.rpm 99d49a2058669b6cea75c838f8dc60377a97968da4c0adc4a2b7d1c62105ad18 texlive-lettrine-20180414-25.el8.noarch.rpm 18ac14610862174055193fcfc8f92c4896b6e072fc6b7d93846509d7806919cb texlive-lib-20180414-25.el8.x86_64.rpm 2522f9d127bdbf59caf4ba91384c3e0320e943b9fa208c9cd5c24d48a0dc7fab texlive-linegoal-20180414-25.el8.noarch.rpm 17a540d30b87179e82f04f95044016a8a3196e3bd2d9c7c983838cb0bd6aff23 texlive-lineno-20180414-25.el8.noarch.rpm cd88664332fe8c95af24764d2aa5d70d4c5687b0ad51d26f02a29d50a7911dfa texlive-listings-20180414-25.el8.noarch.rpm df817cbc6437c1b330e04ff0ee637f020379db5f26be036710db38d926ebe0fc texlive-lm-20180414-25.el8.noarch.rpm a43a83b56974831f16c56e1b458b4616bb5215cb38a21216ee5ecf853477f71f texlive-lm-math-20180414-25.el8.noarch.rpm 9675429d5a1e86c365d6d30e6b24c62333854663fd877f4ab0b800013793e905 texlive-ltabptch-20180414-25.el8.noarch.rpm e872d9ee5fa8f51674dfaec52e67e20ce36c45c2b3c8d215ddfdd82658c2cb3f texlive-ltxmisc-20180414-25.el8.noarch.rpm d51b41cb80f149bad6bfcb7f4337324c9f2063ba2b3ef1f2c3dce228f9738614 texlive-lua-alt-getopt-20180414-25.el8.noarch.rpm 18f40d591be91254609786eef831c3a8e5266b64f619eea6c4f01111b96b22b3 texlive-lualatex-math-20180414-25.el8.noarch.rpm 45c6f362f69c2167db6ab9be39373b553c399c236f3743a56a24e80fa9841a47 texlive-lualibs-20180414-25.el8.noarch.rpm a202f5e225ebfe8d6340bafcd895689d053fe11535cc97d5520c1e738f130c98 texlive-luaotfload-20180414-25.el8.noarch.rpm 5628b1e7218de322325c733135a47a99a9e206eeda19002b450cd7fa6785cdcf texlive-luatex-20180414-25.el8.x86_64.rpm 86575844bd8ce4a907bc232527ceb5db896ff9038c8e85e5f83d0b2c16014387 texlive-luatex85-20180414-25.el8.noarch.rpm c1a2c397e0aeff46fba1fc4664cc470d28cd739f6f2afe8170e3c4fb8fcb8839 texlive-luatexbase-20180414-25.el8.noarch.rpm 50ec4283fee306496c035ac524b5470804014285bd4bf89a6500cd088d7c2853 texlive-makecmds-20180414-25.el8.noarch.rpm 774f6d3153733bb4d24ecaaa327e16c8d4e2a7915c8b0fe8cf8bf5fce114e26e texlive-makeindex-20180414-25.el8.x86_64.rpm f9778abcdc837430ccb9061d9852f09ee58759c56c0a57231dde5dc73ba98e8e texlive-manfnt-font-20180414-25.el8.noarch.rpm e32a787b9eadf4b4412ba547526cc6c1d9c973dfd6ac44ee3d2c23ec9a8c4fdd texlive-marginnote-20180414-25.el8.noarch.rpm 534a303cf09733b0d350e7486f5a528da2182057c5f7063b71b294b1f4f67e62 texlive-marvosym-20180414-25.el8.noarch.rpm dd234505323dbebd91af7d1331c58b2f35c052b11b832b071b7e2fc4ca8b5080 texlive-mathpazo-20180414-25.el8.noarch.rpm 35eb507c030a39f41b3c2a5b8f4749062e0def1e2e7b6ca5006a1d7caafbde78 texlive-mathspec-20180414-25.el8.noarch.rpm 22a79e4b6f7dd83062a1605417effe13146f8db020d84ace36c1684e879eceee texlive-mathtools-20180414-25.el8.noarch.rpm 82bfd658f342d619a74788f5add542481f515d5e5e81b3832bf871378031a5e7 texlive-mdwtools-20180414-25.el8.noarch.rpm a0d99143abf8213c7a52ff3fe35163b0f1524cab1fbf44d5bd266e2d88dbf5ce texlive-memoir-20180414-25.el8.noarch.rpm 48ecbefa52ad833e2d581ae2d3a1ebfaab53903769c1c88e62988bfc02e546ea texlive-metafont-20180414-25.el8.x86_64.rpm 97c7ab08597695d91071bb5985161fb06df6ce46e97ced54da5240706cf19e75 texlive-metalogo-20180414-25.el8.noarch.rpm c73ca4002a6322ba6217d277a9cba5b5341393575ddbab683769114c07492285 texlive-metapost-20180414-25.el8.x86_64.rpm 5cae1b2f3337ad06119dbc9343ab651ecf9e0daea063633b8fb4ba22516511d3 texlive-mflogo-20180414-25.el8.noarch.rpm d5e09ee5e57418a0f5db2d6835e5c78154f3af207a2924928c04f593a2e434e2 texlive-mflogo-font-20180414-25.el8.noarch.rpm c30b3ee3a199cfd9db95af15ab1852e72b47e0dfaffa3179fe814b81b0633472 texlive-mfnfss-20180414-25.el8.noarch.rpm e4d3390b08d13940d40d8aeeb5f60fa448475d4e796b0c5616abd1c57a838589 texlive-mfware-20180414-25.el8.x86_64.rpm d0c5b0857db638d86cf7ba0ef35b997f1519cff0eea56791caaa66b57f29a90a texlive-microtype-20180414-25.el8.noarch.rpm 4de0d5b9a16759f013e58e2e0c11270c361368ac241f07b6d30fc2e63fe4e890 texlive-mnsymbol-20180414-25.el8.noarch.rpm f41f869c0ed1c9ea995dbdcb64d1527967507c76e7d2d68be2f53212d74be7f0 texlive-mparhack-20180414-25.el8.noarch.rpm dcaa60499e96de0f2e93cc3e6bc7e678083ccc83debd1f026d552cec26ffddd7 texlive-mptopdf-20180414-25.el8.noarch.rpm 2c25f2ae32ce0457c8e67fa50795879016b0bcb0cb26818001b5915f5dbce6e6 texlive-ms-20180414-25.el8.noarch.rpm 88feaee2b09fba1b903a125b7b0ab341f430a2ca1423442e2a181049e51e49fa texlive-multido-20180414-25.el8.noarch.rpm d96dbdb72bbf4e356297840c068f7d9f72f8371f60a884e83446621be0f46afe texlive-multirow-20180414-25.el8.noarch.rpm 0a4bc9a20e80838fec4a9a4b73d1542ca45f194cad976ec289e479d00228b32e texlive-natbib-20180414-25.el8.noarch.rpm adc41d4c74b9259c6c3ece655bd794e90b6158460292d24bffc093779c67b711 texlive-ncctools-20180414-25.el8.noarch.rpm 6fe54ab452e8929cbcea2859141d8c5101f2bc672f14f3dde651b4fa621bfee6 texlive-ncntrsbk-20180414-25.el8.noarch.rpm 8ce1f2250d99fca85c54d882fe34d5a03705987f54a9fec0e5ba34638fc62e28 texlive-needspace-20180414-25.el8.noarch.rpm fd01f1502e7b12c8c134de9d3c21dc7130eacac6b208bf091ea36104e7d80d31 texlive-norasi-c90-20180414-25.el8.noarch.rpm d356098a3f8e4139a61293a9b2017eb385ed4fe03e45ef7a6a5a38d1779d474c texlive-ntgclass-20180414-25.el8.noarch.rpm 47e6563a34553c27336b26f231813a934fbf0b133797c094db0b8a92b8bc45f4 texlive-oberdiek-20180414-25.el8.noarch.rpm c4f78115f5941f30b4cec73c333bbe9f28e05e6dd15378620c280cf2cbeb74ba texlive-overpic-20180414-25.el8.noarch.rpm 0bd77cfad3d486ef5eccc6bd76db6595c227d06f64af84d6f3ddb551761d41fd texlive-palatino-20180414-25.el8.noarch.rpm fbab36b6eb3d0e5830dc2c9f5528f4ed9680ee7b6ba9bbbe4e844e31a64d55ce texlive-paralist-20180414-25.el8.noarch.rpm 65cbad2a2bd3d02142bce2a3328555427de1e1e4c759c1bad5448a39a62c9634 texlive-parallel-20180414-25.el8.noarch.rpm a31f6791e6e655b0b66a812c9ffd2ca2dffa1dbfefb6b071df9bbceaf72817ac texlive-parskip-20180414-25.el8.noarch.rpm 219145f10bef96d44dfe335fd5c24c416b0f8c43eede287c3e5b7029c23e7736 texlive-passivetex-20180414-25.el8.noarch.rpm 92fbb08b208144eda7b4a464fd5c4efbb97fd82eb405813084ad04bb0f96f2fd texlive-pdfpages-20180414-25.el8.noarch.rpm 0986d7b17250c3fb1c82fc79a054d6ecb9b6fdc4e2bf29fe04a5e754f8cb0676 texlive-pdftex-20180414-25.el8.x86_64.rpm a46d20c3a65f36dfc65761712b979997bcc89891b775fbca457f969101c23503 texlive-pgf-20180414-25.el8.noarch.rpm 0bf2cbee865bcd8a11b66d3d3debf7b23d5c709d889e123204643e7c789ac6a7 texlive-philokalia-20180414-25.el8.noarch.rpm 5c2a31f59b06b209ced2e80ad748ae93a37a6b0766328318a9d1c7de949323e0 texlive-placeins-20180414-25.el8.noarch.rpm bb335518be3f6cf58a647e8459a6def0c45414d358c97e0f6e63935b02bcac39 texlive-plain-20180414-25.el8.noarch.rpm a353307674babae0fef5a8dac276ddd24865411090a07d2d25db65d199a552e9 texlive-polyglossia-20180414-25.el8.noarch.rpm 1f51009f6544e02913d10d2858c47864e1331b2b454fecd95bd24433513b4dd2 texlive-powerdot-20180414-25.el8.noarch.rpm 70af03e6053f314d9efae179aac1d51f92322ad5eba646c84483a57e286d78a5 texlive-preprint-20180414-25.el8.noarch.rpm 7afff60b06f4d111df798968bb474346b27ffd73fc2b3ad9b85d4b7a6096cf21 texlive-psfrag-20180414-25.el8.noarch.rpm 05f0ced6fd71a472aed639bab8f342b90e805cc560fd91639f8517c036443d42 texlive-pslatex-20180414-25.el8.noarch.rpm 272991b52d494c7292bbb8334a62ae2c5488686896995789faa1cddcc602b3ee texlive-psnfss-20180414-25.el8.noarch.rpm ab0a95d0382c3a04081e35ad454f9c8b6c88e39decd5c7b9db35f68a9817b9de texlive-pspicture-20180414-25.el8.noarch.rpm cf6635958123cec7334afabd5571e20cd6d314af93aa0489145c27a32378214a texlive-pst-3d-20180414-25.el8.noarch.rpm 11f1f35cb58803a14abe85ccddc5d32ee1232e722893828fcddfcc6d706bf470 texlive-pst-arrow-20180414-25.el8.noarch.rpm 02121d865d6d5689c916fce5034f4c2010d2f00a57f20ddcafdb02a50b629104 texlive-pst-blur-20180414-25.el8.noarch.rpm 9bcb9490e950b77bad3062e02bd395048f291894ee2eab09eb68edb7f6c600e4 texlive-pst-coil-20180414-25.el8.noarch.rpm 588e80c601dd58aeb0d192aa3ca368cb24aa4476f71ad9f9622977addd31aed0 texlive-pst-eps-20180414-25.el8.noarch.rpm b6c76a89bae25dc541c94a0772a9e6485b80b9ce2d12fe3cfa44926716dc4a97 texlive-pst-fill-20180414-25.el8.noarch.rpm 375a3b10789c41e1dbe6c96a8ef987cab63b4b3c32101fc4e54205cc61e9cf76 texlive-pst-grad-20180414-25.el8.noarch.rpm 1088f90608ceea2e38839c8f72d8a5a71213e0f8105a59e0491b15edd413ff74 texlive-pst-math-20180414-25.el8.noarch.rpm 0e06b4a02bcd8fd2931da4ae6ed99dbce79a7cff6ab7712c47a4a6a1236b3e7f texlive-pst-node-20180414-25.el8.noarch.rpm bdeaa5b94bf2d293df988ce49c13ba87abe22f6aa296fecdc8b8851ae9ade40d texlive-pst-plot-20180414-25.el8.noarch.rpm 967a715fb7176081efa0aa708877e8b19663fe760e135f78b4366ffb8a1874a9 texlive-pstricks-20180414-25.el8.noarch.rpm 350d5a6b13675349800183883c8b88c5455da7b6d73c3a4558f1e1b503cc69b3 texlive-pstricks-add-20180414-25.el8.noarch.rpm c312c0baec64e2af4fb550e7de79904aede52e7ca3d27e8dd9e5f64789fd8d24 texlive-pst-slpe-20180414-25.el8.noarch.rpm bdef81872dc1d9a8928916628ded266b1d3adcd203b2a21bc2c4bb9da821d982 texlive-pst-text-20180414-25.el8.noarch.rpm cb490a8033b1d8ee9a0a31021cd96c5ba2b8d21b8ca71cb459a085f4a0f43f25 texlive-pst-tools-20180414-25.el8.noarch.rpm 877d31ae68ec45b838935059d10bd09a249c615227fe5b6276c3956ec7f71259 texlive-pst-tree-20180414-25.el8.noarch.rpm 36792c67326e69f07a9aaa803ab65c972c3996b12d4fc3fa0571167a679153f1 texlive-ptext-20180414-25.el8.noarch.rpm 14a6ce72f4d61766c2f46f5866ec5e24fd429768732cffe4baadf9f028086e6e texlive-pxfonts-20180414-25.el8.noarch.rpm 600cc954569ef159eaf9f82daeecc817082bdf1e5861f38d553b6786db4641c5 texlive-qstest-20180414-25.el8.noarch.rpm 81feb479ac5f235eed04cd3b1f81ea0c1ac4b00b4fbf209f0a4820f00ec7289f texlive-rcs-20180414-25.el8.noarch.rpm b183bac2702ef64acd4c71c048d54a4b0855fc34dff00d216c4432c9b3f5f40b texlive-realscripts-20180414-25.el8.noarch.rpm d7571451e6ee87a7a0cacec53222391f2a13120ac3eb4dbeacc54927e2651309 texlive-rsfs-20180414-25.el8.noarch.rpm afe0c0d8c8c14f1c8a87c4c3782e8b72a61a529a060e735f1184cb6942d7837a texlive-sansmath-20180414-25.el8.noarch.rpm 74a6f3e2b7f427381fe302351c0ecc71b9de04fbb7b8abcd49a293bf294b63fb texlive-sauerj-20180414-25.el8.noarch.rpm 05865812ae0fd775d087c248df99b21b0b13035b6bf041622492c866e29dedce texlive-scheme-basic-20180414-25.el8.noarch.rpm ad82a5c66a559a3ca89c8dd34b298b90c2450bc47f72736a4bb1303a5e6c0174 texlive-section-20180414-25.el8.noarch.rpm d412cc0b4acc79976189331ba7cbeabd0f8086daa3e0c0f3e462e346a96f86e3 texlive-sectsty-20180414-25.el8.noarch.rpm 7d8e65b6af455c15fffe03cd53935941e0f0966ce93d6db8ac4ecd0bd8b999a7 texlive-seminar-20180414-25.el8.noarch.rpm bec8e7f734861c4d1fd6961e261aa41f63d4bf335775c60ef01806d937fcd921 texlive-sepnum-20180414-25.el8.noarch.rpm 08589b08f704af9d6b3960555ee5595706e8f6e55e49b706376d302d3c5c4c55 texlive-setspace-20180414-25.el8.noarch.rpm 5d1d45047e7feeabef98c2cd75289d35807ad80c37a0624cb3089c80f1f44dff texlive-showexpl-20180414-25.el8.noarch.rpm 82a67a944b3108b82ab58a93d51d9f7231a3a323689a44967fa4e8a89e351537 texlive-soul-20180414-25.el8.noarch.rpm 07541f907438b8d1741b4f6481241b886ecfac4a24656b4452ee6f4cbf189792 texlive-stmaryrd-20180414-25.el8.noarch.rpm 30ebfef7fa0e3733cb142762b6a316adc3d213dacabd7306a2754be6db5f421a texlive-subfig-20180414-25.el8.noarch.rpm cd94656b9ec84434f024eae054cf96600b38d9dcf66a1b43c5fdf69ca5695db8 texlive-subfigure-20180414-25.el8.noarch.rpm 2b7e3d38f128bcc34365ff2c685956e29b38e16b80febbe16abc7a41eaeac06a texlive-svn-prov-20180414-25.el8.noarch.rpm b4de9215e7fedcfd6c87c976ce54fc096dcb12b1f6dba4710ff775092ff13c4f texlive-symbol-20180414-25.el8.noarch.rpm a83714592e9fc0d2a3905f6f656e3e4c65043a7bcfe59105436ce3eed1580d25 texlive-t2-20180414-25.el8.noarch.rpm 2b0673fc72a9b98feaf4ebbeac0c50aafbfae84cfd4cabd8629a0a5d498c1e35 texlive-tabu-20180414-25.el8.noarch.rpm 953e85f3d77553697a9fcec9d9f072e35cb1f2dab217d8d1883adccec0bb5adc texlive-tabulary-20180414-25.el8.noarch.rpm dc0fbcf1551b693860890758a2122dea684d650bca657bab6ff888ec6c17f212 texlive-tetex-20180414-25.el8.noarch.rpm dc497274a99ee79d02febbf97280d48b7c2067d527f682043c47b2a6b50bf62a texlive-tex-20180414-25.el8.x86_64.rpm 7f7d031f477f4a95aa1a88b4f88ca0d06026ec6a3920afef1c5e6f063df0b8f1 texlive-tex4ht-20180414-25.el8.x86_64.rpm 3fc0fddcbf11aa8933f47502decef9800ae973cc7673fd23b7084fdd450cc020 texlive-texconfig-20180414-25.el8.noarch.rpm b9fa8f9f1be36d80c4a43a4a59a2944da6996cb07a7e966f24087640ba000150 texlive-tex-gyre-20180414-25.el8.noarch.rpm 6267176d8af8daf75f79ffb1523f7acce018d3e494e43d5f678225fbc749cbdf texlive-tex-gyre-math-20180414-25.el8.noarch.rpm f02fcee0961a55dd7d0ec6635ecbf59e48eec79ab37cb0035ecb2cd04c1a02ef texlive-tex-ini-files-20180414-25.el8.noarch.rpm a7e69cd3d53f2875756562dedc8b8646c61d9d035522555d34f85359d449f34a texlive-texlive-common-doc-20180414-25.el8.noarch.rpm e2fd4f12c34ff93782e4dd7d9da12bd3f371b37edc8f5a5cc808dbec7855c711 texlive-texlive-docindex-20180414-25.el8.noarch.rpm c5d5af7a9b8d3052e5fb6b17b79d1b26ccbdfdd128bff0e7e7eea7d90b3348b1 texlive-texlive-en-20180414-25.el8.noarch.rpm d389c653f60ffe65c97062dcf1be0cc9b8450bf210bd3758cae9fab226d4da83 texlive-texlive.infra-20180414-25.el8.noarch.rpm fbbf3ea1e691f40964556f0976050962e0c0f0ee9cf2c59fd7c054c19b26c807 texlive-texlive-msg-translations-20180414-25.el8.noarch.rpm c7a47e0cbfd0e9efca1f920d58496c3185a966b30ce2ac37d70230044eaf90b4 texlive-texlive-scripts-20180414-25.el8.noarch.rpm f5e8607ea1c58414fae42b5324e37909020f0b814b3785105681849a794f0c21 texlive-textcase-20180414-25.el8.noarch.rpm 104a4089ebb2151b1cc04bc788ce542d6eea029d659e901d9a48cda981ec35cb texlive-textpos-20180414-25.el8.noarch.rpm 20d44db43a3ae1fd285bb459da40d86090aab9ca5c92bcdbf69286879c9af478 texlive-threeparttable-20180414-25.el8.noarch.rpm d35abc2b7c31a863117bd84c0142458251e8df5538b23144100e01cec7ae433c texlive-thumbpdf-20180414-25.el8.noarch.rpm f2c65a773c9b4ecb993dacbe9f50f79f54bd1e496ab3aed9cd37ed778bda3846 texlive-times-20180414-25.el8.noarch.rpm 2a28c27625325022e853bf6529d337f1dddbb339457e7e5546788dc1025248cb texlive-tipa-20180414-25.el8.noarch.rpm 0c49aae89d6b86cae3743bb2c0a34614d05b15c7299f1c54c8bfaae10686187b texlive-titlesec-20180414-25.el8.noarch.rpm d52f34e34e3fb42909d3c2d1a6802cd801e856af8e7a102a73b9ff2c5fa25b93 texlive-titling-20180414-25.el8.noarch.rpm 912b1dc794180ba10b6c4029c89aef8b04cb46d95846fd8374b31810760eb88e texlive-tocloft-20180414-25.el8.noarch.rpm 7dd0625f7b434efa408f54b389baf7a535ecefbfabf69fb2b56ded1734928d20 texlive-tools-20180414-25.el8.noarch.rpm 9b747ea9bf5d545c90927f07416d5e2ed2ad1f88a4e2bcafc5b7863ef692b03a texlive-trimspaces-20180414-25.el8.noarch.rpm 15a26867bc705b19b949201fdc753ed5260d55b662a39493042069b03307d484 texlive-txfonts-20180414-25.el8.noarch.rpm 9abe447a5b9f43516bc6707100a37c90a09a47faff6dbc88ae8ece8b5092d892 texlive-type1cm-20180414-25.el8.noarch.rpm 53e9e8d5e24bab93317baf13ca4fb751c32794850c15439df41256b15fd8e876 texlive-typehtml-20180414-25.el8.noarch.rpm 6d69c4730e5b935accf6a65be8743488293d2a55f39beda698f5804b779cbd79 texlive-ucharclasses-20180414-25.el8.noarch.rpm c269d8eb7f8fd28d22cf8de8e8f7e71c86f5604dac61187d9c87def684f0cfa9 texlive-ucs-20180414-25.el8.noarch.rpm c3b331878f149cf7b2ba3e239bc3e28808f68873f7f8eb9eef2c48620a837120 texlive-uhc-20180414-25.el8.noarch.rpm 286ac130a0d6b5163eb04b5a61ff1c9dc059fb648a1cec93dc24aab728feab92 texlive-ulem-20180414-25.el8.noarch.rpm 02321a09505fedeaf342564f9ea842871d56a5f11a41bc8d483fecb01f5f124b texlive-underscore-20180414-25.el8.noarch.rpm cc60599bde0aaaae03130de033d9f5247b60ca2db3fce343f2e40f22e5897b23 texlive-unicode-data-20180414-25.el8.noarch.rpm 6ba01e3a12043d988418fd722dcbe35ff27db55da051631531ae6cec7e548be2 texlive-unicode-math-20180414-25.el8.noarch.rpm 9b0e96ab993a164ab8dc5860d7d541e942b394a03d83da9c2c47f1a88993f74b texlive-unisugar-20180414-25.el8.noarch.rpm c249b8b049c232637ccd9aa067f1730133da0e1d9d24d945ba7bc7a64a38a69e texlive-updmap-map-20180414-25.el8.noarch.rpm bfb2b0eefa387a9b82412c6adc95eab799ec148f87586820867f31088f3f363d texlive-upquote-20180414-25.el8.noarch.rpm bebbe238254bf2b2ba67ef05b6ef58c1a4800f621facdd7dce14c34aa7dd11df texlive-url-20180414-25.el8.noarch.rpm c2f8aa3df0e581f7dfc952def1d613bd5561e768cbbb53e487fcf3712c66122f texlive-utopia-20180414-25.el8.noarch.rpm a562b2f297800da4f65a2cb5f4bdd95929499ae9d956940323c6a831f5305af2 texlive-varwidth-20180414-25.el8.noarch.rpm 1abb88c659a224bf9c30a14389785cd6e952429dc1007121e01865765cb7a33d texlive-wadalab-20180414-25.el8.noarch.rpm c6be2bf4f1abbbc548a2963a376d50f8d4197e1e937350fdd2c34eea485004a3 texlive-was-20180414-25.el8.noarch.rpm 33b9b27340002619548d4defb2bd172a597c4b7db59379663ccfb3ef64b03840 texlive-wasy-20180414-25.el8.noarch.rpm 8c9c07704e7042f3eb8eb21cbee67da44dc45c83095c44af6b9b092bcbd5c706 texlive-wasy2-ps-20180414-25.el8.noarch.rpm 7f4a1104098779f6e50799b61f2ec282725da567b3b702f6c4e03f1e52620672 texlive-wasysym-20180414-25.el8.noarch.rpm 6267c122a0d713e10ccbd05405bdb1a91acf4502063de9a10894bb0411990d37 texlive-wrapfig-20180414-25.el8.noarch.rpm d48b2af8a2e89add3efa2d8aaeffcd07f17d58925c8ec14cdbff22d9eb9461c9 texlive-xcolor-20180414-25.el8.noarch.rpm 1e465a883df073586356d7fa7971af219cb86aa0ff5ee99647cd0a711070d62b texlive-xdvi-20180414-25.el8.x86_64.rpm 6e413c15fc26329f8eafeeeed53cb6b0d4f4a9e6629210c7d4f66c6adf9d2905 texlive-xecjk-20180414-25.el8.noarch.rpm 2881b95baad014b507af066f1a63af9cee781a1853a802f5830e6d3c82c8be52 texlive-xecolor-20180414-25.el8.noarch.rpm e93e06b8b0666dc24439d1d710ba2fbc4961e395e371df86cfc9a1136f1b8324 texlive-xecyr-20180414-25.el8.noarch.rpm 509ab80d239ba3117657c531301cf375f48e23f0747e9451a9a3699ad88d9bff texlive-xeindex-20180414-25.el8.noarch.rpm c23448e339a26848e66687faf56a3eaecb91bc7c26d1a20c2af16cb8b5cefb98 texlive-xepersian-20180414-25.el8.noarch.rpm 6064d741e9d670b84ea1268c2dc07f1e05742b8480b0dccb39e1ec50239a5876 texlive-xesearch-20180414-25.el8.noarch.rpm c3846e7f8543ecc09ba3705d06c4cafcd36bf9c6e8fc9c9747a0df620c2a9101 texlive-xetex-20180414-25.el8.x86_64.rpm 80cc7e19c1c545758bd2879b21c8fe0f4f96555481ba1c8d265ec064bc0a2bfd texlive-xetexconfig-20180414-25.el8.noarch.rpm 14adc8d26d29de3280dae6bec4944e7f6b107f251a65e13e0c0cbb4cc8d218b4 texlive-xetexfontinfo-20180414-25.el8.noarch.rpm b3f8eaea4701216a1a911b4cda144f0c5357f9d71a8566f1b1d4491a02a808f0 texlive-xetex-itrans-20180414-25.el8.noarch.rpm 9ead8f4f0e698479a0a30ac2972bdc0aa0c36a3073458ff0cd7decf723498a60 texlive-xetex-pstricks-20180414-25.el8.noarch.rpm 1a3ec47824bfb71c08f48dc9e14cedeb1361aacdde77c3980937d2dcae43da7f texlive-xetex-tibetan-20180414-25.el8.noarch.rpm 7cbe5fcede6edfeaf6eee9d7da0f385f6d40d8d3412a278ada5794f75f39317f texlive-xifthen-20180414-25.el8.noarch.rpm eb2cae8a1c6924a49608b396ad1783b9cb97068d4cbf23a4515ecef1007e1be8 texlive-xkeyval-20180414-25.el8.noarch.rpm 42781c9ff19986c35e9d946809d8b8bffb7a93a00eb70598aef9213e7c1edd2f texlive-xltxtra-20180414-25.el8.noarch.rpm 26c45537cb2def83be67ab6d67aab7d713d7197f2d77099eb14dd9832d0258bd texlive-xmltex-20180414-25.el8.noarch.rpm f853df1e34b90586308a6eef776677f90f9b6e6e4e63a8d60d036e2aac58f807 texlive-xmltexconfig-20180414-25.el8.noarch.rpm e75afa7cb9209710b5f8f4d61b673ac1b570e73341c78a69401e4aa174848148 texlive-xstring-20180414-25.el8.noarch.rpm 1f483cd72604909d8f2a7a1b59e3d10d31cc6d31d652ba10c4a7463e5c926df1 texlive-xtab-20180414-25.el8.noarch.rpm fb06b9814d301d7d9f40ca73f233b6b645dc8f7259c277b9fa0e9993d53321b2 texlive-xunicode-20180414-25.el8.noarch.rpm 24419ed5a08458703c8e194c1a54ea9a13cd96256dc92f2b3eab1cbb6c82f057 texlive-zapfchan-20180414-25.el8.noarch.rpm f41cb46d0c5aaff3f9e45c0659527d4ef7713ddaa1ce35dfc29181c0303e87c0 texlive-zapfding-20180414-25.el8.noarch.rpm eff7eaa41dc39ba23b87ee895773c7b4e256a48ac830736aaae6622367001393 RLBA-2022:1892 sysstat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysstat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sysstat-11.7.3-7.el8.x86_64.rpm 18ebf39527982354ecd4e9f241cb0ca214e9c626ff13d63897a0ea0b2ad595d7 RLBA-2022:1897 gcc-toolset-11-systemtap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-systemtap-4.5-6.el8.x86_64.rpm 44a368e9fc0ad89c1cab208712d6edd8b070b3dd41e9ca9a059e8a6028334499 gcc-toolset-11-systemtap-client-4.5-6.el8.x86_64.rpm 2a2aae7b383978ea9e1854f2ab4f842f2d2476dc07a580c70411b51f7afbcab9 gcc-toolset-11-systemtap-devel-4.5-6.el8.x86_64.rpm 1e2851383fbd0b0a3aaf1ce1c36ed3c4a89b5ed4289207308b5224bbc94c8b22 gcc-toolset-11-systemtap-initscript-4.5-6.el8.x86_64.rpm 21b8c938af2bbdc4d410e32fd36feb852293565b1e22069a62562cc385b627c0 gcc-toolset-11-systemtap-runtime-4.5-6.el8.x86_64.rpm 63f6d86581cf4d3949da19fd4033ae6df34a327a1e116bac053c8c09847f0a78 gcc-toolset-11-systemtap-sdt-devel-4.5-6.el8.x86_64.rpm 3933f9ea0548a4cd585056f115026c3aed083178106b846ea77475121e94ea3c gcc-toolset-11-systemtap-server-4.5-6.el8.x86_64.rpm e6a168197e3cda466086095cb04a170d69b909d9f19c813dde906c9f48f3c51c RLEA-2022:1904 new module: php:8.0 This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 RLBA-2022:1909 spice-vdagent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-vdagent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-vdagent-0.20.0-4.el8.x86_64.rpm b3605bc678dc36fdc5ced1b865e1fa1437222171da80645ff01e2d9cb88205ea RLBA-2022:1913 tcpdump bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tcpdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tcpdump-4.9.3-3.el8.x86_64.rpm 606612b501e49ca1d1656e14f9a5309f36f6d181532e4d20df341fc04df4f6ce RLBA-2022:1914 libosinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libosinfo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libosinfo-1.9.0-3.el8.x86_64.rpm f5860ea3eae997c4028830f13a0d0f78333d9ad5a20953ed3455586af8c2b197 RLSA-2022:1915 Moderate: httpd:2.4 security and bug fix update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193) * httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160) * httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224) * httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193) * httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160) * httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224) * httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm 4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLBA-2022:1918 webrtc-audio-processing bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for webrtc-audio-processing. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms webrtc-audio-processing-0.3-10.el8.x86_64.rpm 2842620f64a4b5acf00d61cb3ae4d86a42605d5e9084b7bbdbcb125cf3b2d594 RLBA-2022:1923 gnome-session bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-session. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-session-3.28.1-14.el8.x86_64.rpm f581f6dc06c1c8738281641dacd0d9f0e19f1d534da0d2faaada8f5cc892e39b gnome-session-kiosk-session-3.28.1-14.el8.x86_64.rpm b818bf62e55ce8a88a3ada3af7f3c33a5fe47848814cc0651137b9727edad179 gnome-session-wayland-session-3.28.1-14.el8.x86_64.rpm dea48ea5a779795ba234e782bde1bda745f23e91d796e38c950c7d575c617e32 gnome-session-xsession-3.28.1-14.el8.x86_64.rpm 92930d1b2a3373ee484493ba6f32dd8323c3a5ae3d237a4a2a58cadccb5eea85 RLEA-2022:1926 libreswan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libreswan. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libreswan-4.5-1.el8.x86_64.rpm 28ccbf755030a96bbc1a660229ee3796060f067345edd60000b459afb72bba24 RLBA-2022:1929 gcc-toolset-11-strace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-strace-5.13-7.el8.x86_64.rpm 8340fd0cefab9e5f9104cbba5427b8a30afc390ea304d84589004a961a5273ae RLSA-2022:1932 Moderate: python-lxml security update lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-lxml. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-lxml-4.2.3-4.el8.x86_64.rpm 10e104ac88f0773f495df99f033e9fc933362a6371329d9c392d96d43c766b5b RLSA-2022:1934 Moderate: mod_auth_mellon security update The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server. Security Fix(es): * mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mod_auth_mellon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server. Security Fix(es): * mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpm 4e2af6902d8948be02387c6a9ce5db3423f38ce4f60913a06e463b6ce72e7b87 mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpm 7b1ffed1c79ced0755d2f174d7e67f5d933ad0cc601c2c11f0010cadb54fdc3a RLBA-2022:1936 vsftpd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vsftpd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms vsftpd-3.0.3-35.el8.x86_64.rpm a1e5698fa330881ab4899757f583b2712629ee295d2eda043d1bb37fee955838 RLBA-2022:1938 hostapd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hostapd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms hostapd-2.10-1.el8.x86_64.rpm b9ac29f6c6ff5e0efe5bf53898c16c3d104f59445268e4f10f39b2efec8322e5 RLBA-2022:1940 egl-wayland bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for egl-wayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms egl-wayland-1.1.9-3.el8.x86_64.rpm 5863f1d68d29762f4265851a4583037e8ff0d6cd00962e7dfbc96c9d941e3c0e RLEA-2022:1943 pmdk:1_fileformat_v6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pmdk, libpmemobj-cpp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pmdk daxio-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 963751bfb649f95591c1808f358a112d41536259e0323cf9f86d2e69a8c05db4 libpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 19f3938519fdd148bd78ef3ec13c2e1b604a901b5fe1f82d99cb6673aff0a0be libpmemblk-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 465a9e4c0f257f572f3bd0379bb9d6cad2692a87617268e36f47ce9960fb9e3c libpmemblk-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm b7a4ff7a843998c42d1a2a8d531ca2ec845b9d6fd6e0149d63d352c0db731b59 libpmemblk-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm eb818cfc5f415610acbfe575931a53b9b26335b6b8f948da35b6593a94cabfef libpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm d269a75f3c76f836a86ac7ddaeb69b1371e6aa82706c34718968b3675f5a6e41 libpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 68ca3f7c0c3379900aedc8162d5ebf8322d73c61c7463f5643ab498329376731 libpmemlog-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 2095a586118d758554389b640f9429064c1c17f895833837765197c32f57fd3b libpmemlog-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm e5e45f30eeac5359ee8c456839d01f3cd536af8530e8ac6a131cb7748c009bb2 libpmemlog-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm d18d39c058d5c8a4c1cc15bc82c845a50c967ca59d9f8ce5e0ead104fa77ec8a libpmemobj-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 764fa3f5c3ac2e3773ff03d951d1c61ce679d612aa330bf946916c4fb802282a libpmemobj-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm a7f4fc10d017785d12c618eca0227a703b11e7e2d89f3f4c8fc16188afa26bd0 libpmemobj-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm b9883c286082e87a4f9d48953ad92d5d074158a71a1d4699be165d044b6fb600 libpmemobj++-devel-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpm 534a08c1946cafdceb3afd81823bc2fc23c78f7cbe75be848ae4c480a1b44993 libpmemobj++-doc-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpm d39e51c9f69e29b7119cc33b7c9a0096cf56f79af085c9e582ddb96354b44184 libpmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 173613ad2dc1a6366d24019f1dcf276ab1810942f7fdf3220b68cc33866e9e3f libpmempool-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 70be05cc99ef64babf20fa1fcc0980ea20d28339ef02a93e78af182121dd4897 libpmempool-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 32bbfdf69bc4823362c256cdf4b395326d1239ca05bbaeb5c40de0729c6b8c4e librpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 089e2693ebe7733f5effa2d7420443ff28ab4829cbcb872a5b92315b238d04a8 librpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm cc4326c2ab389c18c9756da388baf4aa335e2924fc3ac88fa941f02c76271d16 librpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 7660ae7f67e41540e0421fbfc959f65821e588e8348e1039a183fbc3f80eeb20 pmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 894f1afb6e937152a6980a230fae9210cd06c9d91e1a38eb23c89d9a498f3165 pmreorder-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 2fec02e2edf426bd5479c35d56b3e17b339d9173390e6e3be1b5576640102160 rpmemd-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 22a93397c519e9e66e037bb007698dbc706a4a25aa6cb7ed79dfd18e2e6bdf99 RLBA-2022:1944 netpbm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for netpbm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms netpbm-10.82.00-7.el8.x86_64.rpm 8720cb93f3bd6269e53e9f53aee095bd9c658891536e3a4c27e64eeee41b1322 netpbm-progs-10.82.00-7.el8.x86_64.rpm a19db72d87f18fa35ed3217c757ef60b46df7d80449c61645ed6ed8bef2a9d96 RLBA-2022:1949 python-pillow update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pillow-5.1.1-18.el8_5.x86_64.rpm c3b196ec79ed44cbba9c193e5da4687349ed47692644581fa5028742c74ff5fc RLBA-2022:1951 man-pages-overrides bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for man-pages-overrides. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms man-pages-overrides-8.6.0.0-1.el8.noarch.rpm 438eea287fbef077194471c4ee49641f682af62a0691c6fd1d8b0ab298c21f91 RLEA-2022:1957 perl:5.32 metadata for the Rocky Linux 8 module matrix (4/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 RLBA-2022:1959 scl-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scl-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms scl-utils-2.0.2-15.el8.x86_64.rpm f4811fcdee1d82ecef667fcb852ee1d16d2c7113b01f106e09d0657e12dd4f34 scl-utils-build-2.0.2-15.el8.x86_64.rpm ac75a2dc62e0263cea333b700d9129a14875da4e5bc77bea3a1107d6ebfee9e7 RLBA-2022:1960 gegl04 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gegl04. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gegl04-0.4.4-7.el8.x86_64.rpm 48ae7950b7af2b4fa21076f8f1d60551a931a3a27d0260736501d8d46b0b5cfa RLSA-2022:1961 Moderate: cairo and pixman security and bug fix update Cairo is a 2D graphics library designed to provide high-quality display and print output. Pixman is a pixel manipulation library for the X Window System and Cairo. Security Fix(es): * cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pixman, cairo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cairo is a 2D graphics library designed to provide high-quality display and print output. Pixman is a pixel manipulation library for the X Window System and Cairo. Security Fix(es): * cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cairo-1.15.12-6.el8.x86_64.rpm 7fd42a923afbaebcff03073c443235685e4094ef7eab8ca48c8043d198b92673 cairo-devel-1.15.12-6.el8.x86_64.rpm 438d6899db8d75f02ae86797acdf9e157a38814214b60a8c8a43a2174100fec1 cairo-gobject-1.15.12-6.el8.x86_64.rpm 6828a209878746c228c9902843e0519407eb9cb8a3d204346a68833e9321ce8a cairo-gobject-devel-1.15.12-6.el8.x86_64.rpm 9fa96b78a8a7f6114db6763d6f1f83d3a435ea0b2175914e79ec4fb70ae55414 pixman-0.38.4-2.el8.x86_64.rpm fba43060573303c7e5d8bf3f65997ab720d2935be48a2910b778ee8e84f5fcc0 pixman-devel-0.38.4-2.el8.x86_64.rpm 07460cc1404bd085931f245340cebd640b41c1fe8596e9683a1167745a18bfc5 RLEA-2022:1963 new module: log4j:2 This enhancement update adds the log4j:2 module to Rocky Linux 8. (BZ#1937468) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jctools, log4j, disruptor. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the log4j:2 module to Rocky Linux 8. (BZ#1937468) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__log4j disruptor-3.4.4-2.module+el8.6.0+895+381d2531.noarch.rpm 6809ec19964e8ee53bf70611ff4096cd7e87c5728f84e9d179219188077d3366 jctools-3.3.0-3.module+el8.6.0+895+381d2531.noarch.rpm 4bea6a0d79011efd19bb2d988bcccb04d5701625eadf5f29d0ce32bc3861f3e7 log4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpm b1620800770b3aeaff9e53cc7a4fb9041956028dbe2d3efae1157b87b162448c log4j-jcl-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpm f6205522d8453908ed1ae3e2f046942626abe705531f0b7c2d67783c6502f794 log4j-slf4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpm 4c36fcf064876fc64b9f5ae9faee4474b2e30e6031af1f6bbd0f37a4da306284 RLSA-2022:1968 Moderate: libsndfile security update libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libsndfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libsndfile-1.0.28-12.el8.x86_64.rpm 5e58b32e9b028c3abd837883fbe4ba64dafdd491153e5bcf9c347029a44e3be6 RLBA-2022:1969 dpdk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dpdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dpdk-21.11-1.el8.x86_64.rpm e9f76a1c2e6181c3b851cf29ac60c18b6fbecca07a5708e86d2634bc847f5d94 dpdk-devel-21.11-1.el8.x86_64.rpm d4bc8c11993f1481b73bc15807a1cddcec1ab21c93d13697aaf4a4121d8c166a dpdk-doc-21.11-1.el8.noarch.rpm eaf9c1a9cf87af38ac1c355969c6f845cfcb83a6e7abdd92962afb5cc41762d7 dpdk-tools-21.11-1.el8.x86_64.rpm ad3014357acdc36548f17ef3005719bb4f7dba1d64b2acdf7a3543c142ee7630 RLBA-2022:2141 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * Udica crashes when processing inspect file without capabilities (BZ#2077472) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * Udica crashes when processing inspect file without capabilities (BZ#2077472) rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLSA-2022:2143 Important: container-tools:3.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2022:2144 container-tools:4.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Udica crashes when processing inspect file without capabilities (BZ#2077474) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Udica crashes when processing inspect file without capabilities (BZ#2077474) rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLSA-2022:2200 Important: .NET 5.0 security, bug fix, and enhancement update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17. Security Fix(es): * dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267) * dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117) * dotnet: parsing HTML causes Denial of Service (CVE-2022-29145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet5.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17. Security Fix(es): * dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267) * dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117) * dotnet: parsing HTML causes Denial of Service (CVE-2022-29145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm 25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5 dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7 dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm 7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm 4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85 dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420 dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325 dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm 2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969 RLSA-2022:2234 Important: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm dc6f52adf8b10fd6b240c72b5ea1d62e0bbbe3d5bcc47380339117fc1953eb3f subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 802bbeaf38639b1e42096fab308cf1bf8efe3df3a1b3c3720b7a5ac3939b7265 subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm e5c5a44c338f73bb0445575d27aef6a4b1a7d1ae1f7246b7bce10b6fe5782f47 subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 152d3eccdd9928c4d97f5a47117cbd0d224ae5b7c9886e3cb0414f645ad85d82 subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm 173765bd35da01cbad3cba259410b0fe81e32cfe2efb3795e435403fdf4029e5 subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 1837382796e426c99566575486d20468e5e08d54a9feec23a37f37664c105dd1 subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm c019433f83ba3f54fb215c6f1a57e182c582f2f7b5aba6659278fb65bf8216cd subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm a181eeabc6eb2ac08c26cea039b8776703ecd01ee9af67eeddeef97c3765418d RLSA-2022:4796 Important: nodejs:16 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * npm: npm ci succeeds when package-lock.json doesn't match package.json (CVE-2021-43616) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * npm: npm ci succeeds when package-lock.json doesn't match package.json (CVE-2021-43616) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 RLSA-2022:4798 Important: maven:3.5 security update The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__maven aopalliance-1.0-17.module+el8.6.0+843+5a13dac3.noarch.rpm 645e5fcc65f5ce6a5e7c644af9aab686e5168eb67dfd41299b949b73980385fe apache-commons-cli-1.4-4.module+el8.6.0+843+5a13dac3.noarch.rpm 9cf097d54e58ae1b8fd93d9b45f21f4af852b93f03e628386bcd0c88fc09745b apache-commons-codec-1.11-3.module+el8.6.0+843+5a13dac3.noarch.rpm 605d7fd276cc1605f057689518327458da2d3e3bbc9ca913a6c22523af7e05f7 apache-commons-io-2.6-3.module+el8.6.0+843+5a13dac3.noarch.rpm c150457c26d08f11ab2742a26b5603ac0421309db274d1fb9291609513952291 apache-commons-lang3-3.7-3.module+el8.6.0+843+5a13dac3.noarch.rpm 0bec3fe86916400b445c090e2ac59fa15e67b85634d5d19db6be1bcfa35f53cc apache-commons-logging-1.2-13.module+el8.3.0+133+b8b54b58.noarch.rpm d1ce83ba6cb3e4a97216feb51b8f37d3bbd6d163343165ff58cc15cb5340f14a atinject-1-28.20100611svn86.module+el8.6.0+843+5a13dac3.noarch.rpm 860817f72225f53de2c34d05aec257a5d30619b2a66ac51d3e72c64b362a950b cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm e8d491fba0eb58a0c39d874c349f74791897d4081e994974882c75018a06fdb3 geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm 2816206b8a4525c74be3dd28945359d43c37633863851e98787e4c7785c009fc glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpm 17afe1f510bcc20dd864bd1d4ce9ef4ba137175ba3c1741f9006e00dbd48ec24 google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpm c8b1e0ebe1f806d22ee98e61211e3765171361d54c8aa43d237c47756d4413f3 guava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm e3dbd918aa5734109e5025fcff46aa6cd3a7d681c15b47b3839ccd014318b579 hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpm f9013313a092e35684dbfa9b11557e1603fe59feaa126da2cf2915c103413541 httpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm 7c7e53a1beada7fd2cfdae8f50acedd99d62bb3f92ee4cce8c7e8bd8e1e9f520 httpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm 6254441dd7d139fca7bf71c3efd602ae15c8d4ca4c448d26de3807a94f2250cd jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpm 86a01e3eab084e992222cf94a07c1591b41cf818904e7472d549b3d9f4fd2efa jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm 493532237bdca6b7839c897c1a96cdbe6f954348baf86f9e61abaab5b1ce1b07 jcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm ec223715ffea5512ef05f8360522ec30d7052669260bb9c86ae92f6710aa4168 jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm d53adb7c5604a6c4b463fd8356426c62a0e287bbc2cfbae244eb30eb68ed108c maven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm 8d0715634168a0feead5c2200b92f87700932e0482c656fd6d46804779e1cbf3 maven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm 53d03a2e69c1418fda008f86abe12366522fc7db4a6460e02364f332f8aa78d5 maven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 15ca161ef8ce0b64553cc1e9a6c08c7c52233756722ab7b02b71443b22d76bb5 maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 183df0d4f71c063a2120049da9cf587068a3c4afd57f31edbdab23d2cd42f87b maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 72909fd412a649f39c80a3aeac0785ba97622f59d0c490f5784bea61d6f9f22e maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 890e312f32d987ad806ead574436896a3fdb69cc4c701d10a8a5cdeed4f335f0 maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm d62eccdd6992ca5b358305ab16e27b68f98b9cf3b8b3d31b860dc1afe772d4c0 maven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm fe818f18b5bbfea7d1d477e35e8207ec850c4303dc4bdfd97f1c4fd5a788107c maven-shared-utils-3.2.1-0.2.module+el8.6.0+975+c0ed2db8.noarch.rpm bf6863b80c9ca556ea586da41e97507d8060bbcb55e29d709197c473079ceb7e maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 0348dc46c7235cbdb54e577a5c7e3bf67bf3990c5b5224da5a8dd810581b0aa9 maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 4c51162d25acfb25c357e2b78536d0439b499a894e89bd888970ae2ae7952e6b maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 7c235cf78744f6520a54c1ec8eea4e9f8adeb990d58958f07f1ffa16951fed0e maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 97503c4b45752870defade5f80b65af78a64e63bdb7ec31c7131f9478aaedb0e plexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm 92f2c95dd389e6f28bdb5336069b9843e2d77e93561cd94114e795b648669963 plexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm 86ef908e4b8b5f6b75d79fb71c9e941d77070240f9f520da09a8f02f76d68c55 plexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm 4df6c9152b37c8c6f3242626c80b8138dbc2dcc2c16e362e6b7f9bd5fc011e1d plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpm ea5b1b2a881c5ae1c82442c1642dbd21de75bf72f84186f1a04e06af74491791 plexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpm 3b64df7a26462444ef46b693adf0d9d4aa4022a17cacc936d2a76fed0c9466b4 plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpm bd6542f8ea1aa47b0b5b280828f4828dada693a8ecfe1e9eb55a1ebc300f75ad sisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm a417c7920d1c835b4342cf7f278800e79764ca5337c6d42e25e06f4484e6c98a sisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm a3be327bd921aab3011f3e1aa3639e45ef82c9fe97e29416851ef69300d9f4c4 rocky-linux-8-x86-64-appstream-rpms__scala jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpm 71f32b6fe08073c78cb2584b57563d05c063c8dfc6a71be37f424c67daf95938 rocky-linux-8-x86-64-appstream-rpms__pki-deps slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a RLSA-2022:4797 Important: maven:3.6 security update The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-client-4.5.10-4.module+el8.6.0+844+4401f2ed.noarch.rpm 2a57d054836c857182ff749dc7be558ee1a5f07b00522cae3cf3f3d87c914217 httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 02dcbeb9256307b3d4e05b330cc1b19315500c03a4309b032db1a7ee3f4b5407 maven-lib-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm ece3ed809322707652d98d21a587efcda7cd2dd195adc5eac9000510ad645087 maven-openjdk11-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 312291f926d1ff4969ce01835823bbe596fa6eeb2f9d678e4855fdb051961d30 maven-openjdk17-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 41a59d80aa9b8b60c4c5e2daba8b2ebcc4ae6d33583379342ff21d924a0cfd88 maven-openjdk8-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 93eeecde30df6567f71618ed96f9bda171f5a55ef954dd6506b467615e462913 maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-shared-utils-3.2.1-0.5.module+el8.6.0+976+839b99e9.noarch.rpm ae89b917cc31af01690d60f23c069ed38738288b8301fedcea65ee53e9a4211c maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLSA-2022:4805 Important: postgresql:10 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (10.21). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (10.21). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgresql-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm a6556d962b8a4f21a234401b79b04dfaa0d5b61827325a20c8ea65f8067db498 postgresql-contrib-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm f279a2e053d7188bae25db22cd9a791bd25f458a03d74cb0628dcaa85c4db232 postgresql-docs-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 87df4cba162d789d39a9523d06ee5feb42b3c481362ca95e556b445e6e29f15e postgresql-plperl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm cfa2703ebbe6afb8a1c428bacc45d8f2f18f153acda6fb288bc2b80bf1df5777 postgresql-plpython3-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm ddb003a769bcc194ab0b637b07ccbc91da7c739cd73fedf9ce4b73c41fc0b611 postgresql-pltcl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm d9a82d23a49cd4b229471121e55d4ff5433b91f06bda8638ba6f8354bcd366e7 postgresql-server-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm bcadbd1180ecfa672f9200bc1ff29e259e40b3b4a1fdf1a049a5fba65f51a631 postgresql-server-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 4e8fb48abd7db1afa17213b156d0e7bb3564cca215f8ae476e45b3d8114a32fb postgresql-static-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 39857f6bcea51fd8cb8377b16ee7b095b2cc7b8b9100c16cde17f540facd1f26 postgresql-test-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 3037b8880b67dd06af7e2984029602733a3143700865544c0615bedd5cc22333 postgresql-test-rpm-macros-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 8dda3e9fef1d774bae73bf59cbf3b1c564dfe692ca7fc7cb60f0a13b7a1b6403 postgresql-upgrade-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm b72c8a51074d3e368fb33e0b20e256a73799d7cb689c40c43a6afcdcadf476a2 postgresql-upgrade-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 745351bb1da0240458daa4c71cc28bbf516c3b1067e5b344afb80c1553952c42 RLSA-2022:4807 Important: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.11). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.11). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2022:4855 Important: postgresql:13 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.7). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.7). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc postgresql-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 5f8b0f083a1c9317df2506cef87ffce359943e65029a35861574bee6915195f7 postgresql-contrib-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm bdb8007dd69d049f90a135191cec910719dbcccb2f71cda1f1ecb4cd646acbc6 postgresql-docs-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 4e69a20363fb0f37eb5d284f8d396a644c8a05b9f0f11586da2e5a95bcdf5232 postgresql-plperl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm e42432f9031923fedfe56d3931c1ad2bd0d6803b95e7514bc922f4f3a8a9e676 postgresql-plpython3-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 4e9e7590fdf7f3e7754a306ab37cc6353c94662a025f95f2121148a9e816806e postgresql-pltcl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 93599fd463b0958889f0a13fa32d36c2541db19d0d1e894fbb8f9bf792a801a1 postgresql-server-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 491ee6cb770d191dff89adb471c3b64810e6ba80e36989a0783ec2a4717f16d5 postgresql-server-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm fb598803af7755dec0375e23b391345d57d70616fac19f6afd6bc6e70bea42a8 postgresql-static-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm ea3065316ff5a9e71a63d1d3c8f3b2fec8096d24492e157c537e2a3d28f4bcb4 postgresql-test-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 730791c8791203248f3a1f0de1f71f9d4c3af466c3cd115bbcc538b33617c8f4 postgresql-test-rpm-macros-13.7-2.module+el8.6.0+980+9caa008a.noarch.rpm 13c1e52a8405f67103c08fecaecc5aa3e3929a055ddc44f4478cf2066c51b6cb postgresql-upgrade-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 0c989ec06bfbb47761b85d6631d13fa3150be693ec2c8e34536e7b2acf9b9a75 postgresql-upgrade-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm fc5a01ddfaf607fdf9268ab430711210612faaa36589eb71c23e6b62950c1b2b RLSA-2022:4941 Important: subversion:1.14 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 731bbe79595f494e581798261d3910616e1bcdbae2ef7f981b215453cf5af705 python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm b9453a4cc7f514c6b5d4fc9635d55f1cf4c75dc38cb5f774719646b8d4e57001 subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 117b77bc021f04f14594b64923ba7fc5d339150c0c18bcaac03c2830da8dc238 subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 2089246938eb318f05ba38eeeb5cbba0cf766f9b1d2add194ed624c6123087f5 subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 7a0b71de12a9a00fa90c466b489c01106b0efb79cb41ff2eba7559ae09236461 subversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm 911dd1adbc2b2cac43e6114aadfc7a825121a1e4211043c26c97549ab1495e75 subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm e08caf8753168202fcb5ed6b9c38e8bb3897bfa19054afb1746cd7ea65d6fd4b subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 2f746f1042536d1ba89f58dfb7530418fc05f4c86af692b53a40239cb12a83a2 subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm af4c11a20b867799fde5ed6bf4dfb553c6904e4e9c46a1824273bb52354920a0 RLEA-2022:5139 nodejs:12 bug fix and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es) and Enhancement(s): * nodejs:12/nodejs: rebase to last upstream release (BZ#2084651) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es) and Enhancement(s): * nodejs:12/nodejs: rebase to last upstream release (BZ#2084651) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm 40c2bd9fc581b3e1911cff31c4448efb063ee0501c11a65ac2d28f1382c54edd nodejs-devel-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm 0dbea4843e50404baf084e6e5e5e92f5b880df36cd1f7fa26a530601ddb6ff96 nodejs-docs-12.22.12-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 6198e9169a86decacad936f3ceb4c2450717591622367d9718028aa44e938064 nodejs-full-i18n-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm dcb7739c0ed9048c9568bfb84a0d3411b019eef17458a5129d54b71ca7e69587 nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c npm-6.14.16-1.12.22.12.1.module+el8.6.0+982+9fdca2d4.x86_64.rpm 144156798b2195a01a827128f54a3e69a1162fbf8a6a56255c8fe4f115ecf1d2 RLSA-2022:5163 Low: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy NULL pointer dereference (CVE-2020-13950) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy NULL pointer dereference (CVE-2020-13950) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm 4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLBA-2022:5325 postgresql-odbc bug fix and enhancement update The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity). Bug Fix(es) and Enhancement(s): * postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postgresql-odbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity). Bug Fix(es) and Enhancement(s): * postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179) rocky-linux-8-x86-64-appstream-rpms postgresql-odbc-10.03.0000-3.el8_6.x86_64.rpm f32a46807101023fc6d8f5287a3bf75409ee0a2ed2e0107399dbf2f0247fd6ec postgresql-odbc-tests-10.03.0000-3.el8_6.x86_64.rpm 42395c2c9708007d6b9e4a81d12e39675d5001010f672d60bcb2c7a116f2684e RLSA-2022:5326 Low: compat-openssl10 security update OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries. Security Fix(es): * compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for compat-openssl10. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries. Security Fix(es): * compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms compat-openssl10-1.0.2o-4.el8_6.x86_64.rpm 598a90725474db12773498e0622b9370467f94e418f0fbbeed19788c425cff30 RLBA-2022:5329 cheese bug fix and enhancement update Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects. Bug Fix(es) and Enhancement(s): * [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cheese. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects. Bug Fix(es) and Enhancement(s): * [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028) rocky-linux-8-x86-64-appstream-rpms cheese-3.28.0-4.el8_6.x86_64.rpm 1cd8f7b5f5f9888477b2bcefcb93b5be066a6590b2c641568c3f6181b6285412 cheese-libs-3.28.0-4.el8_6.x86_64.rpm dd228cd48876d9151169a9ea0a1a7038423436c278231b7f41c1acc0fd374499 RLSA-2022:5331 Moderate: libinput security update libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libinput. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libinput-1.16.3-3.el8_6.x86_64.rpm 5448d678b4816353fcde30f677f369b1ac64b98b4f38f70bb834a02c47a65a3f libinput-utils-1.16.3-3.el8_6.x86_64.rpm d8bca0d5137448050cde5c77f9b5ab2ce245d586df2c2d05b7eb74710f9cf7a2 RLSA-2022:5338 Moderate: ruby:2.6 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374) Security Fix(es): * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374) Security Fix(es): * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby ruby-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm 487b8c46d410303fb33e9b4e4e4ca513c93dd6c1e32fff807b4264b4d58096a4 ruby-devel-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm 87986e65d2b0c62bd3a83a510c2d0449c400d26115a2ceac1032d7d47e4fba94 ruby-doc-2.6.10-109.module+el8.6.0+988+8031c193.noarch.rpm 9d8843b155706338029b8ff3ac04785aac8213b5a79e2ed4ee003a95909a2a62 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bigdecimal-1.4.1-109.module+el8.6.0+988+8031c193.x86_64.rpm 10b9574c4f8bca0abe496a931b0aa5dd387139008278ad0a5da143a5682b57d2 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bundler-1.17.2-109.module+el8.6.0+988+8031c193.noarch.rpm 314a44f0c44c7f8727ccd9fc45316c26e072302e5671e2dc845b25cc5b5d9fbd rubygem-did_you_mean-1.3.0-109.module+el8.6.0+988+8031c193.noarch.rpm ca729aa54be83479c4df5caeeda25008e6e80daed2ed60d7b410977fa2feb64d rubygem-io-console-0.4.7-109.module+el8.6.0+988+8031c193.x86_64.rpm f7c851c71db19724876afe804f48dc7a658bd9614199e0bf7db956cbd0b55210 rubygem-irb-1.0.0-109.module+el8.6.0+988+8031c193.noarch.rpm c9fc4170a5f613c975fef2607fa077aa227b8c417ba257e1ec09900fba95b757 rubygem-json-2.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm 5287ad497584609c9389f3b61868ce2e0d6352585cf05a9225349665664832c1 rubygem-minitest-5.11.3-109.module+el8.6.0+988+8031c193.noarch.rpm ed7fb2fc02330152e66a71076b3a24d830b27cbcd0b792d9fd4b7960cd882d1c rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm 2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm 338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197 rubygem-net-telnet-0.2.0-109.module+el8.6.0+988+8031c193.noarch.rpm 79a6b421c0f9cb9e060bb6e40e12edd46bb52a312f9921cd368989c28561a7a6 rubygem-openssl-2.1.2-109.module+el8.6.0+988+8031c193.x86_64.rpm 130c794fe5120151946cab09649d7a4741893b0bcf07050479ebe6b2e76fc189 rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm 0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372 rubygem-power_assert-1.1.3-109.module+el8.6.0+988+8031c193.noarch.rpm c84165bf53d6cd0bdba047786b91217c2f6ca8639566ed99a0a6bc37627ae4a3 rubygem-psych-3.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm 36de3362ddb04310b4ea3913105ac2819751c9e4eb68e5ac0056416f32ed78e4 rubygem-rake-12.3.3-109.module+el8.6.0+988+8031c193.noarch.rpm 4a45ad59ca4bd913c1e61aa1e9a8a9fc6fd239c162efbece0726593d270e0911 rubygem-rdoc-6.1.2.1-109.module+el8.6.0+988+8031c193.noarch.rpm 8d36041ac05e9f0cbe18cd425903a12368746681fcf6cc04146e04aad08dbff4 rubygems-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm 317ed3b2c5073ce0716025f4c43d611aaf0061c555f3bf701a531b0c6a10e893 rubygems-devel-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm 45b6e38e8e4165a994441054a1ce6223a9106dd561b97e2e09164bc5ee9188e5 rubygem-test-unit-3.2.9-109.module+el8.6.0+988+8031c193.noarch.rpm 65d84c800f67dfd01786d08e5734268cc8bf2688a0d4eef2846175b5185d7968 rubygem-xmlrpc-0.3.0-109.module+el8.6.0+988+8031c193.noarch.rpm 0114f18dc8974397c880851b63e25738ba31dbace6c3cf2fcc0a0ecc7bd83c5c ruby-libs-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm 69cf057803c2bfec15ce1a6c6916bd5dc1323dc64de13345603d5c061df8a1ef RLSA-2022:5467 Important: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLSA-2022:5468 Important: php:8.0 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 RLSA-2022:5526 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: DoS when processing gopher server responses (CVE-2021-46784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: DoS when processing gopher server responses (CVE-2021-46784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm 7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a RLSA-2022:5779 Moderate: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby ruby-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm 2dadb763214aaa0e2d5a932d0b2be42279f97080c8a066588d9f8a4438284ba9 ruby-devel-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm 63ad7a877a816b1ee0942047dbcbd71f9b52a383c9c7b5085700a830aea59c97 ruby-doc-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpm 596396ef464cb584fbcfbcfedce7fb181a7edf989a25279d6605766a4defca8b rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bigdecimal-1.3.4-110.module+el8.6.0+992+fc951c18.x86_64.rpm fbdd558fceda95c75edc0fb5bb1d7ddf9e063c30d5bbdc1f6e2e41182ee85924 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 35b1eb070daa09c0d94dfb8309d9246462588237b6ad7d097d09c3ff407d096e rubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 276974bce2b60db0a7af8e3c22f2ed904de58b105b059402ddb8011f5fde1cc4 rubygem-did_you_mean-1.2.0-110.module+el8.6.0+992+fc951c18.noarch.rpm 491c636d4f51e31158330ad61ceb6276fd981c445cb89c2f4d62c5553e27a61e rubygem-io-console-0.4.6-110.module+el8.6.0+992+fc951c18.x86_64.rpm 721026e35dc187724f15d31f30af92dfcf50f54eb6e1bd189642fa138bf073db rubygem-json-2.1.0-110.module+el8.6.0+992+fc951c18.x86_64.rpm c2c099d75145af293c83fa67f3467ed5c4473f5704c0db36b61b139d90a9981a rubygem-minitest-5.10.3-110.module+el8.6.0+992+fc951c18.noarch.rpm cae51d28a8aecd4d0367f6c9d4f150cced88a506b9c9e514a74ad6bce0399211 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-net-telnet-0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm 777398eda3736f19fd3f0dc05974980a2e181f5724125b572205c7a157b4e459 rubygem-openssl-2.1.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm cf100363a6bc1926d83ac74ce8a36935a4bfe376e0fb27a1d65f24add669b9ca rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-power_assert-1.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm 82029ec23ba40ce9858ae97a06b22f1f119c4940f9a9af1505881a9bb5ad6d7d rubygem-psych-3.0.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm 6c5c3b67723e03a280fde12f40f093877a67a8938e46f1f33ee3267006e5a57f rubygem-rake-12.3.3-110.module+el8.6.0+992+fc951c18.noarch.rpm 74c6e849df46135467e721faa7b1e77e2d8ea5665fc131700cb7ce3d51110dc0 rubygem-rdoc-6.0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm 6129045ecc2262ad1810376a02c3494b6a4a9a8d5c36277dba39c23f0ba04e4a rubygems-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm 1ed8de448e553d450c50b9b9d925349bacdd708c4840fa08be7af91d9e5f8f5d rubygems-devel-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm f19cf189dbb4d398d270ce6b7540cb3ece994eaacdd900be79a35e53865999de rubygem-test-unit-3.2.7-110.module+el8.6.0+992+fc951c18.noarch.rpm da1841c378881a90a4ea4c7ec8d19491a7ebfd49335e704e92c22724f5e426d4 rubygem-xmlrpc-0.3.0-110.module+el8.6.0+992+fc951c18.noarch.rpm 17dd4fdfa39afd9488c3620550b12ece5e1823503e4aad9a1e4ec19bbf592bed ruby-irb-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpm 2a82dc891c1e41d6c9b8a02cae648259d2a140d3a33be70a3ba91eb916287f4a ruby-libs-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm 1bca30a5e33cc4d59446068b15c4a6938c44057312cdb0b531f6c100309d523f RLSA-2022:5821 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206) * QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207) * QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353) * QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103) * Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242) * Remove upstream-only devices from the qemu-kvm binary (BZ#2077928) * When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030) * Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415) Enhancement(s): * Allow memory prealloc from multiple threads (BZ#2075569) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206) * QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207) * QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353) * QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103) * Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242) * Remove upstream-only devices from the qemu-kvm binary (BZ#2077928) * When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030) * Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415) Enhancement(s): * Allow memory prealloc from multiple threads (BZ#2075569) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d RLBA-2022:5824 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594) * Work on container-tools for Rocky Linux8.7.0 (BZ#2087742) * Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968) * podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352) * ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049) * catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143) * symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627) * Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594) * Work on container-tools for Rocky Linux8.7.0 (BZ#2087742) * Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968) * podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352) * ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049) * catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143) * symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627) * Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295) rocky-linux-8-x86-64-appstream-rpms__container-tools aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 8fb2669180d717578f5407e383babf56b298d037148cf7d9c0bd7f819a707601 containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm a0a9eb3a59768b77fa3790a555c1fb3f3b221258a5703418c0cd05b65245b4c9 crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 5053642b22732a14803ee43bcb11874bb3771e7bc9a4ddac6f46ffdd3543a154 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm 0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b RLSA-2022:5826 Moderate: mariadb:10.5 security, bug fix, and enhancement update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: crash at my_decimal::operator= (CVE-2022-27380) * mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Don't use less parallelism if not necessary (BZ#2096934) * Links in galera package description are bad (BZ#2096935) * [Tracker] Rebase to Galera 26.4.11 (BZ#2096936) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: crash at my_decimal::operator= (CVE-2022-27380) * mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Don't use less parallelism if not necessary (BZ#2096934) * Links in galera package description are bad (BZ#2096935) * [Tracker] Rebase to Galera 26.4.11 (BZ#2096936) rocky-linux-8-x86-64-appstream-rpms__mariadb galera-26.4.11-1.module+el8.6.0+995+5ac2a483.x86_64.rpm 6c1369187a1133e19dec341e7099ea8bf32bc734100484c6741278676af0e239 Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 mariadb-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 47eb162bd890e447dd3d4a0fb8ec38beeb0a1781fa625e38a13f0d45b9b816cb mariadb-backup-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 520a147d559446a5bc70a2c80a2b68d22152d14832d174a9173c497ffd1569a5 mariadb-common-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm f017c78532673f9532d2d7838729fc79d2abd947f2fbbd4b975426a2bc8c341f mariadb-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 556af926669474ea364941ba9011038a164ae7deba794a86d56700e37ae043a7 mariadb-embedded-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 88e2d30bef155c2ecee7a54fb42b172720fa505c53a671e011156277c224f9e0 mariadb-embedded-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm c33d67dca5240eabd8d936108e70067cbb8256d9c1cc16e698592ee0e2477b97 mariadb-errmsg-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 47efc58763cfa51e38884334ba62d8229f0d0665b478e3931782504aa5f3bc68 mariadb-gssapi-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 9cfc25a45a1ddd76a297284051b1c1190de192e49320a82af5e97ca7db0e211f mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm cb1e34b23abf93b073d095feaf75dbdda7b39bb843df2695eda6a10c94402df8 mariadb-pam-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 6f8686a5ea55e7ae295cb251db7970900c8bfceb3bf4c9eae7594d74d20f5cdf mariadb-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm b4aa22b0c0013875dc2bcb7102839c2bd62e6339028c069f8d8a51257d6024f0 mariadb-server-galera-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 98432d1dd9dac2557f64f2b412cec759d9e8d984fbfce194525a6efcb88babbf mariadb-server-utils-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 7a6fb0550f77340846dc5043895c5f0943607aa3da61662222adbf5b14d8a25a mariadb-test-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 00f705e37e4b2ee57e7bb0e4ee164bf02c0284c2037aafb112f075fdd34439b8 RLSA-2022:6158 Moderate: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLEA-2022:6440 nss and nspr bug fix and enhancement update Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062) * Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097900) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641) * allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642) * Need to be able to run self-tests at will programmatically (BZ#2099759) * NSS segfaults still in client auth path. (BZ#2105007) * ipsec --initnss timeouts probably due to entropy. (BZ#2121486) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nspr, nss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062) * Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097900) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641) * allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642) * Need to be able to run self-tests at will programmatically (BZ#2099759) * NSS segfaults still in client auth path. (BZ#2105007) * ipsec --initnss timeouts probably due to entropy. (BZ#2121486) rocky-linux-8-x86-64-appstream-rpms nss-3.79.0-10.el8_6.x86_64.rpm 684862bc5ffd7c2f1fb4e3d80f02a05807655af5f218eb8a71f0ae541f1f38d0 nspr-devel-4.34.0-3.el8_6.x86_64.rpm e5bfe96520798c594dbdd7506e57c5298e213e3a061559880feb30badacb0118 nspr-4.34.0-3.el8_6.x86_64.rpm 1543f75ee941cc74ec0e291eeb19eb2ecfa34491efa46059d78874418e9aae9e nss-devel-3.79.0-10.el8_6.x86_64.rpm ab6571733b23403211aa240ed384de6657911e94144ce724b3625f9e2eafe5cd nss-softokn-3.79.0-10.el8_6.x86_64.rpm 8f4702dc979720438b3ca338b5215f0ec7b017443c3a2229aa71f84ce6cfe734 nss-softokn-devel-3.79.0-10.el8_6.x86_64.rpm 312d074dd3bfe576a38f02743248b050e86211e4d82dd5e0c5a7e73a6cab28a9 nss-softokn-freebl-3.79.0-10.el8_6.x86_64.rpm 93e78d2bfa30aaa30402f15bb1a29c067a6bc628353eca60453d33fff73527fa nss-softokn-freebl-devel-3.79.0-10.el8_6.x86_64.rpm 4dcb1e4c0c555438b8b104b27e868ab458ee12bbd29f886d362eb9fecc56e4a5 nss-sysinit-3.79.0-10.el8_6.x86_64.rpm f81f9bedbc71db1b05c23f436b16a20bb898e02f4afbb4ae30142becfda270a3 nss-tools-3.79.0-10.el8_6.x86_64.rpm de6441d276507c10bb16f1cd2d3bd0cefffecfe0afb883037da27967a9f02c78 nss-util-3.79.0-10.el8_6.x86_64.rpm 4ed196ef6fa5a607f63430ec3e0822565f8a9dc8206ed99142b405eeba898adc nss-util-devel-3.79.0-10.el8_6.x86_64.rpm 87c06a950c7c6e78c9eec58822d246a793e52615e9db229244efc53b66eeeb3e RLBA-2022:6441 mysql-selinux bug fix and enhancement update mysql-selinux package holds SELinux rules for the mariadb and mysql modules. Bug Fix(es) and Enhancement(s): * SELinux is preventing wsrep_sst_rsync getattr of /usr/bin/hostname (BZ#2096279) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mysql-selinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list mysql-selinux package holds SELinux rules for the mariadb and mysql modules. Bug Fix(es) and Enhancement(s): * SELinux is preventing wsrep_sst_rsync getattr of /usr/bin/hostname (BZ#2096279) rocky-linux-8-x86-64-appstream-rpms mysql-selinux-1.0.5-1.el8_6.noarch.rpm 59f929c5d0c2e7f3f7e230d6eb9b0c9b13acf9642e4480b4337af56cf8b336fe RLSA-2022:6443 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: server crash at my_decimal::operator= (CVE-2022-27380) * mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083) * mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085) * mariadb: server crash in Item_args::walk_args (CVE-2022-32087) * mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: server crash at my_decimal::operator= (CVE-2022-27380) * mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083) * mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085) * mariadb: server crash in Item_args::walk_args (CVE-2022-32087) * mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075) rocky-linux-8-x86-64-appstream-rpms__mariadb galera-25.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 2be577e24b7e4146b38502688892f31ba8155f3d438f5a92f5a85f0fa7851036 Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 mariadb-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 197703483ce3f21c79732f53810f03df7c0c66092e2b3f6ebac1f8162fe5dd28 mariadb-backup-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 2d03c5141c3070e4bd6ec2a8f4700628b1748db93fe5672f80b8ab153eb0658b mariadb-common-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 8b149e91c59d3b25245dd670c5b194725e74926ccc3a20291d5266593075463a mariadb-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm f0db442d7effcc5c6cbfa80aa872c9c5be209461ff14eac63656d37c62428034 mariadb-embedded-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 69a13127d202418e1d44b7a86a3e2e6aba855ef254f5cfae2fb0f1cf37ef3832 mariadb-embedded-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm b607add53a12bab242b8c6d4e202ba0f4cd913e1b9c9910e9d3bac353d992dee mariadb-errmsg-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm add7dbf8fffba3d45af1ac1b1dbdc871c8816cfa0ce05643b7d4e2d9bb6d50b0 mariadb-gssapi-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm e21b0e182700d9b999634937b53ae7528d72c2b4f02b16e8b37c466110ac81a4 mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 6ad4255e0c08e2a3bc03e37fc3edbf0fe41a06ce6bc93c6938c3426ad9c246f9 mariadb-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm fd385abfac5bd7e60ed92808d09ab95f7a04533852a81faec7cb79d938c9d941 mariadb-server-galera-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm ae9a8c3f42acda894da8c5db9e83658028e99fa19473522291c49ee085bfd4e1 mariadb-server-utils-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 2f9999145d8b2fd0ce3150e61c6bebc0055b8c0c56e7165907fcc43a926b7a10 mariadb-test-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 58886712c7b405e6e25f6f5f3aec2f63464bfce745b87ebf3a893fd0886267d5 RLBA-2022:6446 virt:rhel and virt-devel:rhel bug fix and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568) * swtpm_localca: Test for available issuercert before creating CA (BZ#2109987) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568) * swtpm_localca: Test for available issuercert before creating CA (BZ#2109987) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d RLSA-2022:6447 Moderate: ruby:2.7 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby ruby-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm f2f45642bf7f06a97f1837a99723bdf345f8cf0d42a86ba4c2abebf283e5359a ruby-default-gems-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpm 946f3f97abe1043baeb20c0a8ec924bc61b0e49291b0268f1ad9ebb63a1109dd ruby-devel-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm d7f1677bef739a83801cb34b8cb531783273bffa871791c486245c24c80d4d69 ruby-doc-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpm 579c36711696058bd856ded4f64cb5fcf503f3ae8644ba42de9ddfa48ac5ba7f rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bigdecimal-2.0.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm 27064fe03f90f11b184ddd4d4f1d6ce9d8e51646562bd5e3a90c85d2df102dd8 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-bundler-2.2.24-138.module+el8.6.0+1001+b5678180.noarch.rpm 3fc4e371da55358a09ea6f0e5b6ed0dfcc5b60eea88257064740becf88e85887 rubygem-io-console-0.5.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm 2522f826d07e50f4573151caee2cba099b4a72ebc045ec4d268c1b25bbb64c66 rubygem-irb-1.2.6-138.module+el8.6.0+1001+b5678180.noarch.rpm f5de4c68458146f77746b2c54f1d3511db9649247a0509b93fc405c90043e94e rubygem-json-2.3.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm 4500a55dd4c62c954660301397d40e6f25634754290fa760657345fc6e212961 rubygem-minitest-5.13.0-138.module+el8.6.0+1001+b5678180.noarch.rpm 07ea22986bb44e59e068d3072dff2c0e00283df3c9200797e73bf0b79bf25c0b rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-net-telnet-0.2.0-138.module+el8.6.0+1001+b5678180.noarch.rpm c822b6dc4af76f61345acd67c7fef17fe33f713721e4777066455b87987488a3 rubygem-openssl-2.1.3-138.module+el8.6.0+1001+b5678180.x86_64.rpm 5427c2eed2ff85bb70f1c49c40faba028ec65a893e3aac7fa9debd97a5b7dee6 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 rubygem-power_assert-1.1.7-138.module+el8.6.0+1001+b5678180.noarch.rpm b209c9c0c9b782f49af94fa2235e2cd1c3cb29cbcac5feaf2cbd59f2abcf7488 rubygem-psych-3.1.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm 30f5559c86ab32c6316a499f02118c9ecb437389a2040c323891fc60761c85fd rubygem-rake-13.0.1-138.module+el8.6.0+1001+b5678180.noarch.rpm 0ac0cb168c5a0622b166259c5f0fdf19d0fe017d5f582db1dfb5925972eca0f2 rubygem-rdoc-6.2.1.1-138.module+el8.6.0+1001+b5678180.noarch.rpm c65ba40b347f7a15e64b79f71b1f1c8835be2c743e236142ac990d0682b06d35 rubygems-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm 388bdcba6820a3d09cda706b4296a1126cbbd464f7c8097390bc9b2675ded729 rubygems-devel-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm 7abd21c3882e5a577f6ebeef3c69598734c4b87c35e19b5bb7177383dec65f36 rubygem-test-unit-3.3.4-138.module+el8.6.0+1001+b5678180.noarch.rpm 913327e6b26f845a37ce3de81c1f00bd3141cba563c1bc82dc2ec347121b1595 rubygem-xmlrpc-0.3.0-138.module+el8.6.0+1001+b5678180.noarch.rpm 3fa5f6aaa2d8e47f2c6a76037399c71a2f53bbbed10f29c15c0adaddbc186bc2 ruby-libs-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm ca8a92b98fb7f6fe89556d2c3e76e9e146118a0b9bcd622d6a938d3feb34ba5d RLSA-2022:6448 Moderate: nodejs:14 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:14/nodejs: rebase to latest upstream release (BZ#2106367) * nodejs:14/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111417) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:14/nodejs: rebase to latest upstream release (BZ#2106367) * nodejs:14/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111417) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm 55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642 nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2022:6449 Moderate: nodejs:16 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: rebase to latest upstream release (BZ#2106369) * nodejs:16/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111416) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: rebase to latest upstream release (BZ#2106369) * nodejs:16/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111416) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm 55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642 nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 RLSA-2022:6450 Moderate: ruby:3.0 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Double free in Regexp compilation (CVE-2022-28738) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Double free in Regexp compilation (CVE-2022-28738) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981) rocky-linux-8-x86-64-appstream-rpms__ruby ruby-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm f15e2cb62f5089241b7c0d15d302850e6d62b29fd2baf95e4969d68291fe69a4 ruby-default-gems-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm dc9d3a0c9c2b36bc932f04775c2f0f8c0ef8e75d59a1203cddc700a70ce0f8dd ruby-devel-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 471d39a317b19900d1aa0894ba19e3334bfffb9e35b77d317559b050cd2b54b8 ruby-doc-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 43540d116659edddd917d22fa0468970468178d21c225cbce37ccb207fd9f1fb rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bigdecimal-3.0.0-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 304acf98fe6a7d8169d60426eb8c2474115406be0db98efc8873779344064cf0 rubygem-bundler-2.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 8eb2699d7f285d95fe6620e522faa03e3bccdd4f34f81a091294612c26fcc9bb rubygem-io-console-0.5.7-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 65acd752a8d7657a82e2b000ac67ca306118effa7180d5930ef2e1919738b0d6 rubygem-irb-1.3.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 334a45559b587fe68d4eb23511b62e0ad19ada521550c50448dede37a502b858 rubygem-json-2.5.1-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 3cbd6958d0bdb8827db2c5a50b0d46611c87a04cd05c2c18e804e86a3682d87b rubygem-minitest-5.14.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 7acb747859c30449778b99e104991d63a9270383936d6613bf32be8837924930 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 rubygem-power_assert-1.2.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm b2e4a37abf7b0ec0df7a6315db2dca68a6382c3e63049a66bb04c14f92330c63 rubygem-psych-3.3.2-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm bec3c333cbe8353699a14dc66883da2acca1cc0ce0237b7251e126593d51668d rubygem-rake-13.0.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm d9c7648331983866cc292dccd017cb1fca53c7a4974e94a51f83de2b96cd18ab rubygem-rbs-1.4.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 9f6486e3d4a1d97f6059efda9f9fd5f04a82c4a141419f317cd6874aebbd083e rubygem-rdoc-6.3.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 16b71eaa43c10307c0c031c45538e10453b6f3fc2bf21445fd969eb6f60510a3 rubygem-rexml-3.2.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm b75400368159fdfc472506e2349144e2dd835ccce2b4a5c7daa49a64107f62be rubygem-rss-0.2.9-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 8f8cd7c715414e63daf97a96c85d5d4dba978d2c9974ecd97d84c237bf53b3fe rubygems-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 195c1695785aaf28fb450939123d768c9065fa86a85e3565c113f7ea7911b947 rubygems-devel-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 1af10623a7e05ff1b31948e1db26e2dfc864a368f6a8d6db8a5ed34919beca44 rubygem-test-unit-3.3.7-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 999ea750ec5c45ca913edc583a4b89d9f648e9773099466358204994a51df7fb rubygem-typeprof-0.15.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm ce4fd4cf9bd56646a479b69a6c98f95c5f3a402639b33b0766464d830a080373 ruby-libs-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 9f405c6e54de0216ab746e5621b5eb0bad162e0a4403672cbdf2630e8a2c39e5 RLEA-2022:6453 container-tools:3.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120558) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120558) rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLEA-2022:6454 container-tools:4.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120561) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120561) rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLEA-2022:6456 gnome-settings-daemon bug fix and enhancement update The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964) rocky-linux-8-x86-64-appstream-rpms gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm 12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94 RLSA-2022:6540 Moderate: webkit2gtk3 security update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7). Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7). Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el8_6.x86_64.rpm 6f9d418c7ea1f1201d9fce9c29a452dd5ff1e50186607bac1d8d5c36e9d0b081 webkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm f264c4563e2b6ed207ecba5bad82bc211e855fcabe1756b92db6001872f5118c webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm 857df66bf8107734cf442e7e59feab3e0d62c626e8738c46f676b57c99fa221a webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpm 022a74acac9929975cd817c2e8820af36362c80ba18c35525aa3143c238e2845 RLSA-2022:6542 Moderate: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) * Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) * Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) * Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) * Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLSA-2022:6775 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm 7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a RLSA-2022:6820 Moderate: prometheus-jmx-exporter security update Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix(es): * snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for prometheus-jmx-exporter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix(es): * snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpm 85d52b6eb723113b6ba471b2ca26afae713997a89616d57739e7498226fdac71 prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpm 764abbe69bd693ff8794e3c9fa5fd5b609be9ba1e896ba02ed4476d2efb61dcc prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpm b252c5787fa070f1cad64f473a492dbbc981882ac49570b9a1b5b5bb9596a7a8 prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpm e747522630dfee8d219dbd8794386cd774564f4cdd5b688d3e4ee255c217d91f RLSA-2022:6911 Moderate: .NET 6.0 security and bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm 6e650cfac34c121a272d9c483ca5059026ec06f0d34d4bcae5d31b3e4f777725 aspnetcore-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm 70e339246f8d0c94ab2a07b9f993079005f3c20b862576c20a1a6772764c0cd5 dotnet-apphost-pack-6.0-6.0.10-1.el8_6.x86_64.rpm 0a657dbccaa3525914806ebdea52bcdaca2a936399b214dd30eecc378e94b2e9 dotnet-hostfxr-6.0-6.0.10-1.el8_6.x86_64.rpm 6982ed81d032f7ab444f935f35adff3f6d50b3d4f01c1139cd066e4fa3f57dbf dotnet-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm 2df8853bf9d61bb52c0ada2a5eeddbf56ff1e69c8952d150d32702468268fb58 dotnet-sdk-6.0-6.0.110-1.el8_6.x86_64.rpm 583e8250ae7739698fcaf5c6b46c9f7ab5c02ce69bbd9c7c19ba1c8bfd938b09 dotnet-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm 0551f8c631a8895d3b971c3437f3723e4b2d5e3a67bdfb2f29304721a587a4c9 dotnet-templates-6.0-6.0.110-1.el8_6.x86_64.rpm 386c99913b24868fb58baba273ba69eda871b35805173bd4dc874b4076803d5a RLSA-2022:6912 Moderate: .NET Core 3.1 security and bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet3.1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm b036a76fc87c4c0ebefdd5a48b039c099e59e631a937a3dbb25f7332e7eab6f2 aspnetcore-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpm 284b6c759438ba789f5b0dc9e68990cd9a483be7c21b3135af56a3937e7ae5ff dotnet-apphost-pack-3.1-3.1.30-1.el8_6.x86_64.rpm efe82ef762462f11c2e04d4aa5938f4940c02a20a22e781b7d9b292781b6ace3 dotnet-hostfxr-3.1-3.1.30-1.el8_6.x86_64.rpm 0a3e9d8b334a8ca057be0a61d2f495c0b0d6b880e64cc95a52518d8f2e258d32 dotnet-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm eafd53eb66c10643f865ea529e46fca0c1a8375558efa5bc9a0f04d132658aca dotnet-sdk-3.1-3.1.424-1.el8_6.x86_64.rpm df33cdd9170652a91cb911118d2b44af28c5421bd1fd156eabfdbe796b2adf96 dotnet-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpm 6919d822bdd894fbd11352a528676772e043a81e957b956028e587586980d836 dotnet-templates-3.1-3.1.424-1.el8_6.x86_64.rpm 520fc0ea3849a0b1111c494897dfb53b2f9f48cf0e03242e82758ac941bdb3d8 RLSA-2022:6964 Important: nodejs:16 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs 16. Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs 16. Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm 440c4c7f7e759eeddb3269e62891497e5de3a79e0eafdc6edaae51f3b618d252 nodejs-devel-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm 57ecbfc42d4054167b5b62fb2cf50eb11a77b09e97f6920fdc61a0b06fdb9434 nodejs-docs-16.17.1-1.module+el8.6.0+1046+80feca58.noarch.rpm fb53065a9e4d209cf205a7183c933faefa9e67f22581cc3ad291c2fd93edd5d5 nodejs-full-i18n-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm 251fc16560f4fb5ef3ad009b28df12aeed5328b04733a5b52b9e1e31feaddbe4 nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm 55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642 nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 npm-8.15.0-1.16.17.1.1.module+el8.6.0+1046+80feca58.x86_64.rpm 3d401a2f8fe06114ada7bba63cc62a443d33a2462d6c6e96a6335539b821aa53 RLSA-2022:7006 Moderate: java-1.8.0-openjdk security update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm 745a98184ac9a5515249b7cd168a5790d2b07407b3eca941cbb9bf9400d2f689 java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm 10be3aa175d2b7be220ed364679366f5b90ce479d11d65443fabba8fb5e23aa9 java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm a64f5fe29ba875659ccd0a3d6af6f3a1f5e87b0c4e5e93cbabe16cf8ed68ae68 java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm 6facf44a3ef195fb6c7f66ffce323acf6eccf4f331d5b9059e0c03865fdcd5ac java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm 01819f766f0cfdf6b035db3ead2f50c9539d65fb760d89728a34771c4b44a31a java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_7.noarch.rpm f17b77d4203cf1a819eb288008fd2080959d7dbfd894ecef89d69f0e0d023e4e java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_7.noarch.rpm 762991fd798dc9d95f9e2257ebde37ffd259e56d3bffb2c9c1a89fd16d523079 java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpm f0b9eb21a54ba79a63a963b57f7a2372954a3c88686a340713fa88332ab3ce4a RLSA-2022:7000 Moderate: java-17-openjdk security and bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503) rocky-linux-8-x86-64-appstream-rpms java-17-openjdk-17.0.5.0.8-2.el8_6.x86_64.rpm 838a430c12dc052feeab8968cead619fec7d76bb97abf592f861d0292706b130 java-17-openjdk-demo-17.0.5.0.8-2.el8_6.x86_64.rpm 0ad8e5c322536ec6dbc5798c48da6f97f0cb7ae2734f26350555b6aee748fd32 java-17-openjdk-devel-17.0.5.0.8-2.el8_6.x86_64.rpm 0197ddb74fb8a530c5972e9768ca5163284b1343ea3bd89baa46b62c13e8ef8d java-17-openjdk-headless-17.0.5.0.8-2.el8_6.x86_64.rpm 63c857bda2ac036200ab1200c75d790ccbeb6e2188c06a888ae6f3989e4093f7 java-17-openjdk-javadoc-17.0.5.0.8-2.el8_6.x86_64.rpm 0704d2feac8d566e51e651cfa698732b1b90af3ba10e89d61df4a0e04401f6c8 java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el8_6.x86_64.rpm 61d2770cc684c0cee9537520ec7b7c1766c7b81ff1a5a01367d9f5fe0eefe809 java-17-openjdk-jmods-17.0.5.0.8-2.el8_6.x86_64.rpm 72cfedb194fb81bc92c44995237de168454da9f1ca92e4982839c94d5117954a java-17-openjdk-src-17.0.5.0.8-2.el8_6.x86_64.rpm f572d7bc2035a81698cd38ef656827cd5e790575a81d88a96b20271965971683 java-17-openjdk-static-libs-17.0.5.0.8-2.el8_6.x86_64.rpm 616d88fa04d8c7ab45e631db0cf0fdf6e6352968ab569145c5c4581bcaea023b RLSA-2022:7012 Moderate: java-11-openjdk security and bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863) rocky-linux-8-x86-64-appstream-rpms java-11-openjdk-11.0.17.0.8-2.el8_6.x86_64.rpm f1ec1f28c33c37259da402d2e06a1467f4f9d7dfda6560d6c82ecfaf3ad6a8bd java-11-openjdk-demo-11.0.17.0.8-2.el8_6.x86_64.rpm b4e143d786bb6f13ad9170b9a5c7dd433aedb83213cc620ed9eea084a9f10b7d java-11-openjdk-devel-11.0.17.0.8-2.el8_6.x86_64.rpm 294a5307e7d6a47cddb771bf7331bd33f0c76f11713a340cf9c2ba898fcdf3d4 java-11-openjdk-headless-11.0.17.0.8-2.el8_6.x86_64.rpm ac1d47d33942cbb35a09fd0bbb94c70bf33ed1294a59069d1e7ede814e3d6fb7 java-11-openjdk-javadoc-11.0.17.0.8-2.el8_6.x86_64.rpm 51fe1350c0503073ec925d0b4872a11160cc0861b5e5d410533132621fc72e8f java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el8_6.x86_64.rpm a07639947737757b7337950563036a4d97230d069275a35781f6fa631a41bc71 java-11-openjdk-jmods-11.0.17.0.8-2.el8_6.x86_64.rpm 0670b157826eed4f457070a9944f09d339724159aeff56f6befed0496757cfcf java-11-openjdk-src-11.0.17.0.8-2.el8_6.x86_64.rpm 4ebaae7da862f73d7398d0053cfd96d1249bbe313afb54279c6b0379be246732 java-11-openjdk-static-libs-11.0.17.0.8-2.el8_6.x86_64.rpm 4d8bec512555940ee20d1b0df6bc3f4680498b58c28433fa49b2431f5f5e40a7 RLSA-2022:7119 Moderate: mysql:8.0 security, bug fix, and enhancement update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.30). Security Fix(es): * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415) * mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596) * mysql: C API unspecified vulnerability (CVE-2021-35597) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423) * mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625) * mysql: Server: GIS unspecified vulnerability (CVE-2021-35631) * mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632) * mysql: Server: PS unspecified vulnerability (CVE-2021-35637) * mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534) * mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427) * mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547) * mysql: Server: Parser unspecified vulnerability (CVE-2022-21304) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374) * mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367) * mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457) * mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633) * mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.30). Security Fix(es): * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415) * mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596) * mysql: C API unspecified vulnerability (CVE-2021-35597) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423) * mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625) * mysql: Server: GIS unspecified vulnerability (CVE-2021-35631) * mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632) * mysql: Server: PS unspecified vulnerability (CVE-2021-35637) * mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534) * mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427) * mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547) * mysql: Server: Parser unspecified vulnerability (CVE-2022-21304) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374) * mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367) * mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457) * mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633) * mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940) rocky-linux-8-x86-64-appstream-rpms__mysql mecab-0.996-2.module+el8.6.0+1057+4d6a1721.x86_64.rpm 3c0021184a048d318e81df62882e329ccc9575395989cf57e5c6bb8d3dd12153 mysql-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm 9cb5d1bbe5620dd769c4f7f75a45e21dcbcfac3fe3ff91b934d0c1fc3f15a0ea mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f mysql-common-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm 1bc4b3d9628f3a617b83f355d19ec0105d6f13922efb67ca08ac33f99dbe5ca3 mysql-devel-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm 824a5cada6538b9f41773f07d6c7f94b0aeb89454426062b7b2911873db1cd18 mysql-errmsg-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm a2063a9fd8dffa3a87a5e511b9b5e39052a530fcb27920f88ec0efed3e740d3e mysql-libs-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm 3bf0fe5f852a135cbae23e9a087f4724038b237938cd9fc2b19339517417a13a mysql-server-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm c9db82d27d816893a193b9cab3c9195cb693c69f6dce2227fb4136bcedc1b7c9 mysql-test-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm cc7ee9a9065cb0585ee6606c762ddf8d87502be170df730f4de4cf1978e96fe8 RLBA-2022:7122 virt:rhel and virt-devel:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * scsi-generic: Fix emulated block limits VPD page (BZ#2121783) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * scsi-generic: Fix emulated block limits VPD page (BZ#2121783) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d RLBA-2022:7125 virt-who bug fix and enhancement update The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124813) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-who. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124813) rocky-linux-8-x86-64-appstream-rpms virt-who-1.30.12-2.el8_6.noarch.rpm a8a8915997def51cea3cfaa933c4fdae496932cbfe2c47b7d7a4aee90117b52b RLBA-2022:7126 stalld bug fix and enhancement update The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126495) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126495) rocky-linux-8-x86-64-appstream-rpms stalld-1.17-3.el8_6.x86_64.rpm f7461f2670713844d6f832dc358b7516e6b53b0386403c7de3b83bf5f88c5aba RLBA-2022:7127 container-tools:rhel8 bug fix and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * containers config.json gets empty after sudden power loss (BZ#2130237) * Podman support to perform custom actions on unhealthy containers (BZ#2130912) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361) * PANIC podman API service endpoint handler panic (BZ#2132413) * Podman volume plugin timeout should be configurable (BZ#2132993) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * containers config.json gets empty after sudden power loss (BZ#2130237) * Podman support to perform custom actions on unhealthy containers (BZ#2130912) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361) * PANIC podman API service endpoint handler panic (BZ#2132413) * Podman volume plugin timeout should be configurable (BZ#2132993) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm 0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b RLSA-2022:7128 Moderate: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc postgresql-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm f95444ae27053c5504601cfb1bf4d44bdc56f7d54b60f69fabff2a3a30f4f8c7 postgresql-contrib-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm d1da2be66f7b945e18f9ce5937472540a4e5fae27b68a66f3f6860a4c6b4cd04 postgresql-docs-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm ffa8d10df01db092f4039b3819a79dca1222c639c62cae7aca314fd59bcf68cf postgresql-plperl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 29e8b7b91a348651e31084e03c04835aa7c00a84025fc22b252cfa772cbb2a14 postgresql-plpython3-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 1fd6e4891442fa7c18e0d3333658477bac3edf374df44767ad1a4a86d510f438 postgresql-pltcl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 5f1507924fba91e1f0ba51b3bf43d689c833a106b99635464db81d7916521a4d postgresql-server-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 91acd673cfab624d1f4740cfa486f8da657dfe03696600e6eb50abcc8bb7469c postgresql-server-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 8c9e2a4148198e518085b207d0f4845feeaedbd20ed36dc6bab84eb7a706394b postgresql-static-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 43620e6cb1f200bca1539909808563f88ca31f0776c0e38a33213b63a3be7c30 postgresql-test-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm e994ddb1ebcac70c941d100c25cec93c489c1b33ff282e70f15525591e807236 postgresql-test-rpm-macros-12.12-1.module+el8.6.0+1049+f8fc4c36.noarch.rpm a509742a04550e2d84aa41a407c5f4b567d9af0eb989ea2ad9438d313c482c35 postgresql-upgrade-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 8253518c68242b0c0f1807b360228af9568e96156030d52b8de3278ef1e89f0d postgresql-upgrade-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm c7b67025026e57a72036510e11d20e3516f3792d177a22d78c9973622d401fad RLSA-2022:7129 Moderate: git-lfs security and bug fix update Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851) * golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * git-lfs needs to be rebuild with golang 1.17.7-1 or above Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for git-lfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851) * golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * git-lfs needs to be rebuild with golang 1.17.7-1 or above rocky-linux-8-x86-64-appstream-rpms git-lfs-2.13.3-3.el8_6.x86_64.rpm d8a246dcad708db6bac5f33227ceefa96d4a79c8dd6ec00d99ad12d0ac0adf9a RLBA-2022:7132 idm:DL1 bug fix and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324) * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324) * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051) rocky-linux-8-x86-64-appstream-rpms__idm bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm 615d759274eb3f3f8c28657012cfec65b67d8a47fbf38b897955cec7bdde1495 custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2022:7240 container-tools:rhel8 bug fix and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm 0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b RLBA-2022:7455 jigawatts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jigawatts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jigawatts-1.21.0.0.0-3.el8.x86_64.rpm 4dd6d7a49e770ec4d95f4bd04a3c6fc11f66c3889786262819905773a984f52e RLBA-2022:7456 ansible-core bug fix and enhancement update Update ansible-core version to 2.13.3 Switch from git to git-core dependency Build manpages Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Update ansible-core version to 2.13.3 Switch from git to git-core dependency Build manpages rocky-linux-8-x86-64-appstream-rpms ansible-core-2.13.3-1.el8.x86_64.rpm 292ce7fdb68aab58926c7df28b3e108988bf148642adae06ba348a557d8b85ba ansible-test-2.13.3-1.el8.x86_64.rpm ec9d55e4bac46fde13b4b2d2bedb59fec2b424441ad913bb8596fcbb984690eb RLSA-2022:7457 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190) * buildah: possible information disclosure and modification (CVE-2022-2990) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, conmon, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190) * buildah: possible information disclosure and modification (CVE-2022-2990) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools cockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b6ec4da8b57643e010868c767fe370c537f59dae20ec5459864a53d026a8aed conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856 slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLSA-2022:7458 Moderate: flatpak-builder security and bug fix update Flatpak-builder is a tool for building flatpaks from sources. Security Fix(es): * flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for flatpak-builder. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak-builder is a tool for building flatpaks from sources. Security Fix(es): * flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms flatpak-builder-1.0.14-2.el8.x86_64.rpm 38a880b0af6d805dc60a1620d78a913f8c72a50492847a3c3c4f9171185a717a RLBA-2022:7459 flatpak bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for flatpak. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms flatpak-selinux-1.10.7-1.el8.noarch.rpm f000e6bc7105d6e55e8c901dda0312295705d18561cd86c85319bdb15fee0341 flatpak-session-helper-1.10.7-1.el8.x86_64.rpm 58c7ddd4eb66a852c86537cd722cba96f9167c9ff1209e0aca229354bd135d60 flatpak-1.10.7-1.el8.x86_64.rpm 16307d86bcf90b9a10b580f7264318cb01a20df8223a49db0361c08719093cc0 flatpak-libs-1.10.7-1.el8.x86_64.rpm c0d6a3caa7713cf94f9e05bb1c83d0fef2bbfe006fba98d52da154523d765b0b RLBA-2022:7460 rsyslog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsyslog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rsyslog-8.2102.0-10.el8.x86_64.rpm 6ecfc0924652059a0e59a20663a4c8492163d3a9476ef65fcc05b618885b110a rsyslog-crypto-8.2102.0-10.el8.x86_64.rpm 501ef5dd0642197789c8afee86e586a53b3dc4e0dec9ed6454538c50b9b9e936 rsyslog-snmp-8.2102.0-10.el8.x86_64.rpm 01cee07ed3a8d9e112cc04ea731a89ddc4900d3eac727348f602f8e70104c315 rsyslog-doc-8.2102.0-10.el8.noarch.rpm d12e90ee2eba31f268851222219d5727401dde065307b50ec6a904ef3bdfe15e rsyslog-elasticsearch-8.2102.0-10.el8.x86_64.rpm 5ae55243ecb13f18a8d4eccc3bbe99b688782bd25f92cca293650b13969b0c45 rsyslog-gnutls-8.2102.0-10.el8.x86_64.rpm 26f9b8eb9d7fb3d1ee0fa496c6d86afe1745a1300a2aeeb033f5336534b3b3ac rsyslog-gssapi-8.2102.0-10.el8.x86_64.rpm fb7659e51b89347942a0682769c11c65b480af8b9fa5283fbf6a912bc3b51763 rsyslog-kafka-8.2102.0-10.el8.x86_64.rpm 57623cfbeaf169b8d9db3917e3380e47ddf7d3a77981ba322a992945001e2c7c rsyslog-mmaudit-8.2102.0-10.el8.x86_64.rpm 7c02db10512225c70140c4efe8fed9983dd8c23436e73d637b930abd82b5d6a9 rsyslog-mmfields-8.2102.0-10.el8.x86_64.rpm 8ae41c4ebda5bb2f5e490be17ea34df8a796a8ac82e37a4c6f79151fb880a682 rsyslog-mmjsonparse-8.2102.0-10.el8.x86_64.rpm 8990b09e3e34970d687f3a6dbb7a068a219ff3fa3d5dbfc6950c7009a263150c rsyslog-mmkubernetes-8.2102.0-10.el8.x86_64.rpm 18ed1f630dd647c958ab135b7d19bf0c58a6bcf84d1fd4cf2b87abd3a1403869 rsyslog-mmnormalize-8.2102.0-10.el8.x86_64.rpm 121fbc57104776d1c67e521a9a26ba31ca81ad9cce470deaf29dc7726f5c3c18 rsyslog-mmsnmptrapd-8.2102.0-10.el8.x86_64.rpm cac180c9d44da54781f873b435ae76dbb37cdaf659849420fc5ecd50df9d5de1 rsyslog-mysql-8.2102.0-10.el8.x86_64.rpm 009b093a178792b7a9b1322e1727a539e34a4f1f3e67333e3b157e41c623305b rsyslog-omamqp1-8.2102.0-10.el8.x86_64.rpm b0f15abe796a6650d2431ee09c162cdcccd9025800153f2b8521b591d5ac42d9 rsyslog-openssl-8.2102.0-10.el8.x86_64.rpm 0608b3b3949e0d32ba9ca1dd81cad91f3380b223a03ce25f8602399a5c4f5020 rsyslog-pgsql-8.2102.0-10.el8.x86_64.rpm 781b4b2940485824095aafbc61004154fdf5e7a82ffe9551952a935f51631b9f rsyslog-relp-8.2102.0-10.el8.x86_64.rpm 8ab65a687c251669d44ce1a907e031dc45d99bd63b90796562afa9b698dbe3da rsyslog-udpspoof-8.2102.0-10.el8.x86_64.rpm c42e276660b6ec51faeabe13bee30151c26f441bce27a0818f5da24bcf973d5d RLSA-2022:7461 Moderate: libreoffice security update LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libreoffice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms autocorr-sr-6.4.7.2-11.el8.noarch.rpm 42204c6b12b4e04de5d8440e7bf72029279e36c126bb20387bbac7e29830de0a autocorr-sv-6.4.7.2-11.el8.noarch.rpm ed521d9178292aaf9043777735f412e3225020df3b9e03ce8eac2a340b3b5a71 autocorr-tr-6.4.7.2-11.el8.noarch.rpm c29a0038e3738fffbdff5b4da2f8bc929e3500a73a5e8edcded02cc5cd9c826a autocorr-vi-6.4.7.2-11.el8.noarch.rpm c6cfa1f5620a46f5e40be143b413c2201608adabb5e10dd4d7c316b52d21771a autocorr-zh-6.4.7.2-11.el8.noarch.rpm 18bf00fe10257cabb348f1dd32bb434ea904ba38b0992040edd34ad59c1da676 autocorr-af-6.4.7.2-11.el8.noarch.rpm 822fe0988c60c6c12d97797ffe772ef701d5ebb999affd37c8d0d1efe60b6b5c autocorr-bg-6.4.7.2-11.el8.noarch.rpm 24cc991c2d0044f356df58c2f84998d800de153773dcd8933d1eaad58d1179df autocorr-ca-6.4.7.2-11.el8.noarch.rpm 1bd4e9ed716d92b7bae868f7cdacb1b2f4643177852e930cb65569ef84205ab2 autocorr-cs-6.4.7.2-11.el8.noarch.rpm b27646f77e91404bc694494ef2f7d0548980f94fa7b1f58d9f7384cefd475501 autocorr-da-6.4.7.2-11.el8.noarch.rpm 50e747b665bd7eafa15b17d9a58a36b315385baf770e2bfa72befc38fb02370b autocorr-de-6.4.7.2-11.el8.noarch.rpm 61652321f50de9597f727a6ea9d32ca1a12313e3362d83122fdc8266c7967a7e autocorr-en-6.4.7.2-11.el8.noarch.rpm 523f57eccce35e2270f95719410183908a5251ba81337e9284f7dda5beda4016 autocorr-es-6.4.7.2-11.el8.noarch.rpm 436f825319c18fa10c6e9073fef10a28b8c8fdc7395759268ac680d9bdf7990d autocorr-fa-6.4.7.2-11.el8.noarch.rpm 680dcb2f67d5984f8f8d65bbd89df32334b77147f2b563d8f7918e8663d61a02 autocorr-fi-6.4.7.2-11.el8.noarch.rpm 109240571044eb4a795426a291eef9e6136675a4b42c6f63319ed616c2946a8b autocorr-fr-6.4.7.2-11.el8.noarch.rpm 2b82c45193d7868008f71b5c25a21c34e457e6bfe7bf4d33eb46b08fbc78dc47 autocorr-ga-6.4.7.2-11.el8.noarch.rpm 1484dc2c72c32b179e786944a080ff68e6b343371bf130f8428a4778591c6b85 autocorr-hr-6.4.7.2-11.el8.noarch.rpm c67b6f697f053325081b9bb5019bcdfbab7be6fdc6647d8d15c1f049babc9485 autocorr-hu-6.4.7.2-11.el8.noarch.rpm 8165be4abbfec025e68bb674e77335802931d08c9ffaa051c44db23d48cdf9fc autocorr-is-6.4.7.2-11.el8.noarch.rpm 98abe90f6c4fdbe8bbe9e6f8aeac2ba712b5486a6c6b2f21dfde3e8902b94e28 autocorr-it-6.4.7.2-11.el8.noarch.rpm 3e0ec0774098fa395b2145abfc17f3090b4337987f6200118e5ec974dbea5a64 autocorr-ja-6.4.7.2-11.el8.noarch.rpm 30137d009107d421261f7478b5fa48cecc75167556f6dbfad31e588b40f5b08c autocorr-ko-6.4.7.2-11.el8.noarch.rpm 70d1b125291053332b33e8c2b5e61661af2343382da49f3dab89eaad34b3a0f2 autocorr-lb-6.4.7.2-11.el8.noarch.rpm 217a05ed41e91f04401d9f7dce5056519b52d19b6f73aba22cda9821cdbfa8e3 autocorr-lt-6.4.7.2-11.el8.noarch.rpm fe71a78fd9867ffd2ac0cc2c953d398330452d5b5147393fe11b430520143713 autocorr-mn-6.4.7.2-11.el8.noarch.rpm e5f746a0e5d5a26f364979109e759794880e1c8e23abfce3dda106180aa499b9 autocorr-nl-6.4.7.2-11.el8.noarch.rpm d8fd18a7187de9427d31f9298017fb3c30ee3b8ee13839185393ed29966906bb autocorr-pl-6.4.7.2-11.el8.noarch.rpm 19d1875232fbeb134f7e039be66f1252fce8f076f864433114184476bd4c2c77 autocorr-pt-6.4.7.2-11.el8.noarch.rpm 66eddb6cf4f26f282e615e5b62a5617d4753ffab8e61e9e9c68fddfeafe720b7 autocorr-ro-6.4.7.2-11.el8.noarch.rpm 813fecdb44735d187d74deda4273220164cd04f8b9e54096016dcce317656942 autocorr-ru-6.4.7.2-11.el8.noarch.rpm 78b60ee89bda48bbcea627d6a6441d37ae51265126b9a26d8d1632c4285e746f autocorr-sk-6.4.7.2-11.el8.noarch.rpm b4c77f36fb31570ffc56262c7c648724a7113f5d263b2cfda7a8fddda20c91e0 autocorr-sl-6.4.7.2-11.el8.noarch.rpm 9e5a343dbd8d23ae6a964a5bd2a0b49c24f5094c7534114a9ea5f139421575c6 libreoffice-base-6.4.7.2-11.el8.x86_64.rpm e784d3b3d878595e6b5718236bfc928ddfd72e16b594bb701f169d5b4bb19fb0 libreoffice-calc-6.4.7.2-11.el8.x86_64.rpm 13a622c42cc9bb41a70c3f323778a02b216fffa7cac576de211cd008c4be5924 libreoffice-core-6.4.7.2-11.el8.x86_64.rpm 569b1e6c4b044f78ccc7f2f719db1d31bb6bff3c73c49bdcbaac648f1d34706a libreoffice-data-6.4.7.2-11.el8.noarch.rpm c5b41db25cc40f622156f96e9720813142580a7410984913eb3e1fa05dfcb38d libreoffice-draw-6.4.7.2-11.el8.x86_64.rpm fc12df8aac7db65f8811e75271dbffabe2f35c0327782c1f19183ae2cca17ca0 libreoffice-emailmerge-6.4.7.2-11.el8.x86_64.rpm 068020d9b424cf5b6064ce2445ca374426fb790bfb70fced8b03216aedaf11a6 libreoffice-filters-6.4.7.2-11.el8.x86_64.rpm a4942a4e72a76ac33204bb3405a0403b555eb3d416ab202038dd225bb1b7bc82 libreoffice-gdb-debug-support-6.4.7.2-11.el8.x86_64.rpm 73cb704b69babc93a7f851b3139e674479f490a77f52be334efb8afb64b05335 libreoffice-graphicfilter-6.4.7.2-11.el8.x86_64.rpm 9fef96de29a3c8d3038d71c04f35c81140547d0fcd91e99b9913ab7776a64746 libreoffice-gtk3-6.4.7.2-11.el8.x86_64.rpm 4ac6b5cb0644021c73e86ece8780d23869cc28e5c771e53a29eade4c3c17842f libreoffice-help-ar-6.4.7.2-11.el8.x86_64.rpm ee890e090faa8676295771d932fb884d6099a2beaaab0603399e910705e890ad libreoffice-help-bg-6.4.7.2-11.el8.x86_64.rpm c912487c44b0738bfca597127376b9e6f6b1ea159cf8fdc75e7275dc2dd7de1e libreoffice-help-bn-6.4.7.2-11.el8.x86_64.rpm 920f525cb192101f31076810a33d06f8b277aa3a7c10c3ee0a83e3254a0caad7 libreoffice-help-ca-6.4.7.2-11.el8.x86_64.rpm 575219a5a54c5c83668914536f5b5d837fefded1ed9edf5e3002513cc02a0c16 libreoffice-help-cs-6.4.7.2-11.el8.x86_64.rpm 791f9d044ff91ce79e41611cbaa090831eb388712faa25b0ccb83f1e14faae3d libreoffice-help-da-6.4.7.2-11.el8.x86_64.rpm fa389a9af08bb8f5cc1d8ecd93b019985feba5686a5f0258cc36e5d57e05f5c0 libreoffice-help-de-6.4.7.2-11.el8.x86_64.rpm 421df053f212befe0d653589e9a9d7a6bdf24d8770962df2b5df5b95bb4647ec libreoffice-help-dz-6.4.7.2-11.el8.x86_64.rpm 87a691ac5f08d12a8d82edae974431450adbb696065815656c1d2d381d927cf7 libreoffice-help-el-6.4.7.2-11.el8.x86_64.rpm e171326eb0a005c3ce6be4d70b38b5bf759a2edd055c831d7ba6985bc8b4d0e3 libreoffice-help-en-6.4.7.2-11.el8.x86_64.rpm 40cb5a04825d52b8024097953e8ab073251b1b9302492a3747ac76b5d8eeaba4 libreoffice-help-es-6.4.7.2-11.el8.x86_64.rpm ece90ae7d153a7b4ab4342ef668d2d0d2d9c3848a5533bac1646223514308c19 libreoffice-help-et-6.4.7.2-11.el8.x86_64.rpm 2584db17d49570e5be9bb9c6b1992f657f1fd39a14c22660fac5f5ad3a0f12d5 libreoffice-help-eu-6.4.7.2-11.el8.x86_64.rpm 9b2bf8f20b5c55f45814a41e8b03eabf933b9e7f2102d264b5a772553e53795c libreoffice-help-fi-6.4.7.2-11.el8.x86_64.rpm 248b8850942c061e29f85fea119dad8b4d9bbd4ee3a4b6c82507d1d14c0b8ac4 libreoffice-help-fr-6.4.7.2-11.el8.x86_64.rpm 07750739db60164fd32aa035c5759d2f98556e21a9500003cf4e0f9f56aecbaa libreoffice-help-gl-6.4.7.2-11.el8.x86_64.rpm 83866e5641d3d082eb819ecaae24a9464268de6f43bcb6c5267da61f03a001a6 libreoffice-help-gu-6.4.7.2-11.el8.x86_64.rpm 20a62bc41f0c1f385c98cc698a8eae4b07966216927abb3d04e60d1295ceea3f libreoffice-help-he-6.4.7.2-11.el8.x86_64.rpm 6bc1c0e71e2f937ac0b63d22e9216ebf1ec34edcb18001b1bf08c22fb288f65d libreoffice-help-hi-6.4.7.2-11.el8.x86_64.rpm b7b375b0a8b0611b9e5602dce593f650d8ba6f47b9b462313939d3314ac6b321 libreoffice-help-hr-6.4.7.2-11.el8.x86_64.rpm 888b6b6761e58dd9f2f197415eaff390a8e26b850aa58c64172541f5a4afb851 libreoffice-help-hu-6.4.7.2-11.el8.x86_64.rpm 95795933c331257c56715e5a7bcd3a8abd5238f991ce0bf6267e47c69c643bc5 libreoffice-help-id-6.4.7.2-11.el8.x86_64.rpm 33ddc4dc9bf005d2931c67d54293d4514cb82ff15ef1faba84f97f38de994b10 libreoffice-help-it-6.4.7.2-11.el8.x86_64.rpm 559cac012576ad3f96840f5b7d74456b05df1ce2ca7de35e06cfee76e725de92 libreoffice-help-ja-6.4.7.2-11.el8.x86_64.rpm 6c69d6276a109cabb59ab93f1654a4d9870ef55d2db79461c1ca07dac419108e libreoffice-help-ko-6.4.7.2-11.el8.x86_64.rpm 05f77b6b10dd37903b3bb15c6ce79d95d2ef0430ed73e1fb408a59d053a9a171 libreoffice-help-lt-6.4.7.2-11.el8.x86_64.rpm 594806caaf8c77e46d0b480a46025333177a488ece90735e3428e9bc0e278061 libreoffice-help-lv-6.4.7.2-11.el8.x86_64.rpm 049e912243762a99accf055d7e62353664eea8c77454e0285022f94df087b58e libreoffice-help-nb-6.4.7.2-11.el8.x86_64.rpm fc80baa0e6dec3c3ec5033fa26b63466e5a3ee2d1ff402d27ed93d50a2828d95 libreoffice-help-nl-6.4.7.2-11.el8.x86_64.rpm 685eae5ec3d43b31dcdd7b236bf4e31c2077e3fff84c5f1b6bc0b4fc5cf7bf33 libreoffice-help-nn-6.4.7.2-11.el8.x86_64.rpm bb9f7eb8f57330402296b20934818ba5a19ac2c029ad0a47a633886a3abbe102 libreoffice-help-pl-6.4.7.2-11.el8.x86_64.rpm 9690a6a8be4dbef2807b61f5b052e78615452a654857bac3a41ff3bdfdb82765 libreoffice-help-pt-BR-6.4.7.2-11.el8.x86_64.rpm 62f14100a8f013a43f6bb58859ad6e7feef6c3d8183e6d8d96cacd431eb04025 libreoffice-help-pt-PT-6.4.7.2-11.el8.x86_64.rpm 4b3aab38a0ed9e7a48c5e1a7827e8c2566b9636e08f1bb813ea2e4e3754ed2a3 libreoffice-help-ro-6.4.7.2-11.el8.x86_64.rpm 44785c7cafb42fd6c3ac8a5bf658b877c470d8c91737a92da6f5da82b56fe87f libreoffice-help-ru-6.4.7.2-11.el8.x86_64.rpm 7bdf2abb286b93262572148ad11d7041b20d18b06d7faea3fb6eb3a9cbaee64f libreoffice-help-si-6.4.7.2-11.el8.x86_64.rpm 5453763157ca7a92b1721f1911ab68c62e5052535dffe77867cbe685a01413b6 libreoffice-help-sk-6.4.7.2-11.el8.x86_64.rpm 0db00490546a1c35218f0f82b635884b62b38470ae277396b83f6289613a8b71 libreoffice-help-sl-6.4.7.2-11.el8.x86_64.rpm 6e7733266c803e5caa36e2896fea4fe599e5012751452a610903f8d4df67dca5 libreoffice-help-sv-6.4.7.2-11.el8.x86_64.rpm 164d894544ed4a05ecbf69ad8c2c46d6c5fc7fb7cea79b70339805aacb810acf libreoffice-help-ta-6.4.7.2-11.el8.x86_64.rpm f83456099ab414a7dae0f7b009a4f62db6ea612bef8c439048b85d7e6f41b9d6 libreoffice-help-tr-6.4.7.2-11.el8.x86_64.rpm e806c0810d321553f1e019230b9478faca0e9a2c7e1b2c15f7336ae84ae50648 libreoffice-help-uk-6.4.7.2-11.el8.x86_64.rpm 394ba1ba1178fe17b10387d6130b7993bf6181e1fedc51489af41c758420da06 libreoffice-help-zh-Hans-6.4.7.2-11.el8.x86_64.rpm 331aa48197e887000c33ec90eb152233758417a8ca7a34a9c23fa56e9867abeb libreoffice-help-zh-Hant-6.4.7.2-11.el8.x86_64.rpm 51bfd6c693778df95e385dab79f3a2d9dd620460aaf91d7f9841f2e7b9f7438c libreoffice-impress-6.4.7.2-11.el8.x86_64.rpm ab078bb46f726b92d551f80de1c1e4fe4dff33e544bd1f5400d1252197c48122 libreofficekit-6.4.7.2-11.el8.x86_64.rpm 31ee988803ad3d5fdffed3fcabe9b8e09ab09c4bba48da7deec1edff7bdc542b libreoffice-langpack-af-6.4.7.2-11.el8.x86_64.rpm 920b83b49d2f09d784f401be46451dbb64aaea5cd9e17dac49bdd36697f0b7b6 libreoffice-langpack-ar-6.4.7.2-11.el8.x86_64.rpm 78d7693a1d87b98587be9292817d18ad52ef17f86d20c6deebc30412781e1c08 libreoffice-langpack-as-6.4.7.2-11.el8.x86_64.rpm bf9f6b9f8785ee91989b7ce88fd895b34c7f24f1270c352c4cc305d246136100 libreoffice-langpack-bg-6.4.7.2-11.el8.x86_64.rpm 568ab8afe163d334bf54497768ad14c00d1345e88c246ddee3bcbe65bf3cbc7d libreoffice-langpack-bn-6.4.7.2-11.el8.x86_64.rpm 9d46c8162e4a6c61c0d03f4a9957455994796bbad10d405affb586bfb371007c libreoffice-langpack-br-6.4.7.2-11.el8.x86_64.rpm 2072472994ae16686268dc29d979511844c96ce03a7817a5fb2960be76b9448b libreoffice-langpack-ca-6.4.7.2-11.el8.x86_64.rpm 4a64181451223fa8ff4e23ce1f170c33bcf9fc450e56beb4246f622e9c22f005 libreoffice-langpack-cs-6.4.7.2-11.el8.x86_64.rpm 6f37ad410df8528f60b9ae8692b6e930f5b746b2a78e9dfc13f6ea062824108d libreoffice-langpack-cy-6.4.7.2-11.el8.x86_64.rpm 08db94cfa6188f782f7dac1c52d27f9cdd7a103b67ff035edc10a579fc7ecafd libreoffice-langpack-da-6.4.7.2-11.el8.x86_64.rpm e7ac8a5cc2b5c040c6763be085cbe073b446cd0c8bfe2b3472fd24e412735adf libreoffice-langpack-de-6.4.7.2-11.el8.x86_64.rpm fa0967f42a2a7ed22dcc87888d61b4f59de2d8124f621281c3cbe6ea36160cfc libreoffice-langpack-dz-6.4.7.2-11.el8.x86_64.rpm 052a14f24797706b445f29da9ec6c7a4dc996caa698f7e6df88606b4cefb0aa8 libreoffice-langpack-el-6.4.7.2-11.el8.x86_64.rpm ed1d9e061b826621936931c484880dcd308547ddf4e35e6babf9ed6bd4a97ade libreoffice-langpack-en-6.4.7.2-11.el8.x86_64.rpm 2e2bd44915aa57912b1c011f147871a08e0a4d28f1c2c25c1714d58c52380532 libreoffice-langpack-es-6.4.7.2-11.el8.x86_64.rpm 9c4eb79e70ab48de21eed1b5d165840c050cbce63fb0123e61ebb784745d2569 libreoffice-langpack-et-6.4.7.2-11.el8.x86_64.rpm a19f1eccd5d341bf50942f31d50faf245e4744be232020be202397a39cab10c4 libreoffice-langpack-eu-6.4.7.2-11.el8.x86_64.rpm 3ce74f2358e6c95eb557d18ff35dfda581c0d9c962266d2559a1af8d5e4a95fb libreoffice-langpack-fa-6.4.7.2-11.el8.x86_64.rpm 66ec9fa22aff02f7b450aa593ee2e17bf1a7a9328def2b2e218aa79a92c1afbd libreoffice-langpack-fi-6.4.7.2-11.el8.x86_64.rpm 0007da28362f134d6a29b59c0e31507819c2e8eb907cdc346f2626059ee54f0d libreoffice-langpack-fr-6.4.7.2-11.el8.x86_64.rpm 1e971ec9733d2f2b0a8104b330cdb12fb0279f7180126f3ae02c045bd559ebd3 libreoffice-langpack-ga-6.4.7.2-11.el8.x86_64.rpm d2d3b4d019c6dae924c0213ea715ed91e3097bec26584bb57abb2909ac6ee004 libreoffice-langpack-gl-6.4.7.2-11.el8.x86_64.rpm d474863b26dd82ba714788d8a5446babdf74577a209545c4afb37d75f37e50d4 libreoffice-langpack-gu-6.4.7.2-11.el8.x86_64.rpm 9c21941139e520fc8df84e541874189de039beb2699f7b2eaa6b33810a8c8b73 libreoffice-langpack-he-6.4.7.2-11.el8.x86_64.rpm c547e3730b7df5e9609bca51e1aed8ac056072c0398fccff9e35baf50d120b75 libreoffice-langpack-hi-6.4.7.2-11.el8.x86_64.rpm 90364bc4907ecd68d76e456ec4aba8fcc0ac6145a65e9528f16331463dc3993a libreoffice-langpack-hr-6.4.7.2-11.el8.x86_64.rpm e1053f16476b87fd20df4afb4b31babceba72ac39c606b3e4783447a9eb10c5d libreoffice-langpack-hu-6.4.7.2-11.el8.x86_64.rpm a47a5652b3fd1cbd20e81f01864bf30882dcfbb9b488686917a6a8ee4964d7b5 libreoffice-langpack-id-6.4.7.2-11.el8.x86_64.rpm e5fc6af405d73ed4acd1f8dbf26dc90193f37f76807b886fbbef762969a6d908 libreoffice-langpack-it-6.4.7.2-11.el8.x86_64.rpm 2278b30d85f696659b0a8b839229139595aa4f084133f5874b892e336ca4baac libreoffice-langpack-ja-6.4.7.2-11.el8.x86_64.rpm 4a6c68d4cc66833e63bc094270eaf56aa3a4c18bf6561553813a1503a59d181f libreoffice-langpack-kk-6.4.7.2-11.el8.x86_64.rpm 7e0d56cad92910078122a661f46d2d1d47b3876e5372473ecb61f8caeaffae4d libreoffice-langpack-kn-6.4.7.2-11.el8.x86_64.rpm b9d9eda16e0193f6c2de880587875f1f717a73169bd3628ed262f38e5c61c78c libreoffice-langpack-ko-6.4.7.2-11.el8.x86_64.rpm 7ac0e0b82cf9490d634ebf46652992767434abb4df8ee1e7c4fe859ffcbabc78 libreoffice-langpack-lt-6.4.7.2-11.el8.x86_64.rpm 94ef0c95d3a2fcad1446ada35b9a8e3c2856deaed94e74f511360d24c229a1a9 libreoffice-langpack-lv-6.4.7.2-11.el8.x86_64.rpm c9ac8ea5cb09ce99cf6696aea58f8c41184a8b13196fb89e1ca710d443cac54a libreoffice-langpack-mai-6.4.7.2-11.el8.x86_64.rpm b84546e33836b08193ef9f21ad24b890acdb90f00f4e04f605967b9968056a02 libreoffice-langpack-ml-6.4.7.2-11.el8.x86_64.rpm 01a3ac316f6787a3954c127250bb120a664dfdea71cd7d29a0ad2228da5b7ad2 libreoffice-langpack-mr-6.4.7.2-11.el8.x86_64.rpm 74bbfebf485064a916d2b177296680da70f16201f5782251e08afb1a2dd4aa33 libreoffice-langpack-nb-6.4.7.2-11.el8.x86_64.rpm 7596e0be67731a86d23baaa48653a88f1c9f58b7866058718a341a9ff539eda3 libreoffice-langpack-nl-6.4.7.2-11.el8.x86_64.rpm e0425b68617eac2cfe1f4778b57fbc91829bd4705ad1a46117153f6790b19676 libreoffice-langpack-nn-6.4.7.2-11.el8.x86_64.rpm 54246c31a82ae4a834c4e443f69f8208dac2b7a0f07ec9a2566aae5375987ffd libreoffice-langpack-nr-6.4.7.2-11.el8.x86_64.rpm 8ee2cb7edefb120807acf38d12b9266110f9d8f038e3d3d2da3d94775743a61a libreoffice-langpack-nso-6.4.7.2-11.el8.x86_64.rpm 3d3e1c098ea29f4b056e16f88d478dd1889ff2ddbca105d3cb415b3cdc10784b libreoffice-langpack-or-6.4.7.2-11.el8.x86_64.rpm 2bd24705f08d7fa3eed46b80b6862f879a3275fe47937b4cd709cc121bf3aeed libreoffice-langpack-pa-6.4.7.2-11.el8.x86_64.rpm b60f858a2490f6e1c129557dc27f9a5c4d0db6b5dd7ca16b852b4f61b22c2514 libreoffice-langpack-pl-6.4.7.2-11.el8.x86_64.rpm 6be7e833f030e569a69abd3f365bf6bad1a0832fa06e0aa8b55afdb138cd3a56 libreoffice-langpack-pt-BR-6.4.7.2-11.el8.x86_64.rpm 8586cdac51a23f6191ed5ee0902f1013a8d89931a5485348bae81787ce3247c3 libreoffice-langpack-pt-PT-6.4.7.2-11.el8.x86_64.rpm 1d398544cf751db220dc57b0cede75b98b8fde4905f30480f3c4b346d96fb356 libreoffice-langpack-ro-6.4.7.2-11.el8.x86_64.rpm 01809b70aef0cd108de61e294d9dec7987cd29498ff227973545b781ff8be96c libreoffice-langpack-ru-6.4.7.2-11.el8.x86_64.rpm 4120bfe2987a8e3686239e55cfbadcb75b46dbb052456987a9d3af4164278652 libreoffice-langpack-si-6.4.7.2-11.el8.x86_64.rpm 9c5db83d6d161c13fb6db8ffa620aa98028a72169e62c533a662417b86fb72a8 libreoffice-langpack-sk-6.4.7.2-11.el8.x86_64.rpm 42816f66e0b3add535d723e74ef474715559bdcdf50ea6bbf8baac0c46e7f035 libreoffice-langpack-sl-6.4.7.2-11.el8.x86_64.rpm bec9e82d634f585a2bbca25637ae8f552120f00b167d15ce95fd414e9961d2e2 libreoffice-langpack-sr-6.4.7.2-11.el8.x86_64.rpm d66eb1c40feb6849926c06c7ff09d0de1868b7a013c62d74eb3c8bfa40509571 libreoffice-langpack-ss-6.4.7.2-11.el8.x86_64.rpm 40c16a683107387c4eddc0bc20777b63451f010c89efe29a53bd8502c5a1808f libreoffice-langpack-st-6.4.7.2-11.el8.x86_64.rpm 35455447bc8b151b54be32cae0d0ff05ac977560e4b63f5ef08c00280abc6d44 libreoffice-langpack-sv-6.4.7.2-11.el8.x86_64.rpm 7d0cf2fb10d71e4516316ada6dc0fb2056f95acb9cb11a2802f9b68798b4ccd5 libreoffice-langpack-ta-6.4.7.2-11.el8.x86_64.rpm 9ceebf7aaeaaa9b5b8d0c8d0f22cdd574aca4a5f6dfda7bb0f5de1cf4ac4d0a8 libreoffice-langpack-te-6.4.7.2-11.el8.x86_64.rpm f0979c16747675ec447148eedc8e8bc8911995ab920e1c160ac92037ee14697e libreoffice-langpack-th-6.4.7.2-11.el8.x86_64.rpm b9130736d9c55c76e97a44e0dc962a8031d7e32ecccaaa748e7480df8e388a27 libreoffice-langpack-tn-6.4.7.2-11.el8.x86_64.rpm 86146a3ed6873845b74de241424108cae0d08fc2c7455f54da13f6f9f1b38f48 libreoffice-langpack-tr-6.4.7.2-11.el8.x86_64.rpm 471572257f239e4bf9d45b3c9eaaf0a66b7770503b10244134fd341588199ee3 libreoffice-langpack-ts-6.4.7.2-11.el8.x86_64.rpm eab92b10daa3e4e1f91b45e5974610165513d85f77f72901cd8eacf4974ac4ce libreoffice-langpack-uk-6.4.7.2-11.el8.x86_64.rpm 8443da58a43ab69132adccd4b6c4e1660c900da203c7d6d282f127848fc7c9b3 libreoffice-langpack-ve-6.4.7.2-11.el8.x86_64.rpm b322b352715b61ea3cdca2766ab860131b54b5a4e2d403c62f98c4a9469ec913 libreoffice-langpack-xh-6.4.7.2-11.el8.x86_64.rpm f059618824618d09a8b2775aa0ed08d9e968e6f0cd4a6f87d45528e89e8e37c5 libreoffice-langpack-zh-Hans-6.4.7.2-11.el8.x86_64.rpm 0a34d26627c8afa66059c6ddd5b5c3344f5ca01858b0d02c99d54af1c9c8d757 libreoffice-langpack-zh-Hant-6.4.7.2-11.el8.x86_64.rpm d24444aabc7278a7c20c8a3000d6dc6921a21a511e4ca669b51110ae27af21db libreoffice-langpack-zu-6.4.7.2-11.el8.x86_64.rpm c466d26a5deecbc1e28a950d03a3c15c1ee964afee2821f74426fa9cf8675dc4 libreoffice-math-6.4.7.2-11.el8.x86_64.rpm d001266648ce05a1235e7028d84898268905787686ee7faabdb72cebd4645803 libreoffice-ogltrans-6.4.7.2-11.el8.x86_64.rpm 7b4ab27cf8d16d626049f9cc4016f6445b1f3950f7308e122ec73b9d2a92b70b libreoffice-opensymbol-fonts-6.4.7.2-11.el8.noarch.rpm a8a0953db5c80d1181a2974203ff7928e87b59f36dee3ea0e9e46b861df14194 libreoffice-pdfimport-6.4.7.2-11.el8.x86_64.rpm 4173256e429df5eb0b28dbabe2a961612aa840b9d89b0b11f2b5cea8a2305113 libreoffice-pyuno-6.4.7.2-11.el8.x86_64.rpm bc96cfc8ccce93fd6fa9ec61d1fd02f164893754bac7e766e3655c02a8e898aa libreoffice-ure-6.4.7.2-11.el8.x86_64.rpm 008dcee0c499355dc23ceae84b819be63f3a245052e46068af0b6b0aad3cee72 libreoffice-ure-common-6.4.7.2-11.el8.noarch.rpm 53f00b7b2a3878e3bb85034aa804ab7ed697d4df342ea1302d1e301424173c08 libreoffice-wiki-publisher-6.4.7.2-11.el8.x86_64.rpm 87121150e754e030e1dc88f7dc4c7c4b3632cfb8cdeaaeb90fe407ddd044e313 libreoffice-writer-6.4.7.2-11.el8.x86_64.rpm 42e7244e1d162abbda7a6e4e3acbcc11a880cfb8692ce5ad8aee842026f05dd8 libreoffice-x11-6.4.7.2-11.el8.x86_64.rpm 32e691c44997fb0530c0ed4c9ba40ad4eb6f9c4a471640f11560bb1c610199d6 libreoffice-xsltfilter-6.4.7.2-11.el8.x86_64.rpm eb29356082fc1eb03f733e03503830625f605aec1673daebc65a6db85c3cf191 RLSA-2022:7464 Moderate: protobuf security update The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for protobuf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms protobuf-3.5.0-15.el8.x86_64.rpm bbe6424af46d5510d24c8e9c5d9198ac1b130582bd806a32b37d4308b803007e protobuf-compiler-3.5.0-15.el8.x86_64.rpm e8d6d89ce0937625dede41e2543fe7d68e9057b110c286da3f8ab570a42e577f protobuf-lite-3.5.0-15.el8.x86_64.rpm 8c7dd42b7cb65b53a24b1c730699b4d443b2b5191fd07885dd5e568a59f6c511 python3-protobuf-3.5.0-15.el8.noarch.rpm 032353658522c1218db3ba1b8bb3fc2e1f7b9c01e0c7258faaa0a44da15f1806 RLBA-2022:7465 nmstate bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nmstate-1.3.3-1.el8.x86_64.rpm 63466af6734f4f6c8cc09b9eeca17696fd0cb24a4cbfb52712c67c75d3c35c61 nmstate-libs-1.3.3-1.el8.x86_64.rpm 6a78b43ecc69f3e2fea22391a2e3429e739541e2705409ac22750ba029d0d922 nmstate-plugin-ovsdb-1.3.3-1.el8.noarch.rpm c1654ca5dd05c18d2cb0da8506c7ba67d8548f6faed407cc386bf20b49d7bfe4 python3-libnmstate-1.3.3-1.el8.noarch.rpm 49b701eec6829bd48c9f2399ffa7f77c2bcd30b8ced4648d2f2a51cbcf3f863a RLBA-2022:7466 network-manager-applet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for network-manager-applet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms network-manager-applet-1.26.0-1.el8.x86_64.rpm 6de3fb69095b578fc44818250cb608ff5d1eafd2971b5919789a0f0af9838f23 nm-connection-editor-1.26.0-1.el8.x86_64.rpm 573a88541d4fe6bf303cf3f6ca9971252ffc8781b1a8dbfdb24e48a63d9f7624 RLBA-2022:7467 annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms annobin-10.67-3.el8.x86_64.rpm 001814c01eab83a5008379e3f6092e31d6df9948bab87770ac6e1c04bc8c4877 annobin-annocheck-10.67-3.el8.x86_64.rpm 5af4367270a02b2aee39756ccbcb6c37cefabf6bfaee61224595b7c5b7b849f2 RLBA-2022:7468 libnma bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnma. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libnma-1.8.38-1.el8.x86_64.rpm fa9f87d388e229cf8b3611d5d5d6db249bcc97f807fc25e5fcfa68e76b49054e RLSA-2022:7469 Moderate: container-tools:4.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 8fb2669180d717578f5407e383babf56b298d037148cf7d9c0bd7f819a707601 buildah-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2f25ea2a6be5c7011a1916c56ff82621deb8cd1d6f0217706778357723366905 buildah-tests-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm ddf136a758c754d1fd72d1438e3c92e44b6eb6b97f825cbe0d8e819e04ab1d73 cockpit-podman-46-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 31b189daa75aaa373b83e652622ebecc62fb8e4f76e9af1a266b3c90d4c3f9ff conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a containernetworking-plugins-1.1.1-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 66a46e625dfc054cd5870d6167e113d10bb59505276e810ba7da03a8db35b55e containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm a0a9eb3a59768b77fa3790a555c1fb3f3b221258a5703418c0cd05b65245b4c9 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 5053642b22732a14803ee43bcb11874bb3771e7bc9a4ddac6f46ffdd3543a154 oci-seccomp-bpf-hook-1.2.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm e554c656d1081836a1cb7ba203733908cd2d6962e5d44444ce830f7390fb18ba podman-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 490f60764e4fcbd8023ea76f67ae1388251b4652f3fb943722ced31cf84fdf0c podman-catatonit-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 52bd88d63cbbc3baaceefc983b99f22f9dcc35d413fe6bbca4546d7e60c0033d podman-docker-4.0.2-8.module+el8.7.0+1077+0e4f03d4.noarch.rpm 10a7c81ad06ae9dbdfda484dd13565f7c22151ea91a079a1ad63ed2e531da66e podman-gvproxy-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 42d506b86c4af61e6a5ffff7af6ac0a4ee9f22755927088e298554dbc3fc1eb3 podman-plugins-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b758f026bc43ab5ace11b05645d519087a5ec14e826a5d12f9f49979dc3e0a1d podman-remote-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm f533129f039cf6cb7f2d4d3a961305ca1f6b731f5d60994486a27d958780a293 podman-tests-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d5cdfb3bee10883d7db12f92d710a598abcdb3a607790d54f5706f5bcd9bf581 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856 skopeo-1.6.2-5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 00879c92217e659f1ab2e92d2b65b8f09c2db2a4b690cc63ee70ac2f5a8af06b skopeo-tests-1.6.2-5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 3692622d7758eb5d1b23030258ea1689ac1c7b55d93e241db3a43fab9eef329e slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 toolbox-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4070fc688f1a94fb09eb2d1d290c15aa06cc523a40ec39a6eb2c6e2a4a49cf14 toolbox-tests-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm f2ac5e105f0c039a157be718b529c5c0d1fa6478b678cdafb95ce6388c006700 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLSA-2022:7470 Important: pki-core:10.6 and pki-deps:10.6 security and bug fix update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm 20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 resteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpm 92ea72f7a67d5de0fb940e1cbbc36752c56f02d056915d35be500fe51e146e6e slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 rocky-linux-8-x86-64-appstream-rpms__pki-core idm-pki-acme-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm c75bd19936084ad802be1105482da2be5811f29ecb13560b7ee81faa8ac1e980 idm-pki-base-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm 02f3a3a945b31588eb0dee689345d951d235c8768466eccfef67c5c39a0d5948 idm-pki-base-java-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm d44b53d8db698569bcd73ebdd90d4cb3f04803e2311b1808b2a57270ea3abaca idm-pki-ca-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm f3f37d4f225cb537289d5e672623ecdc73fef5d5e23fa5dccf2b719a7e96a7f9 idm-pki-kra-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm 26f54074d17e768bb73d8cc8a002cda1c2afb6e0bd8a4398b72ebb9e4beb7f2b idm-pki-server-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm 3393ab8263567bb27c4a17f9d65107219ecd399e3a6eebeb65fc665e141e4a31 idm-pki-symkey-10.12.0-4.module+el8.7.0+1069+6f3de942.x86_64.rpm 07512c1525c5c5f2e8d0cd8e854a10cfe6bea277397011d10161b6a49bbaea33 idm-pki-tools-10.12.0-4.module+el8.7.0+1069+6f3de942.x86_64.rpm 59ad86761970d0125faf88d75fd1ebf7ce377cc3bc004dba6457a259f47c1978 jss-4.9.4-1.module+el8.7.0+1069+6f3de942.x86_64.rpm 639900844e2769e46d074053aff869916a34bf1c396dc8a068585c9b06d50654 jss-javadoc-4.9.4-1.module+el8.7.0+1069+6f3de942.x86_64.rpm 37da27e63ac0c3f7440ffac703a02e1efb8689438552706bb0b53e661cd8ff87 ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f python3-idm-pki-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm 33551818f77ff11cd3b0f352418bd7a4ebee284a87ddb8ccc709d726972543ff tomcatjss-7.7.1-1.module+el8.6.0+788+76246f77.noarch.rpm 086e5c953de53c42f6ae4abcd32e4c9126ba1dd9a028a7a2624a7d8bff1fa27b RLBA-2022:7471 libestr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libestr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libestr-0.1.10-3.el8.x86_64.rpm e1e6d6fceb008a0fce814e9664a506b16325c490e608f3e6fed42a26f7058f7e RLSA-2022:7472 Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828) Security Fix(es): * QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) * libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) * swtpm: Unchecked header size indicator against expected size (CVE-2022-23645) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828) Security Fix(es): * QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) * libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) * swtpm: Unchecked header size indicator against expected size (CVE-2022-23645) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45 libguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 4456694874c9d7346f28a9f1afa1a3456df30b16304fe183ff42190cd9e708c6 libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645 libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 3c9d51c249abda39f7eb4c3a9e7aec28fd90a7bbebcade157e9bae228e0c99fc libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0 libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b libguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 0c1afa84a2ce7357193c0eae89c65ce30a9e143e7ead6c774c16371f58da4ea4 libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm e6cafc935323470c7f0fa1156693ff1fb9816931387cebcfc33057f1f535fee8 libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm f45396ca362fd4fc35b9f14babd32cfaea1321a6417308a1292f44d1224898f2 libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100 libguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 5d5c05f7f8470a00208277eb34687306aab70af2ce1bd57ac78528e631505f59 libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52 libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm 8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0 libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm ea41423cb9ccd317d1a5ebbcb070b9e1a74f99ecce9c3e5051267bb64c188eee libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 7ed71d62ecf427822af3a0b9e20fc93f9e05bf2004fb7be9511d6ab5e9b3de7d libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 0ce8f2e8e6dca56e8a76186d1dfa73130956079bfd6f2818c1ee50944fc0b416 libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm d0cea4e0b6167849fb7edcb91531b3716e01887bfe9faea099bd0b8c7fc51858 libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 0c0d39b5bfd236922c883c4367c39d9c711ccdace73f36ece10088d466b889de libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 092bc77167d3a1d392f4f214a08a4eaec63d5b25c12f7f3f0850b48c2de205e5 libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm c484e35d7ad61b87ad9662109aecb110158136240c797bbc126dae3078f4414a libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 830a30966b383cdc2ed0cf28870c8af581d8a2b1dff4d0ed3fc1b4e6ec9941b4 libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 1f37a92b9f136ee4e4fc8f9bed72ca1cf858bbde132596cd5fcb789018e40a8f libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 97350f3e49235032387990bfadb529874b4cc8fdaa39edc6f13d69e36253b4ad libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6df6e0e49b97c69ff5b065e574b4c9eaa08c0ae4de46832fd1dc5c8b19abe6c0 libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm e8d54db9bd04dc675d8b44bab42de599af7c56fa68d5715135c1742056a0c6b3 libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm c87e4f8cb42bcbe09ed1c043fe3d57ffd7bc2e7f5adc56814651901db5f79a40 libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm ef4b347f15c6ab94fb348337c7856ba6acad1fbd7d425486741be6a5640a73e3 libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6c4b97bcb6b615b8c2bf886459f22fe782c05d2679c56fc1808e044feb60658b libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 087db2ba93134a2c732b4fa5fa37b3c9fc2369447398a86a1a6c10de5f467609 libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm a791d8f7e3badb26d0385db4d3c03fbc0c8c800c6f5e4b984c3fcb093ba36d15 libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 57a656c3775cd30fb0e46818c56616b2083bb5a6fc1268ef52cb2ba0bf11968d libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm b382f68a7b9146a952801ceeadf99f7ffacd5b3cdff873278f4c5e87dcf12169 libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6233e0708101c4fab6f867a5bd7081aea83c1b813f0b73b27d2dd066424feab3 libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm cfbadecd26551afc63bb73ffff83ed1a575276d71fae78783579b7200030e03e libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6118db5d391e5ea27aeb8131ed3f596d918706291f0cb7a0ad2df37aa7d8eb26 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm e2a47a6cd93b6be3cb6cfe5b2db5852bd9934cf0e959f37ee82ac6bbfadffe93 libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 4330e66821e29bc2d1412a0480aec1bcdc1f942a81da56d43653bfb9172d9636 libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm fd055f2146f2f2210fe413dcd3500896cfaaa4683cdd3ca9cb6d130f0eb56e51 libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 5853e8e20b37b510049a488594a5e92bfd022747013a2854fcbdcc21bae08757 libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm decc7c7175a8a8456aa9fcb8aa312d9a0aac9657b8cc8a427af79f203bcaf0cb libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 108e8b905f821306c1a18e368b647482898b6726e56268f57f967ba8ca263ee6 lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776 qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm f53d318c4b0613a22aebf4e177ad1f9105fce5fd18dc993e0229980aafc36b93 qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm c6429b4d1d9f6ac6162a7b0a6686ed3f2e1f856b1819d953dd73fc7207946275 qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 0adb29176532c04f3da5718b171484e4116fbdeb09cda55aecca84efeb2a8e98 qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 5fcca46736dc69adb0f7ff4f057607527a15031d5a13d87446cd377dc6eefe04 qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 9625fe3e4a5fffecfa1eb5b6451dd7c5a666bd468c0032198ba9dcefd2fb62cd qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm d587a9dbc9af15a3c4408189098dd620294b95f6673b0614fead295697e1b4d3 qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 13cb392b10b20cfae2cdc32435b6177b26180bbe18ad6108cc9af993090a6c4f qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 5ac7b977816ce165fed7737e3aba3bab5a7150730d979f1d12fb4d1a7ba62832 qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm f4cd7b44410c2c3a1c15413d45916901c818cdd79e8bff1535c416a4a74b3d33 qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 9f1769ac46cca5dd72edd4f2d7cc088d5c10dea45ec6802835aee4b2cdb0e79e qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm e38d06d10d96bf278ce730343fd70de5c90521a564c7b739839c1e24f78a0dd2 qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 161c40f475f3129578d666dc0e8019573443ef59be07e7559618b7ccf68fae31 qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 76329de8d248dfe414a30907f835662cc25fa1bb03823724d7a87c3f32aad717 qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 631ac3650401c6f558dff57a24626a58aa7ad05e7dc8549e8bde07f483087b02 ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70 supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm 9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838 swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9 swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4 RLBA-2022:7473 redhat-rpm-config bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for redhat-rpm-config. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms kernel-rpm-macros-130-1.el8.noarch.rpm 9cd56deb5481f895537c65561edbe8acb12712d430da972565fe349fe213c5d1 redhat-rpm-config-130-1.el8.noarch.rpm 1fd4e15c423d85b224c0baf80bcc6de17f38a01636cd4ecaaec81b8e405065fa RLBA-2022:7474 pcp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pcp-doc-5.3.7-7.el8.noarch.rpm 5801ed335c4b6b87b650b867866987aefcc223f191fb044938a89e6f29868e63 pcp-export-pcp2json-5.3.7-7.el8.x86_64.rpm 7f6c8907c4010774ce95460a05c58da2ac493943168eff189beb3546d7274805 pcp-export-pcp2elasticsearch-5.3.7-7.el8.x86_64.rpm e1049e0e49a43d39b9d0a550b3c6d65356ee2a186a64d9cf8e3a81a2a563b232 pcp-export-pcp2graphite-5.3.7-7.el8.x86_64.rpm b118fcafeee32bd85c199e196edcb04c4215fc393860148013d28f32dd3d4fc8 pcp-export-pcp2influxdb-5.3.7-7.el8.x86_64.rpm 1eb430a6942f94f8c246f0b64b49879f076a9211967ee1170283a4416fb155db pcp-devel-5.3.7-7.el8.x86_64.rpm 53ed873be0a925f576b7373bd6e5b82227406aff0f7bd6d92e609ad40661f00b pcp-5.3.7-7.el8.x86_64.rpm 00ebd7b43bc8a1b8c881d0c1d90752e7f9bdea90c55d4d6bdd960b52d2721d6b pcp-conf-5.3.7-7.el8.x86_64.rpm dc498244e321fa312f5fcf7006dfa5c0c7845bf1925ecfd5d6c393ed60ed69ba pcp-export-pcp2spark-5.3.7-7.el8.x86_64.rpm f2d5bb86bcc8ee31ed2b79beebaad4cc1dbb561e6db017857dd5b7beb06458b2 pcp-export-pcp2xml-5.3.7-7.el8.x86_64.rpm 5f964378221649516161216e7186f07f765f8812f51752b3548398444031616b pcp-export-pcp2zabbix-5.3.7-7.el8.x86_64.rpm c6dc535961e350604a665fe860315640b2f0c92e49a283cba3f7ab54e2e3e712 pcp-export-zabbix-agent-5.3.7-7.el8.x86_64.rpm 35c42db07bfd2aec133c643626ade46fb99c1161eb68ed0687ddca0d355b27d9 pcp-gui-5.3.7-7.el8.x86_64.rpm 2b7d06926848b9660823faba8921967bbd086cef56ded0fd2ac80285f4f64e7c pcp-import-collectl2pcp-5.3.7-7.el8.x86_64.rpm 9bf437967b2f1ea1bdb71d0c9cacbd4769f5d51f6fe5fdc0e974da18434885fd pcp-import-ganglia2pcp-5.3.7-7.el8.x86_64.rpm 9b78bddabe9eefa71861c432eac7a7b204ec400c4fbba29242ef0ac020617cad pcp-import-iostat2pcp-5.3.7-7.el8.x86_64.rpm 02fe9376a1032c9103eb11733f9f08102b987d2315b14191bf264b1299c10b40 pcp-import-mrtg2pcp-5.3.7-7.el8.x86_64.rpm fa014a3f31fc1ca1e5691b00d83739b3b98dc9af771fa697922320edd29ac72c pcp-import-sar2pcp-5.3.7-7.el8.x86_64.rpm 3560e51b6528e51c36475c5949281077b881fe901ff1aa244b90ec6f364f7926 pcp-libs-5.3.7-7.el8.x86_64.rpm 9e17bc46a551e9edbf052b7b61639eca23fe433e0de7dc83b0bcba2cc12df00f pcp-libs-devel-5.3.7-7.el8.x86_64.rpm ca7ac79edf9b392626264422415265aac1b7c389085b94fdfccfd23359b46028 pcp-pmda-activemq-5.3.7-7.el8.x86_64.rpm 872e8abcf6fcc6c2a00990999d551ddda31be1a91d1e4a03ea6752b47fbb546f pcp-pmda-apache-5.3.7-7.el8.x86_64.rpm 67d4640cedb9b327455eb3df26a6a2248561fe24391785db8bba26d3156ce6e8 pcp-pmda-bash-5.3.7-7.el8.x86_64.rpm 51facfa1c869ba09f53e3aa70900fc2f701a4321ec94d5d1687c70bdbb73e512 pcp-pmda-bcc-5.3.7-7.el8.x86_64.rpm 15817e139b5918e6503548f997a23bd7a540728ed25efef4a3c9b7b07adf5423 pcp-pmda-bind2-5.3.7-7.el8.x86_64.rpm ea7c47bd76ea337e05476c8bc72c1b3df4f916efb5f3fbc453ef5b22a58e34bd pcp-pmda-bonding-5.3.7-7.el8.x86_64.rpm eabee9b7c021e2f1b2d78d634741220b1d5ad90508ed38d571eb68528fb8956f pcp-pmda-bpftrace-5.3.7-7.el8.x86_64.rpm 614fc74fb65feb56a18aaffcb9f14737e0233a9b937be0ef9322f6be6c93fd3c pcp-pmda-cifs-5.3.7-7.el8.x86_64.rpm e9240900588e11d294004c9474ec240b680c0fa8c53d85971ea428ade018db04 pcp-pmda-cisco-5.3.7-7.el8.x86_64.rpm 6ab58ef8e02de9a0ab041ad77a17b93e036a4055f5599baa89122094afb6f44e pcp-pmda-dbping-5.3.7-7.el8.x86_64.rpm 1ed8819ef1bb7b9d0cf2f3b6fa0fe03614235ebe1bd7d9cb43f01d5ab2daf80b pcp-pmda-denki-5.3.7-7.el8.x86_64.rpm de66b1141ec48dd4ce4ea4bc73e9796355a6f87c4371aecd197d81d360fadacf pcp-pmda-dm-5.3.7-7.el8.x86_64.rpm e7116371b14ad7f2d12b53b973bb4835916810bc23c93cb8ffbbb99251df158a pcp-pmda-docker-5.3.7-7.el8.x86_64.rpm eb41b394a2cb327dd5cf978e5e5442fa61465d0a2c7a7c936c92b442111a4a5d pcp-pmda-ds389-5.3.7-7.el8.x86_64.rpm a18e9439e2cfa458108c3203231d54289504963cb558277b2ae2adf1419572c1 pcp-pmda-ds389log-5.3.7-7.el8.x86_64.rpm 5ca961ca4a3cd832154e978a234b2366aeb821c9d386c50f7ef5f126dbfe4ef2 pcp-pmda-elasticsearch-5.3.7-7.el8.x86_64.rpm 07f3370cae783f296f3ef63f461b828440a14c0d97f5c05993c34afa7d8b27bb pcp-pmda-gfs2-5.3.7-7.el8.x86_64.rpm b81dea7bafdfff3b5153ad1c2bfe01b4e5be4ea7b4940ff7e126c126bad0650e pcp-pmda-gluster-5.3.7-7.el8.x86_64.rpm 5f4005fa3a78eb4a30877aa3ace5d1c663f3685699c17d9ad24dea89af231a87 pcp-pmda-gpfs-5.3.7-7.el8.x86_64.rpm 373e6c36ff883952ca43c985667d6d22b1460bf23c825436695b61f6f82aabec pcp-pmda-gpsd-5.3.7-7.el8.x86_64.rpm c7dd1e16b62800b5941b53b9f6f965ad6d96f54f9220eecaca89ee4d841ce5af pcp-pmda-hacluster-5.3.7-7.el8.x86_64.rpm 560a0f7086af3c8c812fda6105d9ec9d17284549539db3ca9c9982b59037bb2d pcp-pmda-haproxy-5.3.7-7.el8.x86_64.rpm efe061e03e82e894a6e563896bb1a55245aa4a7ab5ba5862ff46ae032ebba3ab pcp-pmda-infiniband-5.3.7-7.el8.x86_64.rpm 66d153a49faec50aaa7b5d439c7fc86f34f2ded2828169e06d2964550c955cf2 pcp-pmda-json-5.3.7-7.el8.x86_64.rpm 902a782334542230ef69e996a6a1d1b853789798ea3d1643b51e6ba2b6d7b288 pcp-pmda-libvirt-5.3.7-7.el8.x86_64.rpm 8f2643279569d40fe30d06aee546598a6c1bef045eab4780a0c4bdecfc5b7119 pcp-pmda-lio-5.3.7-7.el8.x86_64.rpm 9d335fe1edf4daefd1ae9476b2f37ae9127de91848d181a3a0254fc336bcad9b pcp-pmda-lmsensors-5.3.7-7.el8.x86_64.rpm 05f540c9b787a785d7d3cdccb846a2ef395961cf380859a564cab572de1026a8 pcp-pmda-logger-5.3.7-7.el8.x86_64.rpm 409849d5599e3fa27ac740cc80ab2f78b1f48c136d15c15d92f189022c5418c9 pcp-pmda-lustre-5.3.7-7.el8.x86_64.rpm 752d7c1012c438e765c2592ab3feccfb1c25f919b3bd5f5b323c0e8bed47f00e pcp-pmda-lustrecomm-5.3.7-7.el8.x86_64.rpm 783458dec76d9e1747586260565105804723d3691e05e7e8ef3e638f8debc494 pcp-pmda-mailq-5.3.7-7.el8.x86_64.rpm 854e15d307eb44a6d3327fb9f361a0a565bb86841ca1ad9a7db790e5d7178990 pcp-pmda-memcache-5.3.7-7.el8.x86_64.rpm 5b7d46fb1b55895b98cef386fbf0105d9252952fc140779b57a4000b7f54eebd pcp-pmda-mic-5.3.7-7.el8.x86_64.rpm d64902cb5d41f559ce5d33d0db74f0f78e4b6f23720c479e07e6dd357f6e97cc pcp-pmda-mongodb-5.3.7-7.el8.x86_64.rpm 6ae518e8af3587d018b42fac33081762609aa6beccf4fac89cab91cf44fadb79 pcp-pmda-mounts-5.3.7-7.el8.x86_64.rpm 16b938aa3e8180b94e7f2767cff2c0812c3a743bf825fded52678f6394ccf323 pcp-pmda-mssql-5.3.7-7.el8.x86_64.rpm 3123ce8d083dd4ffb03eb5ad07a9e1b793dcebe090dc26c960849a5a5d2d3442 pcp-pmda-mysql-5.3.7-7.el8.x86_64.rpm 245dc0e620170830161c3fe8209cf402ec1f978cd40980fdbf262660ab056d82 pcp-pmda-named-5.3.7-7.el8.x86_64.rpm 064f4f327642f255dde1ef4eef4f04920c6dc47a8953a8f2f5bbfcf774d769ab pcp-pmda-netcheck-5.3.7-7.el8.x86_64.rpm 2424f1b2fb83f55878bdd2eeb2cfa2cea5416deca67c1748419b90d218e53201 pcp-pmda-netfilter-5.3.7-7.el8.x86_64.rpm af97b89d79002cc54cb2495c53edca7feca94a4d8213d3b7e76e6584b3e65cbb pcp-pmda-news-5.3.7-7.el8.x86_64.rpm f11571ad54438d2b54796baecdfe3815420842b39b2f8199681ebf10a57361c4 pcp-pmda-nfsclient-5.3.7-7.el8.x86_64.rpm 35f0478d71860dd5735407f6efb74dd9f4ffaa35d6e4c5a103bef9825743a7c4 pcp-pmda-nginx-5.3.7-7.el8.x86_64.rpm e78b31685a0d0126fda6c4ca67102e8fe17aa5c0e2c24461e9dc58eb7ae6c025 pcp-pmda-nvidia-gpu-5.3.7-7.el8.x86_64.rpm a0903ccaa5d73ca885c7b6c9238433dde0f5ed22aad7c713692808fb369a6f9f pcp-pmda-openmetrics-5.3.7-7.el8.x86_64.rpm acda2ced8cb0e5cf25c340ff68af62118b2b54d631fb013bc3e49d87c867fe57 pcp-pmda-openvswitch-5.3.7-7.el8.x86_64.rpm 4019049bd7536ef2cfcfffdefa1ad20d14497e9ffb1b8440c0515570f65e8fca pcp-pmda-oracle-5.3.7-7.el8.x86_64.rpm 265ba7ec8906991b9d82b8741eb06a19cd09870f5e0e0f4d455805226d66d4a0 pcp-pmda-pdns-5.3.7-7.el8.x86_64.rpm 03cc10c9c45397426a6f341eb3e2281b4c40afa120de3f60e6a115d11280a9cb pcp-pmda-perfevent-5.3.7-7.el8.x86_64.rpm 5c46827714826ad2e46ca438832372b68756a23b2a814d232c24e004cb22bb8f pcp-pmda-podman-5.3.7-7.el8.x86_64.rpm f98fc7f25d25d301001a221af560a5181ee3c28780b2b7478031856797c3cf97 pcp-pmda-postfix-5.3.7-7.el8.x86_64.rpm 6cb13bada18d1817a51e19ce494ad14a965904a8f2a5426aeab20f744402b7ac pcp-pmda-postgresql-5.3.7-7.el8.x86_64.rpm 2e940c0bbc810fa465555a3ff028676adfd86f02a999464e2cd48b056eeda51c pcp-pmda-rabbitmq-5.3.7-7.el8.x86_64.rpm 715ab60a7c06980e5a05777b2d4697269ba1776d561b75c35e66ff0e1f8c8531 pcp-pmda-redis-5.3.7-7.el8.x86_64.rpm 34f3c72cc2046583e287fcf28ccbc00d8e08398f9699e56802942a0cc292e62b pcp-pmda-roomtemp-5.3.7-7.el8.x86_64.rpm ef99347ad293640a26a44dc17d1e2f7abc94df873ce5ab70aa77ac9578e449b1 pcp-pmda-rsyslog-5.3.7-7.el8.x86_64.rpm 53fad6bb65b717420b8ee72d4a95498d4b6a1ca55c390044b91e2acc5509462e pcp-pmda-samba-5.3.7-7.el8.x86_64.rpm 87aaf1312975daf6af0ffa6a579ff34681c7efd432b454f92290ca771cdc1107 pcp-pmda-sendmail-5.3.7-7.el8.x86_64.rpm d6d13dc716111db98c2376e7a3a916984f99afa1009c0341e3ae2c5b627ff292 pcp-pmda-shping-5.3.7-7.el8.x86_64.rpm 860edf1878bf5794559a23a78f2f7c17a20ca3e999af2e2b9a773d6c663ddd79 pcp-pmda-slurm-5.3.7-7.el8.x86_64.rpm 7ef94e6af4bc6384063e02cb096261e8880e5c0d61be8c18eb2e2ed466513255 pcp-pmda-smart-5.3.7-7.el8.x86_64.rpm adce64bc75f3ed731ad1dd76346a59fa47b81184b9d0c302b5ed493c21498190 pcp-pmda-snmp-5.3.7-7.el8.x86_64.rpm a3d4e26d42a018553a136e19e5b862e42cb32d62992a03a5fe0efa42db0ae51a pcp-pmda-sockets-5.3.7-7.el8.x86_64.rpm e4ab1e5d7a26a2f9223f120c0b7e703622410f4df956df2acc72a6eb2668cc59 pcp-pmda-statsd-5.3.7-7.el8.x86_64.rpm 2dd774c88537feae2dd76e3a9e6cad37ec5aa603d32da9398935df31ba85607e pcp-pmda-summary-5.3.7-7.el8.x86_64.rpm 04a905391cb95625ce471b18343a1cafc0a0bee64a75b90c600313d3b446824f pcp-pmda-systemd-5.3.7-7.el8.x86_64.rpm 37942492caf9f786859b2415103e5b4ebc0c69267dea087ed893d394deef005e pcp-pmda-trace-5.3.7-7.el8.x86_64.rpm 788b42135383d3d3e29891c9088d746a3cec73b335ceba123d74cc7485d92c4f pcp-pmda-unbound-5.3.7-7.el8.x86_64.rpm 7e9f02e2b312b580a969985523797ae105f67c75dd7d0fdb4d8e8ec421648e26 pcp-pmda-weblog-5.3.7-7.el8.x86_64.rpm f012e167eaf763d8908d1f56a85659cedb77ce3b2f0568af50734daaf19c0880 pcp-pmda-zimbra-5.3.7-7.el8.x86_64.rpm 1f5bc88a2cf9f5aca0ac3f814ffb56b8852a2b5fa690adc9c676b004c2796377 pcp-pmda-zswap-5.3.7-7.el8.x86_64.rpm e38b1b32a225ac0e773a10c49df473113c602d2e58702446355d5d5944936b48 pcp-selinux-5.3.7-7.el8.x86_64.rpm 0c80aba651a6d738b1437bceb7d9cc88423603d523e67de9fdb3a574248afa81 pcp-system-tools-5.3.7-7.el8.x86_64.rpm f0e0d1b2ec9871988473d800224d427031dd19725080490c70fb944a21c5180a pcp-testsuite-5.3.7-7.el8.x86_64.rpm 92021870bee5c92df2860e2ca5860da23dae9a47b27e4e47cbcc9b91816a23c8 pcp-zeroconf-5.3.7-7.el8.x86_64.rpm a4325860c9a9e0b0dd9fb5801d5b83fa6fe6f3368a37519e2236ad70b2ad4a0b perl-PCP-LogImport-5.3.7-7.el8.x86_64.rpm f3cdaff8b6ad441b42acb20d38a12e845bb46a782f619c9b0aa7bef10f5cdc01 perl-PCP-LogSummary-5.3.7-7.el8.x86_64.rpm e334610db252b3d394c6009ff10086f012404fe268ca8517038b66005e1a36d6 perl-PCP-MMV-5.3.7-7.el8.x86_64.rpm 8f348ee17908a1b0c01e846baa66b3ce580fb02c13267fae67af3e6bb0dc94cd perl-PCP-PMDA-5.3.7-7.el8.x86_64.rpm 061290de4584cf422e1b7c33be79c4f6511997b7cfeb55ef7c0f3ca01ff9d646 python3-pcp-5.3.7-7.el8.x86_64.rpm 4ed2c50a8db6aa05bdc0cc68778bd1a99ef408e618fce74ef366cce4b6495d74 RLBA-2022:7475 flatpak-xdg-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for flatpak-xdg-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms flatpak-spawn-1.0.5-1.el8.x86_64.rpm 092dfe7f72bc10fa6b176644a851b3f7139c0c8f0b9d6dc5c2957925fb9dc54a flatpak-xdg-utils-1.0.5-1.el8.x86_64.rpm 214e2855e04dae2982f996b9c3cc6fb99644190001a4e40eb56908c88053ee10 RLBA-2022:7476 xdg-desktop-portal-gtk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xdg-desktop-portal-gtk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xdg-desktop-portal-gtk-1.8.0-1.el8.x86_64.rpm a85062ed9546335a63ee9c70d9af983ef3cdec29f602b3f07d985cfd390627d5 RLBA-2022:7477 motif bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for motif. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms motif-2.3.4-18.el8.x86_64.rpm 86ecba4ceba64fdff89a7f101adceb50d239963cf57986f5d25a33bf2c95571c motif-devel-2.3.4-18.el8.x86_64.rpm 43139d0c2d1505c072a6a3da122d89a597308f6e4ba0ddcb35c0bb73036527f3 motif-static-2.3.4-18.el8.x86_64.rpm b2238946b5e91bbfe0aba25eb8dc14f1209c844bb36cba8697df79d01fc0190b RLBA-2022:7479 xdg-desktop-portal bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xdg-desktop-portal. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xdg-desktop-portal-1.8.1-1.el8.x86_64.rpm 4fdd21063a36da9322478dd1539c5c0b5150467da0d9deebad8276e7e5736c2c RLBA-2022:7480 mod_auth_openidc:2.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_openidc, cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102 mod_auth_openidc-2.4.9.4-1.module+el8.7.0+1061+55d14382.x86_64.rpm a7a7267411bd04af8caa7eb94670e7a9891c5013d3d13ee54f1249db8f50fe0a RLBA-2022:7481 python-qt5 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-qt5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-qt5-5.15.0-3.el8.x86_64.rpm 84a3a09fcbccdf1a11d7b7c0480468953b090a06e1e609c92ecf9ea68025bb29 python3-qt5-base-5.15.0-3.el8.x86_64.rpm ab6493c339c96cb6a973f3e1132c5f341ea7bd8f81dc0b1444bff9d661a57233 python-qt5-rpm-macros-5.15.0-3.el8.noarch.rpm 5841de551507eff9e1bca1cc379412ea9c4a23711fb5ff6969f4085f4e2a3eef RLSA-2022:7482 Moderate: qt5 security, bug fix, and enhancement update The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework. The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377) Security Fix(es): * qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for qt5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework. The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377) Security Fix(es): * qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-rpm-macros-5.15.3-1.el8.noarch.rpm 318bce8eeab528f3f10626f40aa1cc9301c90d4738155043da3b39a447afe501 qt5-srpm-macros-5.15.3-1.el8.noarch.rpm 3c67f14e96c3953ccae000512d56e7db073fedac51b7a3cb79de29fc941b6891 RLBA-2022:7483 adwaita-qt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adwaita-qt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms adwaita-qt5-1.2.1-4.el8.x86_64.rpm d8f67653bc6e3a790140c8429aa913b72ac6fb74f03f43d435e133befb9d5e03 libadwaita-qt5-1.2.1-4.el8.x86_64.rpm 87fecd70e89aa29945a28fa96049f3511b7240218c0d4f5accf1e6db0bbfafd8 RLBA-2022:7484 qgnomeplatform bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qgnomeplatform. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qgnomeplatform-0.7.1-3.el8.x86_64.rpm 64fb1dfdeff8c07b8660f54caebc5749cb648980112637684248d419fc897b91 RLBA-2022:7485 qt5-doc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-doc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qt3d-doc-5.15.3-1.el8.noarch.rpm b578c8870ee6e910502e42b81710fc8a6e985b198e0617fc85791f44cc942c59 qt5-qtbase-doc-5.15.3-1.el8.noarch.rpm a37d8b86162330ecbd017e593b7713e1f8d0b4a07e8221b2af1a6696209d6244 qt5-qtconnectivity-doc-5.15.3-1.el8.noarch.rpm d68d4c01de884931c2f872003220916688ca1f56f377394b9c7669ee22c2cf20 qt5-qtdeclarative-doc-5.15.3-1.el8.noarch.rpm 2f3bd7e7948bb220f0ce95641a66867f8d2c3c4d56d8b06a4c8a0a1715d9f19f qt5-qtgraphicaleffects-doc-5.15.3-1.el8.noarch.rpm a47323715d075aef530937b15aa3def0a83236230aa78eec946b8845f14d4257 qt5-qtimageformats-doc-5.15.3-1.el8.noarch.rpm b78e11fd07c00d5cac56fed0399c6265ccb4a5028444fec9dd48c6057c1d92a8 qt5-qtlocation-doc-5.15.3-1.el8.noarch.rpm 17926542bc2a4728e759fc6976f8bc474a150647b908744dd89244cbe7e19b3a qt5-qtmultimedia-doc-5.15.3-1.el8.noarch.rpm 0ada051b2273caae04efae6cd4fcb5c72cd7bf3a1655d91d47dc9ba8207282a2 qt5-qtquickcontrols2-doc-5.15.3-1.el8.noarch.rpm a60592429c1c1849ac4214e529bddb43db4930662b0f5b3b8080660c62a8b663 qt5-qtquickcontrols-doc-5.15.3-1.el8.noarch.rpm 4c0d9d49de82d2a7371ff8066aec0fa9295c26eb8cb46ba5a7105630804cdabf qt5-qtscript-doc-5.15.3-1.el8.noarch.rpm ca663a26418cff9367340ade7a1bd5474b2f7749ff45f3ef78b5c2e2f3711b85 qt5-qtsensors-doc-5.15.3-1.el8.noarch.rpm 150059e9748d920c4c7bc7187ac9976c2962d56338129de13659772526a873d8 qt5-qtserialbus-doc-5.15.3-1.el8.noarch.rpm c42f425f201373eccdc9868f46d015b31e579e6371cc2e95a9e21f8f8371f97b qt5-qtserialport-doc-5.15.3-1.el8.noarch.rpm bcb7190d9641cc04d64e568ffbf55561b43e3c010e75ced68cd3c3ce079e99e7 qt5-qtsvg-doc-5.15.3-1.el8.noarch.rpm e0409aeeceae97f8fe2ce907e39c9044e5ab19bfc63fe70631de723e62df9011 qt5-qttools-doc-5.15.3-1.el8.noarch.rpm 47067ec7068fee6779714e18ed430650779a66ada664e10bd3d215f0c86bbef8 qt5-qtwayland-doc-5.15.3-1.el8.noarch.rpm dece0d172de59c7ed2fe4a0ba2a254e907a881fd779f709782101a975ad137fa qt5-qtwebchannel-doc-5.15.3-1.el8.noarch.rpm 07786d83f41f9caf0090d57714cd30a4a126880b29759292b3605b58e2b3076c qt5-qtwebsockets-doc-5.15.3-1.el8.noarch.rpm 5458756aa5dea8068108c34f2a0c42bd57f7981f359ecd197750a5a9643b5d94 qt5-qtx11extras-doc-5.15.3-1.el8.noarch.rpm e0e3b5caeb20ce57596ec80050bd292305f48c01ec0acdde06fe4f87341bc371 qt5-qtxmlpatterns-doc-5.15.3-1.el8.noarch.rpm 62f8c4c51edbca393ac5f6e53c17a96ac5384a2d1315e7b29a5cdcaf4e4ac427 RLBA-2022:7486 qt5-qt3d bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qt3d. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qt3d-5.15.3-1.el8.x86_64.rpm f642deb151e9167b281d810050bbcfc12fc5c7f52d759374312c16165b49adb1 qt5-qt3d-devel-5.15.3-1.el8.x86_64.rpm 8d93413a59bc9466e402d5f66fa3d31d8cdb730c4861c6f236a762bca5f3f27d qt5-qt3d-examples-5.15.3-1.el8.x86_64.rpm e5fd66c3c33d003cf23cde7a101ea5df935c06b390903deb595718d6849feebe RLBA-2022:7487 qt5-qtbase bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtbase. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtbase-mysql-5.15.3-1.el8.x86_64.rpm dc359fa9c118d821e66dfb9bb15d5f8cb81214aa97059b17f053543b164b2283 qt5-qtbase-5.15.3-1.el8.x86_64.rpm dc4b63e65a81d43416a0e4d32d9d32f766fa1b1d84725631f41127353beb9fae qt5-qtbase-common-5.15.3-1.el8.noarch.rpm c9beaaf5b55fd368b320648260a863f080cf9f326f5c6baa209a83266b6a9374 qt5-qtbase-devel-5.15.3-1.el8.x86_64.rpm c3b18b7f39aff76909fc8a46a972178b119927ad3390082cefb2f39aebf93ddb qt5-qtbase-examples-5.15.3-1.el8.x86_64.rpm 0ded827c44ecf02c587c99ef8644b63dba7fb1861c93005d437eb3fe88cbf33b qt5-qtbase-gui-5.15.3-1.el8.x86_64.rpm e0cd9f93b35b74e750bf6b8c261852162e62ad5370b2b8c0f945410c3e054445 qt5-qtbase-odbc-5.15.3-1.el8.x86_64.rpm 0a326827cf4afdde4766f906369ebf8d4528fbed72547a40135c93dbe8a17fd2 qt5-qtbase-postgresql-5.15.3-1.el8.x86_64.rpm 3b161f3710bc965e70dfd1b827301ce1602132e50e9317ed889f4cd5daf447cd qt5-qtbase-private-devel-5.15.3-1.el8.x86_64.rpm 75a20862f2c2d64cf34c949c5251bbbc187d513240d15a08eb51782bc14ca2b7 RLBA-2022:7489 qt5-qtconnectivity bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtconnectivity. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtconnectivity-5.15.3-1.el8.x86_64.rpm be299dd4932be3deabe76096da6c38eb2be939a7a31213729c2739ea0d93e92f qt5-qtconnectivity-devel-5.15.3-1.el8.x86_64.rpm 7613a3fff4065c91d19671415f34e42340e3bfa7fa14f6bb9bd2f3383cb21a4f qt5-qtconnectivity-examples-5.15.3-1.el8.x86_64.rpm 0f221bcb899ad158aa0305ccec25b21c9d992c3315bedb6569f1b8083776e21b RLBA-2022:7488 qt5-qtcanvas3d bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtcanvas3d. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtcanvas3d-5.12.5-4.el8.x86_64.rpm c73830a1359e8613357d6481cf21cc3e3c681eaf5aeb3de83933c32a67930bb0 qt5-qtcanvas3d-examples-5.12.5-4.el8.x86_64.rpm 372384db2ebc1b1060416eb037fb407c9ee7070ddab840bc6a665293b249e9fd RLBA-2022:7490 qt5-qtdeclarative bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtdeclarative. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtdeclarative-5.15.3-1.el8.x86_64.rpm 81491b48ae87d0a1ff98e6ecb754acc649785dd754a2109795bef669542da1ec qt5-qtdeclarative-devel-5.15.3-1.el8.x86_64.rpm ebf169329015e35b3e644bf229d92fdacc1a88d42d1b2afa533fb290cfa841ee qt5-qtdeclarative-examples-5.15.3-1.el8.x86_64.rpm b37e87d2f25e77843b77268ea4e3d2f3d52f34e075f60d40681420ce5868efdc RLBA-2022:7491 qt5-qtdoc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtdoc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtdoc-5.15.3-1.el8.noarch.rpm dac6619086ac617dc01cf5853d55c1c0f772321db93c1e5a16fde1af92415d5e RLBA-2022:7492 qt5-qtgraphicaleffects bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtgraphicaleffects. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtgraphicaleffects-5.15.3-1.el8.x86_64.rpm 922bf366ab50acea4ed46c3b02aa697dbe2a8a93374f38a538b9e470e434f294 RLBA-2022:7493 qt5-qtimageformats bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtimageformats. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtimageformats-5.15.3-1.el8.x86_64.rpm 35f5a9434f1e60f2eb3bcb3bbda936e06749a8fb8dea14bbbc844ea2fb0e6d7b RLBA-2022:7494 qt5-qtlocation bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtlocation. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtlocation-5.15.3-1.el8.x86_64.rpm ca43c96196e6a8115fbf0cdf01a4489ade997dbd58048e924228498acd7a0097 qt5-qtlocation-devel-5.15.3-1.el8.x86_64.rpm 5bffd4353bab449e1392becd7834bf272be7651bb68a6794ce2f8e7ef64c8515 qt5-qtlocation-examples-5.15.3-1.el8.x86_64.rpm b189cdea1cafc1ca79c697f4aa1665c36f4608b8115df8a76b57e41643b6a246 RLBA-2022:7495 sip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pyqt5-sip-4.19.25-1.el8.x86_64.rpm 21db75baab778c8cd4ec6c33f44121a6532765db7ee209d7f9846b38528da3d5 python3-wx-siplib-4.19.25-1.el8.x86_64.rpm 90031a5995d9cb103e42d1a3f843f403f8a967738f3cb5ae563f9d12a1147420 sip-4.19.25-1.el8.x86_64.rpm c68c49f9f4c35640f1d4650b4e787019062837c576c291ad21ff95c460b4e803 RLBA-2022:7496 qt5-qtmultimedia bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtmultimedia. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtmultimedia-5.15.3-1.el8.x86_64.rpm 1e948901d495ba214f0cf4e587ee090fcf45e891720c0110f77c3f7334c7344a qt5-qtmultimedia-devel-5.15.3-1.el8.x86_64.rpm 81822f107128ae673ef95bebd307e7df7d6dead5186814de1ad54de356522e41 qt5-qtmultimedia-examples-5.15.3-1.el8.x86_64.rpm 3fe41f0f9ec7114616ad8e821087cb67530c043f8dd0a1387cad67a4c6ff0209 RLBA-2022:7498 qt5-qtquickcontrols2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtquickcontrols2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtquickcontrols2-5.15.3-1.el8.x86_64.rpm 91ff6355e91bf7fe76755e23c8ead79a6fa87c4f252d8e6aaba7ead0d5fdc9aa qt5-qtquickcontrols2-examples-5.15.3-1.el8.x86_64.rpm 63e7a95e7a582c2d5eb16ab5e562fd91a1373fe43bd56f47b32321584087b902 RLBA-2022:7497 qt5-qtquickcontrols bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtquickcontrols. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtquickcontrols-5.15.3-1.el8.x86_64.rpm e841695428818cb159ba7374630821ca61b5c031b7b7c626d8608a90ab763dcf qt5-qtquickcontrols-examples-5.15.3-1.el8.x86_64.rpm 8824d8b3cffaa241822275917734a2895be9512f23237c6b7dd78fdcfd7bc921 RLBA-2022:7499 qt5-qtscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtscript-5.15.3-1.el8.x86_64.rpm b83e41de8c573f77493eb68b2f7d0b6fadbd3780c862ab4d842f8625dd9f5266 qt5-qtscript-devel-5.15.3-1.el8.x86_64.rpm d59bd5ed20649f3fe127a33e219167c0acb851430a925ae2ae90fc8d17e9b840 qt5-qtscript-examples-5.15.3-1.el8.x86_64.rpm a13d7b60509e536da399c7616845b03f02a2b32b766aa47c1e26dc1eb659ef62 RLBA-2022:7500 qt5-qtsensors bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtsensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtsensors-5.15.3-1.el8.x86_64.rpm dd4d07314abe281986d456785a42987f84b669116f22cda25d5b51c13520e6f6 qt5-qtsensors-devel-5.15.3-1.el8.x86_64.rpm 33692a009b3d3696018cc619d05a208a45121b882e0a8efa610d5fb210d485e7 qt5-qtsensors-examples-5.15.3-1.el8.x86_64.rpm b6e291636b85e6e0ce8ceff41b66c45d8bb855b05dafe996d16b604c7412d3ea RLBA-2022:7501 qt5-qtserialbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtserialbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtserialbus-5.15.3-1.el8.x86_64.rpm c4db81d111757495d20ca6a7b68973c7e927a8d51396c163117f31000b81b3bf qt5-qtserialbus-examples-5.15.3-1.el8.x86_64.rpm 50d8960d7d9c4254094cc5705434fbd6541ca8d820fb396a7f41f13d0d75e84d RLBA-2022:7502 qt5-qtserialport bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtserialport. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtserialport-5.15.3-1.el8.x86_64.rpm 09eaa88aabaa25fd0f3d2de55688c787571ebd157e1519c8ac9b4c36cb899faa qt5-qtserialport-devel-5.15.3-1.el8.x86_64.rpm 14e06e875b9033364a60bdaa8e0fcc4d2bd3d13f6cbd863471d9db02341b3f31 qt5-qtserialport-examples-5.15.3-1.el8.x86_64.rpm 29c28edda395b9cc97d2e70bfc48f2c82e4577652069d130ed35eb6eb2166483 RLBA-2022:7503 qt5-qtsvg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtsvg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtsvg-5.15.3-1.el8.x86_64.rpm cdbf4491b61986e0ee8cf4414e8070c8a2ca6d764ccb28080171454892e33ad8 qt5-qtsvg-devel-5.15.3-1.el8.x86_64.rpm 3f24f40dcde1e14c935483eb9817603474a86669cbdc10fa4482547b8ac5ab3f qt5-qtsvg-examples-5.15.3-1.el8.x86_64.rpm fbc08cea6cf9f441676ff57ddc1f83801e1bb61c406e5e9130e70f4f39783e8b RLBA-2022:7504 qt5-qttools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qttools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-assistant-5.15.3-2.el8.x86_64.rpm 4786d6a96af720485ec88fdbe3bdaddfa6a61d3d087d56d0c5bc274229280b42 qt5-designer-5.15.3-2.el8.x86_64.rpm b588430701a85e8277df8f757f3e8b4374d8867b9115d8fbb5b903a01edcf7ed qt5-doctools-5.15.3-2.el8.x86_64.rpm 793533bdaf94da8620a691031351a0ac17770ef7e3256e94be2b450afd201d08 qt5-linguist-5.15.3-2.el8.x86_64.rpm 5eff7f0d07543875cfb87014838ee97e538245510cc9574ea9bfd51d8e56f772 qt5-qdbusviewer-5.15.3-2.el8.x86_64.rpm 7e1f1b3baa1205fcac3da36229d869f85839cfbc277dfed7bd8021f414e37f1d qt5-qttools-5.15.3-2.el8.x86_64.rpm 3e61f3b558d79f3a3132909a1ba6e6acd16ded1a93f5bd5dee748ecab73c0b34 qt5-qttools-common-5.15.3-2.el8.noarch.rpm e140fb61b2795542cea5ce5cb0de9bd011de07ba8f6dc709ca4df853d4c06e98 qt5-qttools-devel-5.15.3-2.el8.x86_64.rpm a23ae3009fe541d82308977d2b4b5075f621e055a13d6e664fd29d7e6b1ce2d2 qt5-qttools-examples-5.15.3-2.el8.x86_64.rpm 2d11266ebc3e3d3fc23e27f5bb078ce38b24bf9d569bf03f7a21f1e0ac8e48fc qt5-qttools-libs-designer-5.15.3-2.el8.x86_64.rpm 2c97dbd47aecc3b760b3c2d9284150bed26a1b97e65ac70fd09eb827bf11e512 qt5-qttools-libs-designercomponents-5.15.3-2.el8.x86_64.rpm ff65c962ce9aac0643920b97bba917dc2ca0b543b6abe5ed9ec063ac361291d7 qt5-qttools-libs-help-5.15.3-2.el8.x86_64.rpm f44d75132665fe1e52e6caa7dceb6be280b5b2150187cb8db3f5eae7e33a3598 RLBA-2022:7505 qt5-qttranslations bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qttranslations. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qttranslations-5.15.3-1.el8.noarch.rpm 3016601e5aa44729d1f95ba152efce40c782bf555972e3e918a448f228409c43 RLBA-2022:7506 qt5-qtwayland bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtwayland-5.15.3-1.el8.x86_64.rpm 8769fcd7c04ba583f9aa0c984102efcdd0e5bc577c4c69643b0885163b293c83 qt5-qtwayland-examples-5.15.3-1.el8.x86_64.rpm 330235f622ad7be14595e9ab681a33e0bafab0c261928bc39dba45dbd7e112da RLBA-2022:7507 qt5-qtwebchannel bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwebchannel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtwebchannel-5.15.3-1.el8.x86_64.rpm b5c86d314559448bf51dace12132f8f443f0c120428c4a101d70a4bf25a33be4 qt5-qtwebchannel-devel-5.15.3-1.el8.x86_64.rpm 1976ea364e37d03ec715bea5a4e6e3280c10cf657ea2c518229bd8278f0f3a48 qt5-qtwebchannel-examples-5.15.3-1.el8.x86_64.rpm f59a44f98929e829dad4e3e13e21851b64c8def131f0bc093a78e9531cc1f3db RLBA-2022:7508 qt5-qtwebsockets bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwebsockets. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtwebsockets-5.15.3-1.el8.x86_64.rpm b4d4be2415c4b0e76a3503f8a4c0b18902e7e7a5dc1b1c3162c6f04f64af2b95 qt5-qtwebsockets-devel-5.15.3-1.el8.x86_64.rpm ff3872ded5fcbea63b4e0b5a2d784890a4340d73c577e7b76cd96aa8e8ed3169 qt5-qtwebsockets-examples-5.15.3-1.el8.x86_64.rpm 79320ecf2fb9a33400357523fde690f8feee0b0387b6b0f1e70afe532436fcd8 RLBA-2022:7509 qt5-qtx11extras bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtx11extras. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtx11extras-5.15.3-1.el8.x86_64.rpm 78e2cdb2bfddb5279ebb67065511d1bdf66f319faf4c3e87bffffc0f8eee4f35 qt5-qtx11extras-devel-5.15.3-1.el8.x86_64.rpm 8f6b8ee7473805e8b5626940f0874ba8cbc0a5577052fe7ceaf760782f036643 RLBA-2022:7510 qt5-qtxmlpatterns bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtxmlpatterns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtxmlpatterns-5.15.3-1.el8.x86_64.rpm 1794e993e0845db24c600f3e8c3273016bad7b19d1e9214a8a6afe8b6c54db31 qt5-qtxmlpatterns-devel-5.15.3-1.el8.x86_64.rpm 9441b21ff1425ac34927e4d4d9e559dd4d8f9579977d4c4d5282025d3ff7a42e qt5-qtxmlpatterns-examples-5.15.3-1.el8.x86_64.rpm c19c46e282d2f0415f76f45271d9782ca8ebefffd8143406a755f0303e077eb3 RLBA-2022:7512 postgresql-jdbc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postgresql-jdbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms postgresql-jdbc-42.2.14-1.el8.noarch.rpm ab35417ec6f0de396ecf11645cf9de6898976c6f26623d88af88fabb4129a410 postgresql-jdbc-javadoc-42.2.14-1.el8.noarch.rpm 61475799800b1fa962b38a45a989f4389e499d3f4fe36e601d36dda268f72173 RLBA-2022:7513 crash-gcore-command bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash-gcore-command. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms crash-gcore-command-1.6.3-2.el8.x86_64.rpm c62a9f19df7f7cb1c3c040df142636139a09406b030fdb601071fb30223ee44b RLSA-2022:7514 Moderate: fribidi security update FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order. Security Fix(es): * fribidi: Stack based buffer overflow (CVE-2022-25308) * fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309) * fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fribidi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order. Security Fix(es): * fribidi: Stack based buffer overflow (CVE-2022-25308) * fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309) * fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fribidi-1.0.4-9.el8.x86_64.rpm 140455eb981d3ea0296f5719b1026b29f8e6316caf885301b5607af38483edec fribidi-devel-1.0.4-9.el8.x86_64.rpm faba78d5909ef3519964138414e4eb0d3a72a2b0251d407382b1351e9dcfd1ac RLBA-2022:7515 papi and libpfm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpfm, papi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpfm-4.10.1-5.el8.x86_64.rpm 494bf65d6993e1af506a1289877dee03a3e8acdebdcedc3d56f0e6b175ff064b libpfm-devel-4.10.1-5.el8.x86_64.rpm 0596e3333ad57a7cbfb1eb7205ff0fb33f8eb32b6651eb5962a8dda3c39401d0 papi-5.6.0-16.el8.x86_64.rpm f3e910ba21ae8d8c84fb4a863e4e974a44a4c98136b70072c23dcb041744a7f6 papi-devel-5.6.0-16.el8.x86_64.rpm 7460659d870a675802deb1ae4b0b40a12c7ed26bb6568733a0529836fc58b526 papi-libs-5.6.0-16.el8.x86_64.rpm 923001360211247341c2e32a8aaad2649ce1fe5ae82902426d96f39750724bbb RLBA-2022:7517 cscope bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cscope. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cscope-15.9-11.el8.x86_64.rpm 3780ca8f1158a74d20e09e7290b502ca445d9e9bf09e8335a0d771a682946580 RLBA-2022:7516 oscap-anaconda-addon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oscap-anaconda-addon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms oscap-anaconda-addon-1.2.1-8.el8.noarch.rpm 75bac43c9f12ff5fd2444d0203244762838868a9eada5355269c9e0259a0e14c RLBA-2022:7518 dyninst bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dyninst-12.1.0-1.el8.x86_64.rpm 12a4d57690143e288538a6eb2ae079e312f2eaba2baaaf9e24ae018daa455a7a RLSA-2022:7519 Moderate: grafana security, bug fix, and enhancement update Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348) Security Fix(es): * sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * grafana: XSS vulnerability in data source handling (CVE-2022-21702) * grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703) * grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grafana. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348) Security Fix(es): * sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * grafana: XSS vulnerability in data source handling (CVE-2022-21702) * grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703) * grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms grafana-7.5.15-3.el8.x86_64.rpm 34d4eb252d22d335ff8f1dc3ce270d6e7b354af349860e74a39d430c57b6eff3 RLBA-2022:7520 fence-agents bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fence-agents. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fence-agents-all-4.2.1-103.el8.x86_64.rpm a17f6c28510305c719c3cf348360783fc48c50897dfcf6bf7bf88ca89161524a fence-agents-amt-ws-4.2.1-103.el8.noarch.rpm 3ce7796c1b72fc99bb8b651196b2c66272fb0934eb7a47628935a9680a9ee392 fence-agents-apc-4.2.1-103.el8.noarch.rpm 03b96adcf7b6b23947608429663653d8f36e12bd93f22965b01ff04907768900 fence-agents-apc-snmp-4.2.1-103.el8.noarch.rpm fc8242c43925467482603f14189ccc96392561c7b444d8388dde3e1e9f0508cc fence-agents-bladecenter-4.2.1-103.el8.noarch.rpm 02570e8d92bf5b2f01166bfec7a2d4da4b410b0cd95d6fdf8ae332156891efbd fence-agents-brocade-4.2.1-103.el8.noarch.rpm 73d3e127cdab2dd2678da360b7a21fe7f080f03dc7978d53393d7eb25a2bd274 fence-agents-cisco-mds-4.2.1-103.el8.noarch.rpm 79bba3b89457f2ebde56ff07c236fc499a4a06f308f6250b085eeaae8101be55 fence-agents-cisco-ucs-4.2.1-103.el8.noarch.rpm 9418aa0750789ef08823a0f4629f44d48db5575115ca46b511b97ac8b9c460de fence-agents-common-4.2.1-103.el8.noarch.rpm 5a43c017ed93f80dd71581da79f2ed2851bc48374857f282bc8860dcadc1f926 fence-agents-compute-4.2.1-103.el8.noarch.rpm a18fcfb155cb2742c33a0e837ca3df2f0292e9d1d3eceb8875f3fa972afb15c8 fence-agents-drac5-4.2.1-103.el8.noarch.rpm 9f1faad3b7ed178a698ca70c51279d178d0c22b46aab20081872248580326a48 fence-agents-eaton-snmp-4.2.1-103.el8.noarch.rpm 1271a18e7ad0791c76ff5aad0bcdb31914f26f6f4dc147f77670c52ed29b4632 fence-agents-emerson-4.2.1-103.el8.noarch.rpm 2dc5b8b4ccc72e61f7d073da13341c5d998aac2eb72b55bef70504bea2b7c94e fence-agents-eps-4.2.1-103.el8.noarch.rpm dd323b8c343c479947b93e98b3c71873c3fb8607a99d06816b36e8fe5ee8f3e8 fence-agents-heuristics-ping-4.2.1-103.el8.noarch.rpm f737e418f3b093da281437b9f79dd92d0565f0a2f64c1b0b8a5996df71d704f2 fence-agents-hpblade-4.2.1-103.el8.noarch.rpm 1f979e340c291570cc5f32df9c2c0f6037c251cb0a045d0068d5a67e916adbf0 fence-agents-ibmblade-4.2.1-103.el8.noarch.rpm af3d02b14d3081309474639ede715cd2f7d3f6072641c7d700a6a4b9a3d325a5 fence-agents-ibm-powervs-4.2.1-103.el8.noarch.rpm 42dc1db7cd61928a962b04460470130383607ca82c380a2c5e44ebdadd0c525c fence-agents-ibm-vpc-4.2.1-103.el8.noarch.rpm 0c87a64a71b9d8b1cda74ab174ff8cb613fa19c642c21d4cde321f6b35de84d3 fence-agents-ifmib-4.2.1-103.el8.noarch.rpm 58e6a2fdbe3e9d7194e5403ed2560c6f4edca37a3bbca66ea82d3828b48aeff3 fence-agents-ilo2-4.2.1-103.el8.noarch.rpm 0955ab63e59343c483525b6fa09bcb4954666086029254c44174891167e7089e fence-agents-ilo-moonshot-4.2.1-103.el8.noarch.rpm 24098099cd95d917de58766fd040cba01942f97e9b0509296eb5d25d9a95a443 fence-agents-ilo-mp-4.2.1-103.el8.noarch.rpm 3d4a43190dcb56fc538b3a6e9e349ba747e39929d6907ab8c97f68b90474fa21 fence-agents-ilo-ssh-4.2.1-103.el8.noarch.rpm bf763b2d0385b2e01065b35385b3fb909ac59bf48068495980035eed44a4555c fence-agents-intelmodular-4.2.1-103.el8.noarch.rpm 0b13c96a0375ea1dc5790603eefb34550396d8f59b4c329d12373fede46ee79e fence-agents-ipdu-4.2.1-103.el8.noarch.rpm 34d75540f09eb789898492d8f8719a61fc78bbcaae721b0fe1f42279b3cff80a fence-agents-ipmilan-4.2.1-103.el8.noarch.rpm ea8597775ff0aa34d12de666cec3230117acce02de240758613c514ceddb30c4 fence-agents-kdump-4.2.1-103.el8.x86_64.rpm a2856762f3dc88db905edfc92ab1e6029d7fde90796c1e304f377a225f3b88bc fence-agents-kubevirt-4.2.1-103.el8.x86_64.rpm 5544706a9d2b7aa240ac81883b8c2f01c445a124ae7ab0b5898271d5c1b63608 fence-agents-lpar-4.2.1-103.el8.noarch.rpm 94821479a731808043753d3aa8f1162fda086fed9dd19017268a5b48a43c1dab fence-agents-mpath-4.2.1-103.el8.noarch.rpm df48090184b093f37bcc05d6021c67e9bdb4c66498c1bd9d50b784d7b0710c92 fence-agents-redfish-4.2.1-103.el8.x86_64.rpm 5e65d9e3b9ccb0357a7b0d13bd2102f095a342c4269c016e404fc9b762e1438f fence-agents-rhevm-4.2.1-103.el8.noarch.rpm 55e637fcc0537d56fd2cbf4b3125d77959e0607b6a045cc462be3b408336e03d fence-agents-rsa-4.2.1-103.el8.noarch.rpm 7a7ebcfc117cac222693a822452a0adc7d844bc85aa8a05d377c98e91ac9789a fence-agents-rsb-4.2.1-103.el8.noarch.rpm 238b7b85a8005b6f7b9bed745e26595d0c624ddd322ca03ac5fbd89998f30626 fence-agents-sbd-4.2.1-103.el8.noarch.rpm 9c1889a795da3dfeaaa4dd6191a2740ccf97f5faa7de3924f356fa3529f6f87c fence-agents-scsi-4.2.1-103.el8.noarch.rpm 3f9fe935d6d472a3f979e15511f4426b639f2b70561a45e24755c3c8ba56b55a fence-agents-virsh-4.2.1-103.el8.noarch.rpm 08a3f2ad0be57af41e86cdc0e6509f3857f1e0c63357f086d4714b977bf75789 fence-agents-vmware-rest-4.2.1-103.el8.noarch.rpm 3057ef2b1dd858a1b174731a3cd5dc33cf5ccba2a7dc8d2b0c24273c0a60ef9b fence-agents-vmware-soap-4.2.1-103.el8.noarch.rpm 38c303fb36b35d97d356b657f8a5e0dda0c3b9630ff197c0db53284f48e69144 fence-agents-wti-4.2.1-103.el8.noarch.rpm a2919d9609a4ad93b5a979a1db3ac3741d88527a7058b41d854e9b5afa5c8341 RLBA-2022:7521 tftp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tftp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tftp-5.2-26.el8.x86_64.rpm de51b5d08092f05a1fee9c26441c20c3fce36f76015ea2e14d4b59d16490cf04 tftp-server-5.2-26.el8.x86_64.rpm f408a44bc2cec703d78478ae3359aa2ca95962d644d99f80ec93c8a02bee38f3 RLBA-2022:7522 go-toolset:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for delve, golang, go-toolset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__go-toolset delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm be45db0ede57b9a9918c621811a3aaffb944f36ae3770ac645652983d9c3e4a7 golang-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm 72e59fc43726600f51602f6126e1e9efb12dcdd525b52613b360a91d6e28faa7 golang-bin-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm d7246676585f4146b680bd263905fc30fdbeae6895072b8210a6b31081682d39 golang-docs-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm aad0c28a7e3554ef9114efe3c09f666c373eee0555d496901603c58b355fa548 golang-misc-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm 2323eab968fe9e83c7219b8d635140b28f41beb2dcae9e4034a1517c578afd19 golang-race-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm 89897b9645358e6c32cd4c81afbcc34046c15277fe62873a5dbfe0a8afa79ada golang-src-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm 972eeddab4835df47dd7f5077fa147f82209aa9fcac4c13aa1c29c962d288784 golang-tests-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm 5455050e157f67ada49c9f0a77fdf0b5156786f77980a649d1b659f84c933c7c go-toolset-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm 95b1b435a0fb426600a6538735c5a98a44af71e0fb4de962a6cec1cc1e63a4c8 RLBA-2022:7523 cloud-init bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cloud-init. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cloud-init-22.1-5.el8.noarch.rpm fefa78c128171f878fedba5f9d823e1ee6e0fc435779389c25d0c040d31f366a RLSA-2022:7524 Moderate: yajl security update Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for yajl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms yajl-2.1.0-11.el8.x86_64.rpm daca84d640abaceed94eaa249bcf7f85df19201cb41e1be7a908d4ee8a12534e RLBA-2022:7525 valgrind bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms valgrind-3.19.0-1.el8.x86_64.rpm 3e53250e78ff4505641d6fa1665cc6a8e0a51972017e583191e3be1622f367f0 valgrind-devel-3.19.0-1.el8.x86_64.rpm 6b9ff3fcba5a03dacce33410d00ff6052bfee362e885e4f0e06ef7405c0ce218 RLEA-2022:7528 ruby:3.1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby ruby-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm f4004fc8f1fbe42230b6b849a4f2c487dd17a20acd7e046d1b886ca8adba8391 ruby-bundled-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm b46fe1f1f933210251597c5b927c4e78baa1066f0a0e2a859a898c4f7ebc77ee ruby-default-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm 7c18a028426d5f9b2d86b66097c13afcde26de6a14c116ba951cd208d3979cca ruby-devel-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm c659134bb04568a0f5cad3ea76e2be9194ed247070fcc2700fac4c027e78482e ruby-doc-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm 391d5027e0f209197b0e1d31e841f7c41a6399e1e74eac695f285f02f723f812 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bigdecimal-3.1.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm 975f18976d211bce5dbefe7ee440a278295698833a6bb4d2aa8f059e34de1002 rubygem-bundler-2.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm 806611bac1cab60e9f1c70c67b7e7230acdeda7f88fdf55f39fce4a126144ad6 rubygem-io-console-0.5.11-141.module+el8.7.0+1081+f0a69743.x86_64.rpm d8d1cc2f174f93e306e1632ea97393986e5d8a0a2f793baf916c2690e814ae5e rubygem-irb-1.4.1-141.module+el8.7.0+1081+f0a69743.noarch.rpm 74fa0e47d61a7d62c8b5fa088bf9afa8a98b1e01317b8964c43580d3dfd11465 rubygem-json-2.6.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm 00bea2d03d3884ba228fc716df85e81537ceaa4fd80c67a514493f2bf83cd46d rubygem-minitest-5.15.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm a34a35947e355bc829b933b39727c62727328529dda780d5722a6b928ea63e9a rubygem-mysql2-0.5.3-2.module+el8.7.0+1081+f0a69743.x86_64.rpm c2c8f820300b260bbe21037c29d089b5c685d944baa6c9a33f992de1ab7ef3b5 rubygem-mysql2-doc-0.5.3-2.module+el8.7.0+1081+f0a69743.noarch.rpm 39cf4908e356cbe0c00cb912ed37adf012ede109ac04721c631bc82efc020c6f rubygem-pg-1.3.2-1.module+el8.7.0+1081+f0a69743.x86_64.rpm f08ddfa2201801ae0272d077d8f5ced1fdf3c416bd330e5569710739be04ca76 rubygem-pg-doc-1.3.2-1.module+el8.7.0+1081+f0a69743.noarch.rpm 959c9b529e593c5c51bd65597a55335cc9acb3c13ded0545b022d44ba45e7b4e rubygem-power_assert-2.0.1-141.module+el8.7.0+1081+f0a69743.noarch.rpm 1cc6ad1c8cf12f603a078784250d368e5444e231ba4e21e87d28f19dd7726d85 rubygem-psych-4.0.3-141.module+el8.7.0+1081+f0a69743.x86_64.rpm bb252b125709fa8b52739a2c8e948567e15e6b8887c0cc4f5650f26d2d38f8e2 rubygem-rake-13.0.6-141.module+el8.7.0+1081+f0a69743.noarch.rpm dc465a415b7c7f809635738dc7a89e08d974e34fd5a8ff578265a460311ee4f2 rubygem-rbs-2.1.0-141.module+el8.7.0+1081+f0a69743.x86_64.rpm d51cc0321fbd69dd43120d6b872f026d9cd5831dec96aa50e96df871a0edb4dc rubygem-rdoc-6.4.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm 266282d7a1fe1d6f7b9a8720e84d96c637795ed62b4c7b7986f41c3cf270deaa rubygems-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm ed88a51b43339ffc8199bc9b8c4ec1756ed1a702bc936bcb980cf648e5785b4d rubygems-devel-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm e625021ebd94e59dbed04148f68ce9bb7eb49d39e3359054de0f8f8e4f11943c rubygem-test-unit-3.5.3-141.module+el8.7.0+1081+f0a69743.noarch.rpm b857b6b967535592300725d3e6cde4a4a62549354903c9a8445132d3b7742209 rubygem-typeprof-0.21.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm 35b740433ac48b0a64d2c83dba9d6cbcf56a9e18b9238285c48a17a2d243b556 ruby-libs-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm f313a918d61bd5ae15f35483b3ee33f9ad655bf1c4467de40c205fb9a86c0565 RLSA-2022:7529 Moderate: container-tools:3.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 08f071670fe28ccd63e3840c62819c2b25d38d2287c3b63605626114e544a6eb buildah-tests-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpm fca90c4be12b6d3078b7d6d682abe4434fa6d956f655bc1731879a67dc6c425c cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3af0efabcac69789ce47fab592ecc29899095fcc2be8f8a6201db544376bc188 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b containers-common-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm abc291da55ad2008cc79640586a2576695de84b8e44f1c5e48dcaa247a689cc0 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 podman-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 110128fa91767a24299b7b40ea77ad98ccb477c231150e66c88370e3ea47c249 podman-catatonit-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm a14d125bcc99bcd1c40e8a2cb27780e523c46a358f60cace03f148289f3ab0dc podman-docker-3.0.1-13.module+el8.7.0+1076+9b1c11c1.noarch.rpm 13c17400ce1f7fd5be3064d31fc6df69484d37c18170fd99b6678f3bc8d6a3c5 podman-plugins-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 6e9b5997c40ffd4377bcacd10528f1cc38441c04d0afbecbb192e5aeb29c271c podman-remote-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b4a1ed3a0c0618e372a5cf506864b6b336f186190d9016056a979d46bcf4847 podman-tests-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm bddb7e274024806035e7a1e8ca34d2716099d36084975731d99de1df93264289 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 skopeo-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 2d660e8c7f3942d3f67cc57ddbf24728bbe91c63b10954e46d93171785575532 skopeo-tests-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3aac4f2b10e39dea615da0233a32a6be25ac7294fee165483e1e63c5ceae577 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2022:7530 ansible-pcp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-pcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ansible-pcp-2.2.5-1.el8.noarch.rpm 43bcb96ad0f1f6b4ae28f31ff13c54cd6825024d27c1c919c25a3a6faa39194c RLBA-2022:7531 evolution-data-server bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution-data-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evolution-data-server-3.28.5-20.el8.x86_64.rpm c567ccf699097288b1861e2d0ffcaebea3ea10b9508af5d7ad1c84c4a7639db6 evolution-data-server-devel-3.28.5-20.el8.x86_64.rpm bd6853c427551bbe5935caa4eea7b54008a050b4567457d16fcb71366cd50047 evolution-data-server-langpacks-3.28.5-20.el8.noarch.rpm 833711b12ab839728adbb252c686beec45f3cc36bc29df3544cd83d9d159751e RLBA-2022:7532 evolution-ews bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution-ews. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evolution-ews-3.28.5-13.el8.x86_64.rpm a7c0a8ee534fa31c5b6c06f92db8f26259f8bf9eb6b2c025dbf3e145dc84c545 evolution-ews-langpacks-3.28.5-13.el8.noarch.rpm 869590768476b712d0edec973c5345e50bb6fc0f89ebdb8033adbce7e151af6e RLBA-2022:7533 cheese bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cheese. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cheese-3.28.0-4.el8_6.x86_64.rpm 1cd8f7b5f5f9888477b2bcefcb93b5be066a6590b2c641568c3f6181b6285412 cheese-libs-3.28.0-4.el8_6.x86_64.rpm dd228cd48876d9151169a9ea0a1a7038423436c278231b7f41c1acc0fd374499 RLBA-2022:7534 mod_auth_gssapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_gssapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_auth_gssapi-1.6.1-9.el8.x86_64.rpm 59074b8ba68426e1ac78f601751ae94a3e7346d77490e26d283cc0e43456b588 RLBA-2022:7535 stress-ng bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stress-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms stress-ng-0.14.00-1.el8.x86_64.rpm 09e5fede907ee0ee3049dfa622b48736b808198032227dcf05bf1ca2a911ddf9 RLBA-2022:7537 llvm-toolset:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for compiler-rt, lldb, lld, llvm, llvm-toolset, clang, libomp, python-lit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__llvm-toolset clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 4019138e3c053013c923f5b29f8f3d8d6665f4bc966553b1722eeb52358105cb clang-analyzer-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm c7cfa90b4b5f897410dd6604f91d5cfd06d819898b250ab482c753eae78b0c5e clang-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 32adf389fd14a400c7714351b91ec01d22d2b7df50c66609f2017855d5313ef7 clang-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1e9ae8c22585124989957376e435e92ce7a611f9daaa4a6b884b91f08e4f91ac clang-resource-filesystem-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 570e5e123e4974910864f4b56d333412341822f894bc90a416968a0cd0b79487 clang-tools-extra-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 9683b2d54e15e1273295c2799595215d7e4019716f54a130eaa5285e5aaff13e compiler-rt-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 905b2cc701a2f5785c66604609207bb95341c6a02281d01db8d402aa02688a19 git-clang-format-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm f36b25e63fde63ec7bf1aaa3ca23afd3ddfbe58d94445462370fad7df7abc402 libomp-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm baa0ee79ba1778f3f7f8b0002202d6f10bfd9b62fc4556a642887ee14c3ff543 libomp-devel-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm 8d2a2f4aa8c374c2769dc4bd7cf93dc52e2a2a5b2791a9498db42669772ef424 libomp-test-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm cbb90c4dc11520376ced98704d10028185ad9002dbb7b23c664b803b7db2b2ad lld-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 6761adc0183eb3675d79aedc216bccb6bf03187e7658d323bb8271fe33d8007d lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 648cbc670df222c9909ce2f4b07681ded1a5b574446b574d0e658844101a07ea lldb-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 140e0416e72aa350be3bd1a30189f19121b937f498cadf919bf213ff8ee5f18e lld-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm b3cf3fc434fbccdfd091bf2642dd4453fd31d1a36f30a73370953a54cb95200a lld-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm ac581ec9fa342d38c1661237d260ceff68c8daf89a9cbfa823291cbb804cdd56 llvm-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 025dd2e04a1d7ec2304905d7b86da94d7ffb46c372e72ecf2d91766d25f97996 llvm-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm c86f75512c19a0afae71e4eaaeb9e09613df6c8b00295c6ad01b6e89cf20fbae llvm-doc-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm c1be87e9a4dd7357f46fde9d36a86c311dce9162b400d08db28eb44a59d5b659 llvm-googletest-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm e66365da6dea97c46700dda219e87d2770be98f57b07cb687a3b96955a8be915 llvm-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm db3cd9ebcbda9282c40e20386e21a30ebf6d178592284ddc2f4a86962761fd0b llvm-static-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 39e1f7fa0779fb638208df74797475233aa11a53a02a342f8ab820fcd2713983 llvm-test-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 436b8dca43fbf2daf6065a807d9a4f5036d71f8cb3b4e98e805509329f2021da llvm-toolset-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 698737c91866add724a82bc2b32e6793a7e4ba02fd11d100f4ed132fc59dbb48 python3-clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 8f99ba21f59cf14ff807ae1042b5ffd06471af728c2a7dd0bb3cf0fe70d0d9b7 python3-lit-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm de725c08eeb03c1304d6cb3942294deb8f5e2c3473cacc6c2d5e77c54550d2f0 python3-lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 365f752b0027d7cf9015fb9ddbf566777801d9d12348801b4a45fcc9d2889d29 RLBA-2022:7536 nautilus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nautilus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nautilus-3.28.1-21.el8.x86_64.rpm 11e67d5eb29255f83fb1a0372e062574d29d28288ca886f009b7f9ff6286c20f nautilus-extensions-3.28.1-21.el8.x86_64.rpm dc186b11c5054e93db20cc7e3fff78501893fd9296dd7928b46ec4d42136f47f RLBA-2022:7538 systemtap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms systemtap-4.7-1.el8.x86_64.rpm 8d56d3f7f25b1f0ab7989ff2aedccda102c6373c51d80a97c006edf9c4e3c8a1 systemtap-client-4.7-1.el8.x86_64.rpm 94c0288987480045fb0360a19e6d57508930feb1357b047c75317cbc59e83bc7 systemtap-devel-4.7-1.el8.x86_64.rpm 3e3173bc5da8e298e2b65f563bbfb017e313d582a7d2f656c2d8ed7719c37a3e systemtap-exporter-4.7-1.el8.x86_64.rpm efacdbcf9a4f2a485bc1eec0673086181fbb3033311917ba6dc8e15760f3ad9d systemtap-initscript-4.7-1.el8.x86_64.rpm c53ee31c2b1b778c4b0a2bdcc1f177c2c9992c1f34f0c9137c0ff1cc67d35c0a systemtap-runtime-4.7-1.el8.x86_64.rpm 40c542c53113d9bdd6da664e1ba4c1299c4c0ba3615499bc6dc376c52046a0b6 systemtap-runtime-java-4.7-1.el8.x86_64.rpm bf9152e68d8091ad35919157a52cd06d3546b3cb64cc85832a682cfeb3f463d9 systemtap-runtime-python3-4.7-1.el8.x86_64.rpm c39170333c363e4789894a8989db4965d986e1fb8fc9236f1ea189b8b2bf9ddf systemtap-runtime-virtguest-4.7-1.el8.x86_64.rpm b786f6bd861b7a5d8ad4c754587ffa696942aebc3792e0e65bbd1bf70cb0b75e systemtap-runtime-virthost-4.7-1.el8.x86_64.rpm 3bff66eb561bc80457981900ea1af095cc3047101321b009910b86dd475ed28b systemtap-sdt-devel-4.7-1.el8.x86_64.rpm 5284d6c6e5f93880d0520b6954a4e3401bca1be7dc8e492280105760bd21c905 systemtap-server-4.7-1.el8.x86_64.rpm e51f53c8099209f335ec89005182df88b9a071b181c73a1b1bc441fdb61d7487 RLBA-2022:7539 libgdata bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgdata-0.17.9-4.el8.x86_64.rpm 75d4aa16927ac0856e33a7da1df09d7f51c39b0a94d686e5172c151e2935e090 libgdata-devel-0.17.9-4.el8.x86_64.rpm f627bf3a4956c741c8ee7e1a6be9a5ab9bde87a9e139cd42d78fbdac26368fc5 RLBA-2022:7540 idm:client and idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce ipa-client-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm 0f015ca9126dbf6adf72e89def936c93720d13bd3ab39996a07681cdb1e6b968 ipa-client-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm 5627c47f2914e7189d0ec801e8d67e9c32ebd02b79728197995f6d952274d6df ipa-client-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 479f6dfb3c17e9ddd5e6dd9eddc39dc18b22f2c1a864a9bffd6a016f58746853 ipa-client-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm be705b636f081a46557f91a42295f0b6723afc20e6d6a857801ae5de9a50c916 ipa-client-epn-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm 89d738551a9170fcc56efe16ed2266831877c8de1d6fc8b636920afb52a22826 ipa-client-epn-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm 16f5cc61defc5d37520dff7f5de7040f82348302fb8e08991f54dde571b6c5e9 ipa-client-samba-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm da345ecd063a748b18217785da5198cd2c19e3a917c8ca0b4107fc2c11db3b37 ipa-client-samba-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm ec80710ad400a4e43d183499f085e9a737e1bdd47ed4a1ff1b01c0eb0711b90e ipa-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 0273528be5542e496c224410b196f75f80c96cccef8aa50fe877ba3fd6f4eb67 ipa-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm a484042a3bdaa281429a752ceddc62c907108424d45d26dfafc0b825f3ab30cb ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm e273335ad4d42c167d380d2367e199f7b7df5b251a42c3fea602770a842f11d2 ipa-python-compat-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm b5a9bf5a66ec43167636748169c35dc08ce9a994c75d086845122b4e0e0a5963 ipa-python-compat-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm f35a45b4365fcd63d1b76dc7435583b46cc62ba801cbf6bca35424fbbfe4b134 ipa-selinux-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 99e090241440e24a10743a9d147cb5587ea5070d5f2c80010f084227978162c6 ipa-selinux-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm e6840a613c1508d6fe34ec27f01393023c1f544dcd1dc82ae94fd948b4726418 ipa-server-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm 980b7ef4cf9445bb17abcdee681a311357eaaf62a14e927998807201360dee40 ipa-server-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 37ce4afa670d0d9d679469784430214a26a99e4467f44bf95f9bac93a40981d3 ipa-server-dns-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 0ac3f88ce3777ead8b97da89996d655031feae8f763a133333d2dcfd18f01fb8 ipa-server-trust-ad-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm 62e27f55b52932cad8b3fc8b029753ae0b93cb1a6dc16e1975d7c62c9cd690ff opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-ipaclient-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 3e7844d1fa36ccc39d5f9445b6cc262109f335700db911876aac545604841291 python3-ipaclient-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 53738c5f9fa3149863f05ebf49f004a74c3d178d9bea2ee0a13403c8391a473a python3-ipalib-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 67ea7a4ddb5203008f69586b9ddeef4deb164c556a4d97d00ec7ec4f5c78e426 python3-ipalib-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 04143fd2b11a26b201ca14442663c41ac21c00c325b41cd7e911da5f531506c0 python3-ipaserver-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 92eac700748418bf37fe61a1068837cf4c24c2dec304f4f62a283dbdd9a91aad python3-ipatests-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 81e12d9e93633047cda161a6b096361b7a521cd848f545b83022df803cbc7230 python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpm 614fd471d5b1912f23791f8b533172d92d1c6b27d504b4a900180f83d7e8c37f python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm c5f6dfd01f04862214fa2f092a4574889d903e9a081cae92ead60cc020557baf python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 python3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm 94698890dc8f5935b11ac8d3e2cd070ed0095cbff39670a6a09638b03045452a slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2022:7541 Low: redis:6 security, bug fix, and enhancement update Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873) Security Fix(es): * redis: Code injection via Lua script execution environment (CVE-2022-24735) * redis: Malformed Lua script can crash Redis (CVE-2022-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for redis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873) Security Fix(es): * redis: Code injection via Lua script execution environment (CVE-2022-24735) * redis: Malformed Lua script can crash Redis (CVE-2022-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__redis redis-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm 993f80907022da689b54d819c1393c56e94702a0bad0edaeb5517a2db1d874f9 redis-devel-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm 41aaf2f81f3473eefbae0eaa3f6d923b5886dbd8f1517b4d3d3143387e41f404 redis-doc-6.2.7-1.module+el8.7.0+1105+8815ce78.noarch.rpm 7bfd99fe21b4a2ac911ddc70db22e0e4bc0ac484a0760bd596fdf3a5daec8524 RLBA-2022:7542 subversion:1.14 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 731bbe79595f494e581798261d3910616e1bcdbae2ef7f981b215453cf5af705 python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm b9453a4cc7f514c6b5d4fc9635d55f1cf4c75dc38cb5f774719646b8d4e57001 subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 2089246938eb318f05ba38eeeb5cbba0cf766f9b1d2add194ed624c6123087f5 subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 7a0b71de12a9a00fa90c466b489c01106b0efb79cb41ff2eba7559ae09236461 subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 117b77bc021f04f14594b64923ba7fc5d339150c0c18bcaac03c2830da8dc238 subversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm 911dd1adbc2b2cac43e6114aadfc7a825121a1e4211043c26c97549ab1495e75 subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm e08caf8753168202fcb5ed6b9c38e8bb3897bfa19054afb1746cd7ea65d6fd4b subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 2f746f1042536d1ba89f58dfb7530418fc05f4c86af692b53a40239cb12a83a2 subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm af4c11a20b867799fde5ed6bf4dfb553c6904e4e9c46a1824273bb52354920a0 utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpm 58848ac20523ce7eb107a8b9ce747474ded2c3f55f12f1f6c23511e45c735e6b RLEA-2022:7543 subversion bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm dc6f52adf8b10fd6b240c72b5ea1d62e0bbbe3d5bcc47380339117fc1953eb3f subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 802bbeaf38639b1e42096fab308cf1bf8efe3df3a1b3c3720b7a5ac3939b7265 subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm e5c5a44c338f73bb0445575d27aef6a4b1a7d1ae1f7246b7bce10b6fe5782f47 subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 152d3eccdd9928c4d97f5a47117cbd0d224ae5b7c9886e3cb0414f645ad85d82 subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm 173765bd35da01cbad3cba259410b0fe81e32cfe2efb3795e435403fdf4029e5 subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 1837382796e426c99566575486d20468e5e08d54a9feec23a37f37664c105dd1 subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm c019433f83ba3f54fb215c6f1a57e182c582f2f7b5aba6659278fb65bf8216cd subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm a181eeabc6eb2ac08c26cea039b8776703ecd01ee9af67eeddeef97c3765418d utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpm 58848ac20523ce7eb107a8b9ce747474ded2c3f55f12f1f6c23511e45c735e6b RLBA-2022:7545 zenity bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zenity. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms zenity-3.28.1-2.el8.x86_64.rpm 77daeb3134ae0280c77c265cca49f6116c1390eaf3b1c5ff3f0aa910d1a4b54d RLBA-2022:7546 createrepo_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for createrepo_c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms createrepo_c-0.17.7-6.el8.x86_64.rpm d828fa1173d6e0b69249da5c965b6ba3cefd303fb390e485c768f4c540e044c0 createrepo_c-devel-0.17.7-6.el8.x86_64.rpm b1cfbe29d70723acd0b6d83293a4c66c85c78f82c8db6abf5d57b4b771e0bf43 createrepo_c-libs-0.17.7-6.el8.x86_64.rpm 035cc734eb41822da21c95e6216047da87841c6e556820a07eeb3cc719b0c6b2 python3-createrepo_c-0.17.7-6.el8.x86_64.rpm 16e83c095a1c3a4654b4ffcc714e7e93fb5c93a626f5e6199116f082a4357b62 RLBA-2022:7547 gnome-shell bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-shell. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-shell-3.32.2-48.el8.x86_64.rpm e50fd5ed905dde25ae8c673f919534cf9cbb6c339dc177b6afa62173acd319ea RLSA-2022:7548 Low: Image Builder security, bug fix, and enhancement update Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Security Fix(es): * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for cockpit-composer, weldr-client. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Security Fix(es): * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cockpit-composer-41-1.el8.noarch.rpm d7bfe1373b85cd1f91ede9e66071d02acf3fe71c634101e92a2c5368adf4a546 weldr-client-35.5-4.el8.x86_64.rpm 19c8b20aab31af7a43f7ce7a80a348a686adb340b65afda7f6c4d83d25da3485 osbuild-65-1.el8.rocky.0.1.noarch.rpm c66df858d97a7bfb6f08448e4b46dd13a87129c13124b70e0b79ecf303061d11 osbuild-luks2-65-1.el8.rocky.0.1.noarch.rpm b666d99dc28d5a4d23f638ed26fc488d9700c2ac1eefcbafc8c751baa0ef7d9c osbuild-lvm2-65-1.el8.rocky.0.1.noarch.rpm ffbb5b12367dad592e26541798c773fc6f1229d6d19ab5c58664679d3f0e4cdf osbuild-ostree-65-1.el8.rocky.0.1.noarch.rpm 70651b8c479985e20ba1cc5131079bd742b7e5b4f898597bbce44010ba4aa7ec osbuild-selinux-65-1.el8.rocky.0.1.noarch.rpm c16458f41f87af49f4d67b8d92393feb069f7981efcca5383010db929e9f8666 python3-osbuild-65-1.el8.rocky.0.1.noarch.rpm 2d29649c59f6c1fae6565113431d1e679689b229b930a6da00f1d3e4d83ecdf7 RLBA-2022:7549 rust-toolset:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rust. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__rust-toolset cargo-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm e2aacb62b0a04d09e65f77eb3e6956c748376c05f6256ba7280f11242641aa8c cargo-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm d5cfc7511803b28817230db889f64b64da8c8a85a7cf37a15d52ac0bd115089e clippy-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm b55e65d264a1edbf17dbdad814cf6d1f0c5d4f2eeb74f2fe3b544b7b8696ab5b rls-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 9292c0914637091ccfc4548010a93309190976fbafabac36017f925663261924 rust-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 597b07fc8c22d4eaab9d77ed221630f5c150dde5294dcdba7bab4016ed400129 rust-analysis-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 9847d19de31f87f39a3e468cd7dc83888b38031bf3392fea1421bac0c39b9dfc rust-debugger-common-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm 4192226b0a6cc7cf738391a14321c835225f3731b1b8fd654010475cab0a3aed rust-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 05711b5b03f2ce3d391815ff403527b9b4e60fe998d3be1ee6028688d2efa1c0 rustfmt-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 616c1c9558c7be14424a13966220a074edb22bbf1182e1a97283cf5d8b322054 rust-gdb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm 9b6abf4b2d05d55c5bf242364e319d0b04ed9d27ab6119ab0430bca381ac63bb rust-lldb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm a6c8e4cac0b76628ed2d5295bad5d5c149c45f046729c146e6d6dbf2a252edfd rust-src-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm 943a8bf08f99a073fdfc258b588cbf9bf6690cdd2987551ae03fdd476086e7e8 rust-std-static-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm d52db076d0134d47baa62886125b1f01002747e35c1f68f533234f97f444edc2 rust-std-static-wasm32-unknown-unknown-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm af938bf001ff2a4eac39304861b05bfae61be186e5216dd9e618f6c58f208a44 rust-std-static-wasm32-wasi-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 0e339fd20d42a84dc580f26aa49abf344a75c21ad438cbda899da6f81551cf3f rust-toolset-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm f322dd661282948b26c683217b23d22ddfb41312c27b9afd50e8b9ca9736d462 RLBA-2022:7550 gcc-toolset-12 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-12.0-5.el8.x86_64.rpm bb3bb847cad532741692cd6ee4aec06211ac3813583ac942506f14de75cd4492 gcc-toolset-12-runtime-12.0-5.el8.x86_64.rpm bbe5cbe4d6baa144f7ee3b6e9da8858b68014eb39b1bb695e7cda3202627dd7a RLBA-2022:7551 open-vm-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for open-vm-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms open-vm-tools-12.0.5-2.el8.x86_64.rpm d83ff8d9a0ee44ee88557c14e9d0e0ba1f914c46156a3b7a72110c4c75d4e18b open-vm-tools-desktop-12.0.5-2.el8.x86_64.rpm d26ad2544eed14cc8820cd48dcf587e2297bb23b69453540f39594eb1ccaf93f open-vm-tools-salt-minion-12.0.5-2.el8.x86_64.rpm c480803dfafaea1e468ec9fc6abaeb0ed847e4bc9652ab0c2d3ed6bdcf24a83f open-vm-tools-sdmp-12.0.5-2.el8.x86_64.rpm 1edeea21be29003c5601fd52c98b39935890b33f5cd60fa27f28653260b6369f RLBA-2022:7553 nmap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nmap-7.70-8.el8.x86_64.rpm c7cc616c87e54be47898034e3444f285fbc48dc1737a35c08e1ca53b580355ca nmap-ncat-7.70-8.el8.x86_64.rpm b347dd5a8f73d8a60b1cccfc7430f170ad6cdb62a21fc992bd9e9bfcd7f62763 RLBA-2022:7552 389-ds:1.4 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for 389-ds-base. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__389-ds 389-ds-base-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm fd4b8faa3537e6c1ef532c877e223a0352bcbf54a5b9b45b7436afebd70bc5ef 389-ds-base-devel-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm c85f42e199ab8b7796366b25ac528cff406ec413dcd43e67ebb60d055b867969 389-ds-base-legacy-tools-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm 0fb9e7794dd320934e292c19fba27baef221225ab2b85d3f635ecb6493822fa8 389-ds-base-libs-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm 90b0f1fb9776623272a2c53715d6be6c6bbc0a1baab67d9618c10be91668bb65 389-ds-base-snmp-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm af40980abeff5a461d09cec4b5ed13facd6771a658af746f29f71348b2fdb60b python3-lib389-1.4.3.30-6.module+el8.7.0+1060+852806e7.noarch.rpm 01214606f2a6a7c6d1bf17fff3b1de0cead7e9c170d7161733e620766a744bf0 RLBA-2022:7554 cockpit-appstream bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit-appstream. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cockpit-machines-276-1.el8.noarch.rpm cb65ac78dafa8d93335587d0d7c1568e4025a79575fcd43bf0a7d4a93296dcdd cockpit-packagekit-276-1.el8.noarch.rpm 41f18cfc41073c69c14a5be37f22ee6143ec87dc812b7083489fc3886a5ee4e2 cockpit-pcp-276-1.el8.x86_64.rpm 724958dd3523c678b448d672af28f3414cf897a54eed5e1d95b308dbd24ec64f cockpit-storaged-276-1.el8.noarch.rpm 9f2a640e294af651a88a7b05476cdaa8b2c4cd723cf41cb32cd54b601431241c RLBA-2022:7555 osinfo-db bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osinfo-db. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms osinfo-db-20220727-2.el8.noarch.rpm f02e51bc7125ee294eb4868d4b7b2fca55b41675ca738ee459494b2d5335c6bb RLBA-2022:7557 ostree bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ostree. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ostree-devel-2022.2-5.el8.x86_64.rpm d9cf6e883b8e44fb17e72fd716130ff67e206778409ea9c95dc624e57d693da1 ostree-2022.2-5.el8.x86_64.rpm 6470b17fcf53a73a65c26431776bdd19a96694fc30153338c34f37c48f71d821 ostree-grub2-2022.2-5.el8.x86_64.rpm 6d647b18115b7a3b11910ec40e37f01da98a46f6cab9c2b18667930f6c2b70ab ostree-libs-2022.2-5.el8.x86_64.rpm 1418313af255a42d78576f3469a52569a8f3714f631f830d7327af87e97d9429 RLBA-2022:7559 lasso bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lasso. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lasso-2.6.0-13.el8.x86_64.rpm 5db64309da2504980bd16ab3f66dd92e05db01b6cf53e6d5303f3fe3794f1c26 python3-lasso-2.6.0-13.el8.x86_64.rpm a48c00e1bbe40437cea54bdb5110ab9a69fc60270c404e1ba36bd27ac62f09d8 RLSA-2022:7558 Low: wavpack security update WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode. Security Fix(es): * wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for wavpack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode. Security Fix(es): * wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms wavpack-5.1.0-16.el8.x86_64.rpm c6f564012bcad071e357f40e1fe440d2450dce3d861234012db5a202195959ab RLBA-2022:7560 frr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for frr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms frr-7.5.1-4.el8.x86_64.rpm 40349304cec6cea14759a270205c06b16524aab130b788b6dc1b76e078e85ffe frr-selinux-7.5.1-4.el8.noarch.rpm 1b12bff8d2cd3ac2e31220ed59bf3d6cfe101821e1e7a731dd03584a9ad16fc4 RLBA-2022:7561 crash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms crash-7.3.2-2.el8.x86_64.rpm 38f279bf1df01be9e2748c6e471e0bf5a567a59ef29c7d5480e5e129adf6f8d8 RLBA-2022:7562 mariadb-java-client bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mariadb-java-client. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mariadb-java-client-2.7.1-2.el8.noarch.rpm b12d6e24639f571185cb4e7dd799f25d24b080c106afcfe90f47043db27f9573 RLBA-2022:7564 gdm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gdm-40.0-24.el8.x86_64.rpm 5209a4abbd8ef0be8f1f69de8cf1aa055cf62e89887c0820d5c7460d3bce1135 RLBA-2022:7565 gcc-toolset-12-gdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-gdb-11.2-3.el8.x86_64.rpm 113e65b0dec403e8d27a46c7614e0d52cbaa8ba67d219a7584d27cb96e3a4389 RLBA-2022:7566 kdump-anaconda-addon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kdump-anaconda-addon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms kdump-anaconda-addon-003-8.20220519gitffd365e.el8.noarch.rpm afac980b6ee480376777f6219d6257898213268326d399f54ca97d716421a13a RLEA-2022:7568 Rocky Linux-system-roles bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rhel-system-roles-1.20.1-1.el8.noarch.rpm afa41c37e83245af98b4cf2de70cbff146ab3098d215861487304b25ccfa2962 RLBA-2022:7567 evolution-mapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openchange, evolution-mapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evolution-mapi-3.28.3-6.el8.x86_64.rpm 7f231b19829cf1654fa538ebb26420543f4afaf10fc28342c9dc46790c17a214 evolution-mapi-langpacks-3.28.3-6.el8.noarch.rpm 92c162bdf2086d3155879a8959e1609ec8c866583c7ca466db05210440fb789e openchange-2.3-30.el8.x86_64.rpm d360ecf50110f43847ce2928f60ce179feab205b108d75c05efe0e4cdbf84362 RLBA-2022:7569 gcc-toolset-12-dwz bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-dwz-0.14-2.el8.x86_64.rpm ec341f65c71d9195a1cdb04667c4a918343269a7eec2916e770e26c5a8891e4e RLBA-2022:7570 gcc-toolset-12-gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-gcc-12.1.1-3.2.el8.x86_64.rpm 5f036e6fb65cae4c6e167c2689023e3829260ae53ee5eed33eaaaa1549f6853d gcc-toolset-12-gcc-c++-12.1.1-3.2.el8.x86_64.rpm ff3c8e494a47328d8b81142cde56486cdee179aef1627015f538b28afaf3d533 gcc-toolset-12-gcc-gfortran-12.1.1-3.2.el8.x86_64.rpm dcd4889891cbe7e92a591f9698fb865a74fff7e2163015e2dbd8fcc69a7ed761 gcc-toolset-12-gcc-plugin-devel-12.1.1-3.2.el8.x86_64.rpm e105fc2a8b63133b835544259e25d89cf005e78f9f3ca67f11d0091c3dc181ba gcc-toolset-12-libasan-devel-12.1.1-3.2.el8.x86_64.rpm 04a5c62c5052f74f31475db17553ab88f39815d74d1011733396dc7418901948 gcc-toolset-12-libatomic-devel-12.1.1-3.2.el8.x86_64.rpm c2112498e3675685653f75031aa2db6dc146cd168fd0784cad59a291858fdd0e gcc-toolset-12-libgccjit-12.1.1-3.2.el8.x86_64.rpm 844e43a44a05f61e469a7a6f329f260c76759af94ae2887ef9e95e194236de85 gcc-toolset-12-libgccjit-devel-12.1.1-3.2.el8.x86_64.rpm d5376961ba53bb5cd32ae4a4c045b76e7624d2646b2d8a38c962c246eecfe129 gcc-toolset-12-libgccjit-docs-12.1.1-3.2.el8.x86_64.rpm 39eb2a4794ae978a24c235dc832738ee081e0a7f9a20fe2fd47d72959a7f0b20 gcc-toolset-12-libitm-devel-12.1.1-3.2.el8.x86_64.rpm 8d8f6a9da3763dc20c3c10290992837e3700b8d43304ef190d4ee7c1979cdb20 gcc-toolset-12-liblsan-devel-12.1.1-3.2.el8.x86_64.rpm d78f4e39473a53250d264b7a036ecb0ac3a1b6a96e2c1d0f50c7023d34ca658e gcc-toolset-12-libquadmath-devel-12.1.1-3.2.el8.x86_64.rpm 28a06382e87a7cae81b765c06a0fd1983d35e4f7c88dc805b0770f8e429b16ac gcc-toolset-12-libstdc++-devel-12.1.1-3.2.el8.x86_64.rpm 56afc0a2684b3e900c5f285c85676f37ac205aad636fbbcd2847266948a8058a gcc-toolset-12-libstdc++-docs-12.1.1-3.2.el8.x86_64.rpm e637572b30d1d1a8e6db6c777e86dfafa79abe24df5466d72cc18a4e3943a1a9 gcc-toolset-12-libtsan-devel-12.1.1-3.2.el8.x86_64.rpm 1275294233303e79d66a11eb356125b64f52d145cfbf93ae8dea363b162f7e4f gcc-toolset-12-libubsan-devel-12.1.1-3.2.el8.x86_64.rpm 9ce1496e0e9aa163826496d9d8318bd09a60ccfcf110a7bd8bc94257814e033b gcc-toolset-12-offload-nvptx-12.1.1-3.2.el8.x86_64.rpm a909abaf339eaf0284fed8e9bb42e9e9956741cb3856097e2834ffe997143290 libasan8-12.1.1-3.2.el8.x86_64.rpm 3ee84fc5ca2c33cb691553ab75a03bdc2d025c62e2b10a899645783673603f6f libtsan2-12.1.1-3.2.el8.x86_64.rpm a2d5ba8622e3567c659ec0b9e5f4ab52c16ed69196963fd7c28f1af66f01db8a RLBA-2022:7571 gdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gdb-8.2-19.el8.x86_64.rpm f1e95f9044f66c46c5993e65d2523a747bff3d68c8604faa755782621ba20b61 gdb-doc-8.2-19.el8.noarch.rpm a5cb96d55c9ed35cbdd66cfd69094b735ec8779433a2f8c6fef748aa81523063 gdb-gdbserver-8.2-19.el8.x86_64.rpm 814ae1ebe3a48cb22f6560523d00abbf64a6639dedcc9264b020dd88f966ae94 gdb-headless-8.2-19.el8.x86_64.rpm 8b56d064df49f1c40fc59c0d4e135adc0dee8468d858156db5a97cd530dae191 RLBA-2022:7572 python-rpm-macros bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rpm-macros. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-rpm-macros-3-43.el8.noarch.rpm 7279373c1134dc6b6cb8ce672a412ac4612eeb88fad59bdbeb5a443227dd1701 python-rpm-macros-3-43.el8.noarch.rpm ad078c6aa5c5c87877398479a751b5d9fc9eb50f9e31732052b2e4b632a08f5a python-srpm-macros-3-43.el8.noarch.rpm 39993310e90d3cb12a8c8de11906ee08fdd67f8a5791a530366ebeebe11b8457 RLBA-2022:7574 rig bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rig-1.1-3.el8.noarch.rpm b1c77e8a68fdde3ce5d93decef1f8521b1570f8b1e54fc3aacc303b9808a39d8 RLBA-2022:7575 tigervnc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tigervnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tigervnc-1.12.0-7.el8.x86_64.rpm b1230611e255b50351678f6737c1f8492c6b1da51bee071d5d342e0a7be97827 tigervnc-icons-1.12.0-7.el8.noarch.rpm 122d4ffa5aea6b6b5fe506d065052144eb03b99912c49b6455e801cd7df75b56 tigervnc-license-1.12.0-7.el8.noarch.rpm 87b0fe02ecff533d787878381a4da36e22d4d3693bbb5c01ff77d3fa096f7024 tigervnc-selinux-1.12.0-7.el8.noarch.rpm 63f0cc1c4e5b95df906f4c02f07b8cdfa9ea1a3a24b81fcfbc6fc071366a0520 tigervnc-server-1.12.0-7.el8.x86_64.rpm 59c2cede9288429ba79bd7a91edae3f87a5d15b35b48f0736e99a0804057afe0 tigervnc-server-minimal-1.12.0-7.el8.x86_64.rpm c9f6c21d2e3453fbe478ce1b8becc66701e4a08d236867bcd84511412c96c6c0 tigervnc-server-module-1.12.0-7.el8.x86_64.rpm 4af29ff868785ef4a86269a6642378bf677db753842b7238e2d309af6faa0d02 RLBA-2022:7577 sscg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sscg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sscg-3.0.0-5.el8.x86_64.rpm 0db1c510948262c20b6a1ba7c848b0a3d4afac4f0761094362458e22ceff4253 RLBA-2022:7578 pulseaudio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pulseaudio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pulseaudio-14.0-4.el8.x86_64.rpm e1e3f78e4963e6e3064bec42d2e0b94ede5d43f1d4b4c63600350ea20b78b44f pulseaudio-libs-14.0-4.el8.x86_64.rpm 4c725cafcf46b59b2a5d22a5623d6f320a89a4bf3e26a9a36b9b46a6831a3840 pulseaudio-libs-devel-14.0-4.el8.x86_64.rpm b8e962c9c1ee69f72aa7584965ef961f767772cca70fc37b327faa980bd6e572 pulseaudio-libs-glib2-14.0-4.el8.x86_64.rpm 1181871bcec0d4f9f9f3deb1a70a86e7364097002845ce07a8c3b35e25f0b2d4 pulseaudio-module-bluetooth-14.0-4.el8.x86_64.rpm 203c17e03a8109ec0e8c87fb083892a386e95a0ad1652bea8eeba4f9dbf8280c pulseaudio-module-x11-14.0-4.el8.x86_64.rpm 5ffb362c7115ace38214e5fdde216cb1ae23b92e0dccc585fe3c8b03809c1375 pulseaudio-utils-14.0-4.el8.x86_64.rpm 95f025d51b234c77a329bdccf4b654b005d143fa1af6cb27e64ec2eaa1d4b2ea RLBA-2022:7579 cockpit-session-recording bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit-session-recording. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cockpit-session-recording-12-1.el8.noarch.rpm 421b6d20e2ea6ad78f323be68bdb535b53e542b975e5823363306ea5481a90cd RLEA-2022:7580 nodejs:18 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm ec2f3e9547f189b1ac35d0ab8b0f84f81b80eb6639f17bf9a84dafea7dfe4e18 nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm ffece635c6d640eed8fb89b76b64e4b03874e8ae7d4a1e6fba7438ba7f1c231a nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm 0505c56e61229be002ba0b15b188bd7a31d7c3187ebadfe7e6348cf9c3f463a2 RLSA-2022:7581 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 70a9edf01a0c1901f64757580ba7fa770b350f3e26e1820427d35e78c5681376 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpm d85f27c4100a37c74577e44e0a1d7691b2320c26c1fe40d981594be3a8287633 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-debug-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 68ea827137ec2715f8675b9393368075f33597c97882d2474cdbb77ac13f430f python38-devel-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 253671a0f9ab494983d37500e7dc829490a27f0f1ed658e7507934536da2a8c2 python38-idle-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 83b0dee7242733e100b23cd0eebd2c77a0b47c507be10f5bc061c1c68dea88a9 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-jinja2-2.11.3-1.module+el8.7.0+1063+20f2b9a4.noarch.rpm 883dbbd5be4f1eaeab9086df9445ffc28ccdaba34653b37ad511d59a75bfed3e python38-libs-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 8e5504e8f1a06bc9c1523594028e3b7b78217286647adae1f2b8715b29d05735 python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpm 7867930af945070f981bdaa8645a2cbabe1c20d36c2afd88a03cec102bfef2cd python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-mod_wsgi-4.6.8-4.module+el8.7.0+1063+20f2b9a4.x86_64.rpm c88aa51cce97a21315a074389892d42df391b98d18eba4194960548ef3e0c9e4 python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029 python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpm 9b3dbb19e62de13d9396994f865fe252d5816356d9321c3cd64fe5775f9d4218 python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae python38-pip-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpm 964ca9c5bc0818af45467f59cc7e3595ab2dc3491020642fdd0f74f6f4008f34 python38-pip-wheel-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpm a774e8604a587c3cfe336da973b573416850b4e2fc6858c83edbf3b884c7781b python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm 2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm 74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-rpm-macros-3.8.13-1.module+el8.7.0+1063+20f2b9a4.noarch.rpm fd866d66f9ca5928930867074b5ad03726fae25223f72a4d570c8c7710de1231 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm 3c6af4f697c00c5adcd95066875ad9822fdc705e974cdea514749be83dd17d52 python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm b038bdb9b50ede04d3b94fcd7e0f06625a6fee2c99be14ead3a15bc9bcdb5cc2 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python38-test-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 33e3bc0f8a3badff0a2c98d23517c75af46747be5c6f4180071f87c5f44bad7c python38-tkinter-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm c8b73f455de91cc9f1768ae07b0a39feca6f85d12f132be4165c279d6844adc7 python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm 288302321a47ab51788ad97666b0a258279ad9b0a4dba03818e20f84e517f0dd python38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm 67c84dd6faadc937503b43a5381fe9fa4aa3db54bb96b83621c2d1a0c4c9f948 python38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm c50b9253593f355f6e89721a5b6ee9025e5d8c1ea227cbc2d54b0b8fea12cf08 RLBA-2022:7582 gcc-toolset-12-annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-annobin-plugin-gcc-10.76-5.el8.x86_64.rpm d81c0388932c920a78267d834ad095e3a44522d5c311043611b5c579ada2d5ec gcc-toolset-12-annobin-annocheck-10.76-5.el8.x86_64.rpm b8a9952c6f25520cb101e48561e554431c7ebc3e5fa04c3f9e741bf2f69d0f0a gcc-toolset-12-annobin-docs-10.76-5.el8.noarch.rpm 8f4fce9cd9bb839c7d7e447baad469ab5f83cd5c549b1f984584b40d9edae521 RLSA-2022:7583 Moderate: xorg-x11-server and xorg-x11-server-Xwayland security and bug fix update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xorg-x11-xtrans-devel, xorg-x11-server-Xwayland, xorg-x11-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-9.el8.x86_64.rpm 243dbdac755b81ceb4e08f4e5c8df7deaaa6c2fda23af5c512040cca4d620303 xorg-x11-server-Xdmx-1.20.11-9.el8.x86_64.rpm cc382d22f8c338a0a30ddab2206c1c42cbec25b99fa0bf390c859eed820d8596 xorg-x11-server-Xephyr-1.20.11-9.el8.x86_64.rpm ebb46c4978564fd1539eff728a8de6db3f75dedc744592683409984af203371f xorg-x11-server-Xnest-1.20.11-9.el8.x86_64.rpm fdef8f253dd920e91d2f9ba799a5b3e5b95204756d3824f261a4a93d66a72f7d xorg-x11-server-Xorg-1.20.11-9.el8.x86_64.rpm c9f4a94db051b499721b84bb3eddc0b5d895ed8a2c393fe20ceee4f6ff6f22da xorg-x11-server-Xvfb-1.20.11-9.el8.x86_64.rpm a99a7511f43cca2d6edcb49e9fdcc4d26c4ffaff15f9fe6cbae504e06e3a10e3 xorg-x11-server-Xwayland-21.1.3-6.el8.x86_64.rpm d4122e38cb1e98d83ab05954f3917ea6860595f3656084502f4d4aa7352d16d7 RLBA-2022:7584 lorax bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lorax. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms composer-cli-28.14.70-1.el8.x86_64.rpm 566b39066cf83df3757322bd4f75f5e2ad0e204e8ffcae974577a9f9dd88c385 lorax-28.14.70-1.el8.x86_64.rpm 3fea44f5a18ae5d2b1b2ba431a42bf55200ce6687ae39ada916bc19620f40e86 lorax-composer-28.14.70-1.el8.x86_64.rpm 6e65bb0a8210698bd1744c0e2af233843232ebd500ecc872db7ab16e7c8f6f40 lorax-lmc-novirt-28.14.70-1.el8.x86_64.rpm 7fdbe69127d3b95fe7fdef36f7e7decd866e5c9efdd661d440e8385e311fc185 lorax-lmc-virt-28.14.70-1.el8.x86_64.rpm 103ba3e44ec3b2bb7155a5498f94ba1661549e19321a071b009c00b4480a4970 lorax-templates-generic-28.14.70-1.el8.x86_64.rpm a35538ec540cbe2e3fe0c7d40fca5af6e2062e0f72bc9bc5a9f90c1c26561f6b RLSA-2022:7585 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561) * libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562) * libtiff: reachable assertion (CVE-2022-0865) * libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924) * libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355) * libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844) * libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891) * tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908) * tiff: Divide By Zero error in tiffcrop (CVE-2022-0909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561) * libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562) * libtiff: reachable assertion (CVE-2022-0865) * libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924) * libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355) * libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844) * libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891) * tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908) * tiff: Divide By Zero error in tiffcrop (CVE-2022-0909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libtiff-4.0.9-23.el8.x86_64.rpm 737b891cb4bbb38adaa29d482c291dd2bfca79cbc69dfc4113209859109e7641 libtiff-devel-4.0.9-23.el8.x86_64.rpm a0d3483698c48679e4a03e5b5e33aa8303fd8a82a80c7c652f3e0789712e0f85 RLBA-2022:7586 tlog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tlog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tlog-12.1-2.el8.x86_64.rpm f14e1d63221cb540cdb0d5ef775cde86b9c6fb6ccb006313d95d06ae9acf4cd0 RLBA-2022:7587 gvfs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gvfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gvfs-1.36.2-14.el8.x86_64.rpm c3396af3cd19238ac1e3d4e0bd180fcb365fe57ba37c790dea55fe006a31a7f4 gvfs-afc-1.36.2-14.el8.x86_64.rpm 799de4e17e055a49ea4e2af95b8f193c9a41ef84cb4db9a167a4e164d44f7c1d gvfs-afp-1.36.2-14.el8.x86_64.rpm fe026dc45a4f1f1458c4081f1fd18323ffddf681c696ac2997945bf260242e4b gvfs-archive-1.36.2-14.el8.x86_64.rpm a3d9985a0c62dddc2f2e67b80e837d07c73111ef81e24ec0d474214726f66e07 gvfs-client-1.36.2-14.el8.x86_64.rpm e3e750d027c8ec2ffec10035204d5b86f5622eb8f3a6646db64a9fbbdafdfd1b gvfs-devel-1.36.2-14.el8.x86_64.rpm ed4893212db9f34afb44f4db740f92b9e09dddd995107878a3286d6cbdeeadcf gvfs-fuse-1.36.2-14.el8.x86_64.rpm bbe4bb376c304201a1ac23eacd1056661044b7a4c4d049ee59bf883f3de4b64c gvfs-goa-1.36.2-14.el8.x86_64.rpm 6ae54c65bed8a86d9637012094096385e864ead1762208e1179297d4a4de78f7 gvfs-gphoto2-1.36.2-14.el8.x86_64.rpm a0f4c1b85f1d5db4e2441dbdbecd8c5741a6b73e0e5c977082ae61b097b4f1ce gvfs-mtp-1.36.2-14.el8.x86_64.rpm c12ec2c5bfa6fdc98d882d830cf04681bc03cd0d0bf11360520cc238da2d8efe gvfs-smb-1.36.2-14.el8.x86_64.rpm 73db3c63640040334dcec02cc4f280c30fc852c94ed3783694c310251dd867ab RLBA-2022:7589 yara bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for yara. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms yara-4.2.3-1.el8.x86_64.rpm bde176a3a4a81a37e20fda6ce6066f6cc1efb13af44d5cebd454d39a624ceb7c RLSA-2022:7592 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm ed32c93d78b87f60465c94b954b49bb628a596faa9471a9abedd7e4f211c2b7a python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-devel-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm a08dbea41abb325d9bde0d9255ef00bda9f75d57c110053fe8d3de5c63fbff04 python39-idle-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm f2ffd5105213b5d051686c36392d8e8d5052cb81340c8a179a30c3656b11389b python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-libs-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm 0a70fff839ea02331a39ed679f5e3eae58501bbad631e7ab0f20657091b06a86 python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17 python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm 603e3ea442bedc2f6a2ab4f9b17eb4b50ee5bcfefdf2a90ac14eb32fdf1d3938 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57 python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm 49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12 python39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm 5204c287450cf1579ca958d4b8e807cb70b5b7f55903604f6e8c64b9da8df019 python39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm eb25c5ade496b7c9d8ac56a635c29813f9e7b57f108e146e4be32678bea3874d python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-rpm-macros-3.9.13-1.module+el8.7.0+1064+ad564229.noarch.rpm a4e8f84e09b7ddf2936e56bc1e40627d7d738894302a6c8254350ebd6ea35a81 python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm 2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55 python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-test-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm 9c12c6ed6455bbcfcde117dabce43a704c0313b56d294e6603cca5486868fa8a python39-tkinter-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm ac9255a15b872f0eb7811bb94786ba64395b4569d85d9f1be078638c5e83b509 python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm 58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190 python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0 RLSA-2022:7593 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107). For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107). For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 4af53602814c4e6074f48e25713ef6f8384bf956bdcefb1d33abd3c1071671ad python2-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 7015c1da853f57364651a1f73dfaad46ebeb1c296a6a927431754dccac1acfc0 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 9de14f945b487d8dc1f04035a229c98f3f2cc7ec0522d921c10217b302ef997b python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm 6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91 python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-debug-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 3e7704a761bd3ad81d595574ca315458a858e0ae769cbb76bfefbd34c5143cf6 python2-devel-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 4009f30096acfb9b0337901f47fd585a5bb0486a185a988c1b9bd1bcf3674662 python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-jinja2-2.10-9.module+el8.7.0+1062+663ba31c.noarch.rpm d273ecf02c532bb6e73c45d77e576f1b36560f9b9d913ac3f82f031b3503292e python2-libs-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm cf5083603baeb48b91afdc0da35c2ce52ec937582fd8a57944e0dcb9dcfa6da3 python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.x86_64.rpm 1257203382679fe9daa7dee565a99b8ffdbcefd743bda938d3facb7c15e9a571 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9 python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c python2-pip-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm 424e634426f8d83d229c9960f37b448d1c68e8e656c8d820294ea9cf7262f368 python2-pip-wheel-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm edfdfe37a85d18af2192a371b7949e9dbb34e31f1acb4fde35483074d0e61e75 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326 python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm 5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543 python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 python2-test-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 57b5085932b57f43f8f5359f190033586be37c14121eb5da7cfe8462118d345f python2-tkinter-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm b7fa41bc91383b205ba3e8f20d8c3f397d6d353a616f88f9381a0c7974b86a6f python2-tools-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 1894967e20dd3a304945f1bdef29adcbee4ccf9d34fb14b7d7b0e47ac9566964 python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b rocky-linux-8-x86-64-appstream-rpms__python36 python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960 RLSA-2022:7594 Moderate: poppler security and bug fix update Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for poppler. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms poppler-qt5-20.11.0-5.el8.x86_64.rpm 43f58f930b820bd24c5e0f2937b59f98b2ac8e147e173bcde2b493ba594ab44a poppler-20.11.0-5.el8.x86_64.rpm 6a337f32ddb1e52c1f81b62612990a2aac41f6e458765193ce30373621d5008f poppler-glib-20.11.0-5.el8.x86_64.rpm b8dbaa5539bbeae4a7d9190d083b1975a6330895e16e46e110c6b01098ac875a poppler-utils-20.11.0-5.el8.x86_64.rpm 498d99a9b5a9f9636419f7397fbfff5fc6881b7e2f4f8e8c197985d0d474e11e RLBA-2022:7595 bcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bcc-0.24.0-2.el8.x86_64.rpm b43d3157bece9cf3d3140b27f39eb65b0e6098dd7660183af2506e36f415e808 bcc-tools-0.24.0-2.el8.x86_64.rpm 394c2506dd1d27850ca14d3f452f1bc348b6a290b70abc473a84b5a298504f5b python3-bcc-0.24.0-2.el8.x86_64.rpm 742246525d38e5c6ec71e75544d4e4de06a004e0ae3451ca81afe84ce24e985d RLBA-2022:7597 ansible-collection-microsoft-sql bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-collection-microsoft-sql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ansible-collection-microsoft-sql-1.2.4-1.el8.noarch.rpm b5780681de6ea1535d87398d29640288a0b6df15f60431698eb8105386136333 RLBA-2022:7596 sblim-wbemcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-wbemcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-wbemcli-1.6.3-16.el8.x86_64.rpm c3d4b7fbe0bffc67fa1f645f42cb02f7740ad77903ed01a37c3473057e6081be RLBA-2022:7598 bpftrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bpftrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bpftrace-0.13.1-1.el8.x86_64.rpm e8a04ca8b6e3e2e02d815e31bbace35f1c90201bbd04c44dcb33c0ac129c2662 RLBA-2022:7599 xmlstarlet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xmlstarlet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xmlstarlet-1.6.1-20.el8.x86_64.rpm e42355fc28e75e550270e7d44a037b4d5af17830fb2eac4acbd594c9561b5ee0 RLBA-2022:7600 boost bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for boost. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms boost-1.66.0-13.el8.x86_64.rpm f9b5aabf4efd891eff03865b02a5216c09a3ed805813d7fee22967de35990d89 boost-atomic-1.66.0-13.el8.x86_64.rpm 81a52eb6c974139e40dcc0a2a0b0a74df75f8bafd69d4d040c8564c73a6f051c boost-chrono-1.66.0-13.el8.x86_64.rpm 13d9d6b2e16d4ed399364fa302313002eda8954a1972660b00766f69603ca130 boost-container-1.66.0-13.el8.x86_64.rpm ca0e76f6a19edd3f438282d1410f3bf889ff9743a5222c45c786e878ac1dd4c3 boost-context-1.66.0-13.el8.x86_64.rpm 51455cfaa766bd42c0a9b162c624d7907573cfea8afee2a583222ded31173448 boost-coroutine-1.66.0-13.el8.x86_64.rpm 9c1b1e698193294b66986bcd3f8860689a03cc2d68e037be6071d6f80ef0fd07 boost-date-time-1.66.0-13.el8.x86_64.rpm 0ccb46e0969c83decfaf0d1cc6e31eb7383d146828bf50ba01201be26d7b0dbe boost-devel-1.66.0-13.el8.x86_64.rpm c16446b23a0fb0483e9b0416e82cdeb09b2505efd3262e465d7744f35872fd1b boost-fiber-1.66.0-13.el8.x86_64.rpm e08d739334ce5b91b2e6778c0897ea96649dcac433e257d78e8a87a2ef1faece boost-filesystem-1.66.0-13.el8.x86_64.rpm 7c7c3f708ab3908ab8c5ce9c24b4afd90f763fe81f56f61981b581221fbda82d boost-graph-1.66.0-13.el8.x86_64.rpm 7846d71e0283f478bfe2881d5d54113176723b19f6188ce7361fc39048b1f91f boost-iostreams-1.66.0-13.el8.x86_64.rpm 3ff6762969cc3795e195c79c57462271aa7cc0924a97a47f5f620d974ed9b159 boost-locale-1.66.0-13.el8.x86_64.rpm 73d5da8e7c6c2d9b7f2c744ee40c3bd2a20de668607bf657a1ec53d456fd401b boost-log-1.66.0-13.el8.x86_64.rpm 2d4281a6f52c320656ec0942d8f2028342d0102a3de12187ab6b78bb5e0bab39 boost-math-1.66.0-13.el8.x86_64.rpm 03863ce72ac7080d25b1779b07bec8c7834275709b99cf69a76a6cbb515cd9d2 boost-program-options-1.66.0-13.el8.x86_64.rpm 4b5301b5d92d824990af374b3650f63d700fa46960d1459a9b8da95e6c4b5931 boost-random-1.66.0-13.el8.x86_64.rpm e33fb27c611253dc3f4eafa516a83f9eb05c1f49bfd7d65caeb95e9de8edfde8 boost-regex-1.66.0-13.el8.x86_64.rpm 5aa01be320a94051756382fd78878cffb8fdf59a97fab23a6a750d0c9d99b254 boost-serialization-1.66.0-13.el8.x86_64.rpm 1dc4557a94ae44f131959cd41c5b993a0d71c0261bca77d7eea5b71d692136b9 boost-signals-1.66.0-13.el8.x86_64.rpm 9fcd1d616e52673d76a38c49956cdf51de61de1a6030c272f16dfa35c2861f54 boost-stacktrace-1.66.0-13.el8.x86_64.rpm 6826fbdd8457d8dc4f7a3a680d5b3b95d7a7febc99b5c667cdcd436f11262f15 boost-system-1.66.0-13.el8.x86_64.rpm fcae1cd46f216c9c9741894d2c4995d7ad14848ad06139f07a2dfc59d886d5a2 boost-test-1.66.0-13.el8.x86_64.rpm 64665d9a04cafd8ba88d9e9ef8be6ce034900a97d50bc2b7c8db98b1792eb93e boost-thread-1.66.0-13.el8.x86_64.rpm e0091543ecc67f75c2d21f14c484f15e377045e9b885e37bda6c2ada4367ceaa boost-timer-1.66.0-13.el8.x86_64.rpm 05a50d26202246200a9d8faf90434d990543a8f12e96b0f154c51666cf9a45fd boost-type_erasure-1.66.0-13.el8.x86_64.rpm 5ef4a9474ef6b2f936ec8efe5e9836b87a088ba82def6b4b237863024149b652 boost-wave-1.66.0-13.el8.x86_64.rpm cfa1377a69616dc1f5e6093f60432413e7ef3792aa23457e56b42a9bbe3663f0 RLEA-2022:7601 libdrm, mesa, and wayland-protocols bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wayland-protocols, libdrm, mesa. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libdrm-2.4.111-1.el8.x86_64.rpm e394a9750bef7f85575b7b5e5757b07be87d3051f852e774d2c5dd349919c57d libdrm-devel-2.4.111-1.el8.x86_64.rpm fd8c0a4a0402c9c0f05a2e43e6bb499371eeb9d6d373a0a1118664409c2ce837 mesa-dri-drivers-22.1.5-2.el8.x86_64.rpm 3be36619d048768ece7290533bf33d617ebd67b90db9d3171d3504b794cdb08e mesa-filesystem-22.1.5-2.el8.x86_64.rpm 491327bd259004a5d38d1fee58b6ca12bc6eaa66f3599770f41ca93a551a0b54 mesa-libEGL-22.1.5-2.el8.x86_64.rpm 06e5f5d2ff8a974d82445718d4916043a80122355d7e72d968cfbb8e08f57dd9 mesa-libEGL-devel-22.1.5-2.el8.x86_64.rpm 1594cbdbdf9c43dde0d882936359067bec1dc66e9bb44e4bcaf00caa10b524fa mesa-libgbm-22.1.5-2.el8.x86_64.rpm 889f75f01e3c57b747dbc83b95a31effb102af0e50a2cd7f2b9d8b766d1c580e mesa-libGL-22.1.5-2.el8.x86_64.rpm 06e712f139ac5a65db91a3205b6783b3a60239162628ed76e3d0398d3fa20e23 mesa-libglapi-22.1.5-2.el8.x86_64.rpm c5280a195a74d5f001366d0d31c1ec191b10603c3d5ca343b72cb066fc0e1342 mesa-libGL-devel-22.1.5-2.el8.x86_64.rpm 69e1fc2457b342d69b24910675f128f847b6cf1a57eb6423be489bab3c277113 mesa-libOSMesa-22.1.5-2.el8.x86_64.rpm 3875805b55ea3fc9690d976cf0a8e2dd16ca4e8755d834cf621563634ace5974 mesa-libxatracker-22.1.5-2.el8.x86_64.rpm bb90afd1968756802a6ce62cdc984d7e4ed311a5d5e58fbdd531341e3ea5866f mesa-vdpau-drivers-22.1.5-2.el8.x86_64.rpm 145c2ad189ec7d23ce54d2b524b4bdd18abd7d5d665802c58657db38f3f547e9 mesa-vulkan-devel-22.1.5-2.el8.x86_64.rpm 72593858b56bb1ccb724d16a0f73f2ee08683ae211d1d4f1826dcce5101dcd49 mesa-vulkan-drivers-22.1.5-2.el8.x86_64.rpm 1e9297112295cf07fabc4adc15a20c50cff1cfb64128477deddb9e2053cd7b71 wayland-protocols-devel-1.25-1.el8.noarch.rpm c645c67840d46c277228fba73bf4e6bbb72e84f9e18128c1b6573e48ea19643b RLBA-2022:7602 gnome-initial-setup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-initial-setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-initial-setup-3.28.0-11.el8.x86_64.rpm b7a94ff496c028ce0c0b74219c1562d1d8aaac9c7efc618e732e5b04df08ac13 RLBA-2022:7603 gnome-control-center bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-control-center. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-control-center-3.28.2-36.el8.x86_64.rpm 6006473bf42203f7f7fa2215e55a13a02d35a1dc077d726b7c2583664c1a3f48 gnome-control-center-filesystem-3.28.2-36.el8.noarch.rpm f338919013be21a2a7e03a22a0a6088b909ae6e9d90c1902c6ddce444ff842f3 RLBA-2022:7604 libtimezonemap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtimezonemap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libtimezonemap-0.4.5.1-4.el8.x86_64.rpm 3e70b5b2eb8c0a82d5ed985ce7968d62df94786c876b83b207c3a7c973b55ca1 RLBA-2022:7605 python-blivet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-blivet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms blivet-data-3.4.0-13.el8.noarch.rpm 21038d8e6715177bb30fdffe29caa8047036d8a9e817a9f4557e857576ed3d03 python3-blivet-3.4.0-13.el8.noarch.rpm 4eb44d9cb4d461a71b079b91daa2a66ba24a8041a2b2a841fcefe68c0a09319d RLEA-2022:7606 gcc-toolset-12-binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-binutils-2.38-16.el8.x86_64.rpm 65ae6ef853b240ee9dbc1529e85e5eedefbc080ff7302ef345526079b3c8d650 gcc-toolset-12-binutils-gold-2.38-16.el8.x86_64.rpm b63458b91e980c09020188726a13f5e1c424bcb263223ed8caa8ac95bfc1edfc RLBA-2022:7607 pykickstart bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pykickstart. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pykickstart-3.16.15-1.el8.noarch.rpm 5270eb7d3a8d938917795fbc4a97ad7e45f7e7b0d81268574ff6320661a98c21 python3-kickstart-3.16.15-1.el8.noarch.rpm 30e8cdc0d4311e2e415e67279b55a32b7dd530c870470a475a65ff92f5b2f490 RLBA-2022:7608 gnome-shell-extensions bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-shell-extensions. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-classic-session-3.32.1-29.el8.noarch.rpm ec80f11be7f3a0595344d1e76e40210a39f4ab8fa9cbe0ae2e135df854de500f gnome-shell-extension-apps-menu-3.32.1-29.el8.noarch.rpm 8ff4b8e79c614a53b308862b5ba099ea520372ff9d3b1d1ac87cebc2573ea873 gnome-shell-extension-auto-move-windows-3.32.1-29.el8.noarch.rpm 36ef1c571cdab77ddc26df1e3dba64c7034510c18ddac209077030ffb23e4e65 gnome-shell-extension-classification-banner-3.32.1-29.el8.noarch.rpm 43fc28d158eae75f84497651b3d7aa3d02080ba45117542b667abb3e5eac17f1 gnome-shell-extension-common-3.32.1-29.el8.noarch.rpm f9e03be95cdae3bd435c09654fe4763d867544e7ef1b0f6de93e897ef8b88880 gnome-shell-extension-dash-to-dock-3.32.1-29.el8.noarch.rpm 1437bd1e26f6e5bae726301e22d884de7718776e695115358b9582439dbac2cd gnome-shell-extension-dash-to-panel-3.32.1-29.el8.noarch.rpm 13109fa9b789c9d729d117a9b23442bda94c2e048fd5bc513ea45f4d6f5ac2a2 gnome-shell-extension-desktop-icons-3.32.1-29.el8.noarch.rpm 44bae8d2436af05c68532a3aa6d641886e1096bc76de35f3a13419783b90a13a gnome-shell-extension-disable-screenshield-3.32.1-29.el8.noarch.rpm b4eeedccf7e312891b60b019f003cc700db470759e24956d72599daddd263127 gnome-shell-extension-drive-menu-3.32.1-29.el8.noarch.rpm d0c25677bc73ab8be55dd75a6b154bd3d6e45af1b3730f69b31240d687127715 gnome-shell-extension-gesture-inhibitor-3.32.1-29.el8.noarch.rpm e1a19c816bc7bbfcf37412a463cf513220092cb06f3ec57a5af7d6b6d3509a25 gnome-shell-extension-heads-up-display-3.32.1-29.el8.noarch.rpm 2cf86c95586dae1dac778476e5098570263b91a343cf860836efd2c5060930fc gnome-shell-extension-horizontal-workspaces-3.32.1-29.el8.noarch.rpm 54839e0afe4342dd93e6f77f011d23f954f32e7225a254b1cb52dbfaf2af39fe gnome-shell-extension-launch-new-instance-3.32.1-29.el8.noarch.rpm d717ac1201846aab0c38fda56f440ee715c830a88eaf1e48569073d8be0d550a gnome-shell-extension-native-window-placement-3.32.1-29.el8.noarch.rpm fe769035681631b8437e248ca0f54cb9efb38d92fa5a45ee92f15b03eef0b3b3 gnome-shell-extension-no-hot-corner-3.32.1-29.el8.noarch.rpm 1e425de8c652a7644794cad6b3a186c7be9965ad6a62f8954518cd26bd5fab7a gnome-shell-extension-panel-favorites-3.32.1-29.el8.noarch.rpm 9f1fb38e2f1dc30284ce563f58f1a336af8ba66ae846587a5f4104ab4d15e03b gnome-shell-extension-places-menu-3.32.1-29.el8.noarch.rpm 4911b77cb960766bd1f7116b9c1f5e5080a7da0bd7b0aac74a5bb874ab759644 gnome-shell-extension-screenshot-window-sizer-3.32.1-29.el8.noarch.rpm aefc7ebeb9924e6cb9db289fd0155bf94757f23b3d110f6ded12d537ef942253 gnome-shell-extension-systemMonitor-3.32.1-29.el8.noarch.rpm 4be5338d8da85faaeedc3b7a14540dd56d122d7ce980ffd4b888639b1020a3f1 gnome-shell-extension-top-icons-3.32.1-29.el8.noarch.rpm 0246925d43a03cc53dd168dcbc8c8980332682701a207e75295019d5277b69f2 gnome-shell-extension-updates-dialog-3.32.1-29.el8.noarch.rpm a3e9294e11d4f33912cda78765a01972381d87fd8d13ea5863ad17824d22674d gnome-shell-extension-user-theme-3.32.1-29.el8.noarch.rpm 5aa9438364059f0ddca85cc550e02cdd57e80c27a2979ac6b8191862802c9d21 gnome-shell-extension-window-grouper-3.32.1-29.el8.noarch.rpm 84a178d51deabb79c06616987c0794dfc3f3a47c4799c3570d2fd6cbc0755383 gnome-shell-extension-window-list-3.32.1-29.el8.noarch.rpm 64ed980e57259f0f6fde54d7f00ddeb242c813b9e7e1e0483796805beca63e09 gnome-shell-extension-windowsNavigator-3.32.1-29.el8.noarch.rpm 48d8cec0257865f83b60d18babae4bfde1b7ee0922468d25551cef74a0cfb68b gnome-shell-extension-workspace-indicator-3.32.1-29.el8.noarch.rpm 13e70c18aeacb3000777d9234044bf1cb574429899c023c8eb6ac2691fb23413 RLBA-2022:7609 sevctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sevctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sevctl-0.3.0-1.el8.x86_64.rpm 8883794e71306e213b24089214bb8542019dbee94dc1119caae336131b4eaac9 RLBA-2022:7611 esc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for esc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms esc-1.1.2-24.el8.x86_64.rpm 098fa8a1f91412ca575bd4373786faecf3bba27e34276ee56f83fae4c7bb5171 RLBA-2022:7612 rpm-ostree bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm-ostree. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rpm-ostree-2022.10.90.g4abaf4b4-4.el8.x86_64.rpm f722c597248cbc9723af75f304b0fa74f21915a8bc5cdd9fc236705e85c6d828 rpm-ostree-libs-2022.10.90.g4abaf4b4-4.el8.x86_64.rpm 13595c7f0cf104651466f47bb5ace870a75b4c937816ef0e9e60154a4495583e RLBA-2022:7613 linuxptp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linuxptp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms linuxptp-3.1.1-3.el8.x86_64.rpm 9a606032cab1fb5bc57189b012eb24fb8ae781c3014ff6f545d47cbbbf1db868 RLBA-2022:7614 xxhash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xxhash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xxhash-0.8.1-3.el8.x86_64.rpm 5db7484a6872866a914fe5034367b65b4edc5cacd5e9ced0d095c22be4c410a9 xxhash-libs-0.8.1-3.el8.x86_64.rpm ebf42d96569762da0c84a0bb45e671d8dbbec85c31be20970965d5861a349bf4 RLEA-2022:7615 alsa-lib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-lib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms alsa-lib-1.2.7.2-1.el8.x86_64.rpm bf2a1da9089da0cb1bf360ebedbbcbee3f214cd2f5e455b6374a813ca971afe7 alsa-lib-devel-1.2.7.2-1.el8.x86_64.rpm bc17c1bd17d5be661db3b056718e6995176d87ff645afd7d23de6756f4695b84 alsa-ucm-1.2.7.2-1.el8.noarch.rpm 6308c9e936e757cda9caca8550a95b9f749c127cbcce07149faf1f893c6a894f RLEA-2022:7616 alsa-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms alsa-utils-1.2.7-1.el8.x86_64.rpm 65ed99c2d71fd99a4fce0edbf33dc89bc5a34254600d4bba5bcc5e2c4aa54570 alsa-utils-alsabat-1.2.7-1.el8.x86_64.rpm cb36cf54b2922d6b4b3841cc5708848ada801a8b3f1765b1b03f3dcc28bf95b3 RLBA-2022:7617 rt-tests bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rt-tests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rt-tests-2.4-1.el8.x86_64.rpm 51a62e16f8c44ad2f798cdc626efbeac9b2190e32134b02dcf4ea2232ba0f629 RLSA-2022:7618 Moderate: gstreamer1-plugins-good security update GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gstreamer1-plugins-good-1.16.1-3.el8.x86_64.rpm 2b1bce4000218db12aeb9b4d0d291379b50b74f1b76c104e397cc44be5b661d7 gstreamer1-plugins-good-gtk-1.16.1-3.el8.x86_64.rpm 17f9f05e985f6dfaf1a9aa9b749f4c3a6eb310e13dfacc864941b3a9a62f5b57 RLBA-2022:7619 libva bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libva. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libva-2.13.0-2.el8.x86_64.rpm 9e98a8ae933b9e8aaea6c3a644c15f6c86a1ee7c232b575444e1dbdebfea7619 libva-devel-2.13.0-2.el8.x86_64.rpm 3aff4ad2d1e2806565e5ac6462aa9087844f1226a5822f3c1ee968cac5e1a2cc RLBA-2022:7620 sbd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sbd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sbd-1.5.1-2.el8.x86_64.rpm 82a8d02a85dba32889e969414148fe625138c53e8a1b16a630a88d0494666224 RLBA-2022:7621 make-latest bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for make-latest. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms make43-4.3-1.el8.x86_64.rpm c2fb11b04b4f8f7c6b2fa99875bdd82750e9ba5a7c0cdd8b14d8770de5334f1e RLSA-2022:7622 Moderate: unbound security, bug fix, and enhancement update The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735) Security Fix(es): * unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698) * unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for unbound. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735) Security Fix(es): * unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698) * unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-unbound-1.16.2-2.el8.x86_64.rpm d54f95f9d67733bfedd7c020025d58fa8f3d0d01557de199df410d5a801f8db6 unbound-1.16.2-2.el8.x86_64.rpm b76a482e3a7c9425c23e5a5522bb7d485542df4a6c7139fd23b20fdd9c840060 unbound-devel-1.16.2-2.el8.x86_64.rpm ef50348b1d912f6a8c5d034a72d714343dd63479607610c721e1cdcc652d4178 unbound-libs-1.16.2-2.el8.x86_64.rpm f886b2a5abf92299ffb510e03546a73c7bc9e522613b4de1babd37eec610f611 RLSA-2022:7623 Moderate: dovecot security update Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dovecot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dovecot-2.3.16-3.el8.x86_64.rpm 44ca3ac7e69ac7222188e9d81d0fd667cc6a68725e3fac7b72403f8b6ab56f84 dovecot-mysql-2.3.16-3.el8.x86_64.rpm cca9ba93e14558a9aaa972ab1e3dbf17436747d28ee5dcb0bde3e4e90d45b8a9 dovecot-pgsql-2.3.16-3.el8.x86_64.rpm d32ad1dd39a47a169f45d185c07f3370914e9aefb7b390629d677f99cd0660b6 dovecot-pigeonhole-2.3.16-3.el8.x86_64.rpm 7f2afd0df750de589752505a9d851dcaab761c2cce8ac41fb5bb5dc3a54aeceb RLBA-2022:7625 haproxy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for haproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms haproxy-1.8.27-5.el8.x86_64.rpm a8e48a5349b6d288a406dedbc31c7172491f47ba5ed6ac6d986e9b18531acccc RLSA-2022:7624 Moderate: php:8.0 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm a8348a286ec48a9d3604e12e82440c812e32ec26bffbce314d513c92462e01a0 php-bcmath-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 1a5b54671f55421133e8a529d85a3c123fa3d9c412ecc8e80f5b7c78f8d3749d php-cli-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm eeff3851294f18425c968c0646b50475a97c14d92f4faa44e0b55e267c05a3b3 php-common-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm cf8bb97a63f5aa9530b5a0aa9bf858c03f33d258b096d6e47d738d0a792c9cd3 php-dba-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm b44dc57dac575f1db48001c3a949a1012c5e6716e4ea0042636f9a3db336ec48 php-dbg-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 4a83c25966e56dbc678c509c7d664351111596192d20abd18414c0959e7dab3a php-devel-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm ad33a734ec731512f832cb3a510a5a0a7658e42374c66805bde88549473162d5 php-embedded-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 96273a2407460955cd7d5ef866fc5ad8e2d74b79095a245ffc07cbebcac2a82b php-enchant-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm eeeead05af1841e28a23883f2578bce844218ede9ec90766022b53a20d030d5f php-ffi-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm fc39512df234ac7e85f0987425123fadad54f2b470994414f523b62b3e49ad70 php-fpm-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 85cce205b19955a7a9ec3770fefc16f0061b8a4d61ca9f34606960894fc4051f php-gd-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm a63857577a2659acb3e8fdec4159d54d224bac68a3ad71f860d8a74496083be2 php-gmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 69bcaa0999d4d5cc7fb7d0c79981ddabd1cfe8abf7636692f56e06c1c50a341a php-intl-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 176d023d9815a6f42ec8375bb7edc889af14477516aba5ffeed19c802824303b php-ldap-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 376ece7f191b43804cca3bed1cf5b1aa9665b76af448267837d4dff1e9731e68 php-mbstring-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 9f099e28b9115642ad1664564e5356f95f7be98f2dca22e400649619c842da9d php-mysqlnd-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 7bcf84d79cb7c5ec676500c9e9256d9910e128d0f994e65f2166329403e00d98 php-odbc-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 0550ce31a2c0d310542d23a7740a5947e81eb1150f0c4694b58e064dcb031553 php-opcache-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm e307fa8123cb739f521b9f9eaab655c101ee5bb85cd926bedd1a5ab905064021 php-pdo-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 027d321cd414ebf60134f4470d4e7665b998d985b1641977da9b5bc3c4f19dbb php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 php-pgsql-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 1d0787eeb7308493c46ff4b628d31c0bda6d7befdf3ee3367e4495bede2b4592 php-process-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm ade3494b512052966b1b2f4e14702db8346dffa9e904e30359703afff35d8cfc php-snmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 6cdf3693c3cf99f2f4c7134f5392e27fa6641440b9e382fb386b3996aaa8ccb0 php-soap-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 263b7bb09b0b49f0a1ec1770ba76acae857ce710699767df99fd4baf85587063 php-xml-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm fceb63064b3d0fa7e035f8b740f18c906402a07b4d503ae26a167b87aaaf24f5 RLBA-2022:7626 keepalived bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for keepalived. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms keepalived-2.1.5-9.el8.x86_64.rpm 0a98989f12a97ca3ee908954eeba644438d30a901453fc3e06ecad3ec7128fce RLBA-2022:7627 fapolicyd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fapolicyd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fapolicyd-1.1.3-8.el8.x86_64.rpm b511d983bdcbf2ed43b5579fee089f69e516fee36d033905ff8263f4c717ffd7 fapolicyd-selinux-1.1.3-8.el8.noarch.rpm 25d673638918789319483d2a491bddb4dcdff7b8a1b3f3e528fb167fd77189bd RLSA-2022:7628 Moderate: php:7.4 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422) Security Fix(es): * php: Special character breaks path in xml parsing (CVE-2021-21707) * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php-pear: Directory traversal vulnerability (CVE-2021-32610) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422) Security Fix(es): * php: Special character breaks path in xml parsing (CVE-2021-21707) * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php-pear: Directory traversal vulnerability (CVE-2021-32610) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 07bf8f584e968dbf0b98dffe822d6902a58390fadaf72a50138edf455289e778 php-bcmath-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 4441262caee9f6d3d04cace9862cf9a07a2b822856c100e3030498776650e097 php-cli-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm e2128345e3a5577829de3a1a5db723802291bb3677ab173071dc787300f8c6f4 php-common-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm eb40689e613f9840ffb69f21ce9b6838b9fb29b235273464f21455949c49a37f php-dba-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 3878213e84942a92122007f031a6ff9c05c1e2751a5a74b52ebe87383791e8cf php-dbg-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 1a098917aa3e201a96cc3e7be2c8c5cef9eb044aaeccd389d6b1030ef937c607 php-devel-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 3437a0a07b72d5fbd5e206182cab7284f0405ed0058994f16c06ded39d44951f php-embedded-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 0534fd869e31e07c74c3638041da0cdb90662726f06382f1f6fcb43185d2c8b8 php-enchant-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 0f6af66b1394ce147a2bea207f90c52c3d278dc7c0f4f161aa95f3a2a97f0590 php-ffi-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 85457c73a855e2d2bbc20242b56268caff452c107f2c81a6dfc744cfb7478e44 php-fpm-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 84f82ad8aa014b3dcb8549cd5e05d12c9ab2d812a508de9170e89de1b8ad8ac2 php-gd-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 0159f5632f9a7cab5584434e6a8f2d68f2cf44a6995e7cdbc43c3c13fc1203a9 php-gmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm d728cfa99a9dcaa967877dcafa771a14dd6c691787baf6258966abf32e6f5304 php-intl-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 56244aefd61b6a3880ddad75e55674f9ae961a75f948ebbf6ad5c9387622ba5d php-json-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 306a11df0167f7855c7f8f208aa483c23f5d6bf23ade1e2650a765c445a4dae4 php-ldap-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 96ac971cda8c224e2944f8f7997716e1b75105c17473b218a8628c404f0ef1e5 php-mbstring-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 7cc7b8d3fed7f19f3897791d4666eaec1b439cdaf262052c25aa1e05fac9aee4 php-mysqlnd-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 8ac305f4fc4e8bcd0e0afb449a8059d55430ceeabeaf798e0c51da747af3dfc0 php-odbc-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm cc1be49394f375dd2c9cc316c8e056728df7c92172838f3e05eb29a7e5b68cf0 php-opcache-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm f9a1256c6aaa57bec937759f44d82e733da3ddf98c53c949e2e73e4363b06a0b php-pdo-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm d015b7274a5c077db760c542e6b7209df1f79ba0eadcc12fd3ff446a22b8826f php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 php-pgsql-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 44a36e0141ad3ccc42027a399e91e6fa053c54977c22a54c1df61d51207a7e98 php-process-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 9e1700636a03adba623c15fb1443db7f7c45e4ce564f5a42603d047f8f7ca8a3 php-snmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm ecb2ac8b9d3f7f5bf45c994e92ce77c78b9d7149ca6ae158a0b07ee4e3947276 php-soap-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 1ea8b82e08fba7c2de7f6d2fe2f1f8cf57585f9483ef0cfb861faf5e981cc49c php-xml-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 403096f67c8103d7acd686e92a71fb695823898fb8b8247bb3cce6f582bde464 php-xmlrpc-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 4271876a92a4c98e11dfc9adc5e2b048203dc2c96cf7b93e3cbc0df911c6fc81 RLBA-2022:7629 nispor bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nispor. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nispor-1.2.7-1.el8.x86_64.rpm c5638d282ec04dae1f4cd901b359ddde09409be3a6f8b78e5f3d82533029f8c5 nispor-devel-1.2.7-1.el8.x86_64.rpm af2591a8d7dac21598930b8ed06fb769b832d4333c6cc4c16a2b7995ee5098bb python3-nispor-1.2.7-1.el8.noarch.rpm ca5ab3804782f7ebe26676f7021c55c430a5fdea6421f1a69e7d91848645fecd RLBA-2022:7630 crash-ptdump-command bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash-ptdump-command. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms crash-ptdump-command-1.0.7-2.el8.x86_64.rpm 041760d28c7f97acafc1b90f5d9f12a19c001a3fc90f7d7eb8778daf6d7e34fe RLBA-2022:7631 ghostscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ghostscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ghostscript-9.27-4.el8.x86_64.rpm c3828261c8b05bbaea42f43f46f9e8ab5b1bf542227e498d7ebd8b23126f0b73 ghostscript-x11-9.27-4.el8.x86_64.rpm f366356687683723112cedcdc9a3e7cd047fa03e5c0dbc4dfc357f663ebb3511 libgs-9.27-4.el8.x86_64.rpm a8b1846f370ddab492cfd21485d9a6b13ac3d277417bf7ede7d585ebbfef5f99 RLBA-2022:7632 thermald bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for thermald. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms thermald-2.5-3.el8.x86_64.rpm 2105e8ce92fcef71236a602ac7be02308c6b102ed635b07fa07c8e5316bdec5e RLSA-2022:7633 Moderate: dnsmasq security and bug fix update The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dnsmasq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dnsmasq-2.79-24.el8.x86_64.rpm 8ef40fd4da1fb82b7c274ecf4b1f66c5aa0459e2668d0c8bc4d2bce70fedbec2 dnsmasq-utils-2.79-24.el8.x86_64.rpm 9219bb674aab79fd7c6c460392f97be226e6a5004eb17d20f3b6fc9f705d4ffc RLBA-2022:7634 usbredir bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usbredir. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms usbredir-0.12.0-2.el8.x86_64.rpm b62803bfb0ff52df6796bba1f5ed2502a6811a7d1a41a218e1ba907eacc97f9a usbredir-devel-0.12.0-2.el8.x86_64.rpm f00e64939bed144aec7c61fc9a4a5d723941b806d24e641b350128667e2e88ff RLBA-2022:7636 edk2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for edk2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms edk2-ovmf-20220126gitbb1bba3d77-3.el8.noarch.rpm aa7733301627b7eb43236d937dc51a73ef945a7aae9ecd4d813aa519df62f550 RLEA-2022:7637 maven:3.8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__maven apache-commons-cli-1.5.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpm 2504808e7bb6c06c2706696895ac60a31a83764d7df665046664c16f6594c4d8 apache-commons-codec-1.15-7.module+el8.7.0+1082+b3a88d23.noarch.rpm 9bfad29fd8e93554d4ca33a6711f7b793bbdadafb0a4db81eb9ba002abd94869 apache-commons-io-2.11.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpm 4f7526242a56142e1fd231d9e7686f5a155a2070fa79fb52b1e83bad9639e8e9 apache-commons-lang3-3.12.0-7.module+el8.7.0+1082+b3a88d23.noarch.rpm 27037e8532d62c2e3b6e0a435bd903bfb1540f73c0ce6650c9bb8bde10330998 atinject-1.0.5-4.module+el8.7.0+1082+b3a88d23.noarch.rpm a050941f674330536ec0ed3895488df293d11bc4d71803ecaa6647d7ab61f15f cdi-api-2.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpm d533b87cfce9ea04df2d36dfb14bd619952dcb306718824b59bb806f9d50e971 google-guice-4.2.3-9.module+el8.7.0+1082+b3a88d23.noarch.rpm 27d37752561262188b2a5618f171aa0d97e07b43f618e6f69ef2d73016394f39 guava-31.0.1-4.module+el8.7.0+1082+b3a88d23.noarch.rpm a932defaae72ba27bdf2e8022f699a92f1a2a72e8de4e6ce3aa61cdb220d4aaf httpcomponents-client-4.5.13-5.module+el8.7.0+1082+b3a88d23.noarch.rpm 53ad18936cb104b81292c49fbba185703fad1a4585ceda3f757b180265504b55 httpcomponents-core-4.4.13-7.module+el8.7.0+1082+b3a88d23.noarch.rpm 8c526281a2d18ae7f9b7a76f2fb1a04789781cd7ca0b2aec60a9997d66a2484a jakarta-annotations-1.3.5-14.module+el8.7.0+1082+b3a88d23.noarch.rpm 5e89bbbc4ee2348801c810af9e34c707b61764a73adfbd0039db7355de5d3f8f jansi-2.4.0-6.module+el8.7.0+1082+b3a88d23.x86_64.rpm a23782fdbb258ed7ae58fc86b4859d70c66fbffa501f9258efb1c4403a2ba1bd jcl-over-slf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm b125935b6843082bd8c445e1950319e9b5ec76d1b05760b3a57f762706a03bed jsr-305-3.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpm 4e3e833e9dbda4451c6f7d1e41ba92acde5bbb4a233ae5f617f08ff7d7c0b16e maven-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm a532cad614f39e89e5013a25e2513123ec070fc5b956102bbd3dc00eace52eba maven-lib-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm 0f74b89b815f56b1e89d03ac1b9b0f256c77723efe7aac16209b689a8e658bca maven-openjdk11-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm 61123d12dc39ba56868b094db24c5e7bae3bd49c83283440afe541e8eddb874a maven-openjdk17-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm b570e04dd05bb6febb0291828c48c3399a213bf5c7c6ca3c8cf1469e2d0c6ff6 maven-openjdk8-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm 01c706be33a63c3dfe9f3aca9163774d208cad8a5891bde4572a71ea372b8c74 maven-resolver-1.7.3-5.module+el8.7.0+1082+b3a88d23.noarch.rpm 60d9110c2e34df93e9f73495b500734492877a00caf03b83c19a0f7886d26bea maven-shared-utils-3.3.4-5.module+el8.7.0+1082+b3a88d23.noarch.rpm bf70be5e5cf79db68303554ff30f0fe9b59ea243814a15661dec4af551553ad2 maven-wagon-3.5.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm 5efa702d5d70f6a08b69d3c41c91785b35263aeb15c8bcb20a4bf26e854ff123 plexus-cipher-2.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpm b780465af6320824793218270e36d0972fff8c01f426753cb3a02c602b9d4b7e plexus-classworlds-2.6.0-12.module+el8.7.0+1082+b3a88d23.noarch.rpm e09ca193b70a3ce3e18d15682d4314b8759c56b4b64500ee7e0ff1d77a172135 plexus-containers-component-annotations-2.1.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm 345a55610fc3c8ecb26246b09e9ebf6043862cdd3f4223ff42183462a374dbfc plexus-interpolation-1.26-12.module+el8.7.0+1082+b3a88d23.noarch.rpm 9e6de49efe80cde3ed4dc36d5819b15a77f429b6f0ca90cb0594e66d4eb1710e plexus-sec-dispatcher-2.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpm 4f4997c1d037cfb4180bdfc0bb54db2517a6a434a6839d0f54935d1434f46fb3 plexus-utils-3.3.0-10.module+el8.7.0+1082+b3a88d23.noarch.rpm 1c4dfffc30a7c45890df152ea03f52d0de4f878182a0573a2075bf3d65eb0419 sisu-0.3.5-2.module+el8.7.0+1082+b3a88d23.noarch.rpm baf84b90986770d39acecf7b3490d1e2f60f6ec41adaef70655b270258d2fabb slf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm 67122bee7bfba76c146b1e031e6b2111173029bc7c5774e325596f3a9a8354b7 RLEA-2022:7638 mercurial:6.2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mercurial. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mercurial mercurial-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm 52bc1386bcfc64bf99b1f1c1346120b24532e839a29bee2c91a6958a460520ac mercurial-chg-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm 18c97d8f3e8b7e3dcea459e047cedbf5ce7f7d47ca527ff5daa68cbb2a8c9456 mercurial-hgk-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm 9c945841d9eb5ad2cd4ad36a358f426569bfb95040683ed02f9640258325c276 RLSA-2022:7639 Moderate: openblas security update OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version. Security Fix(es): * lapack: Out-of-bounds read in *larrv (CVE-2021-4048) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openblas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version. Security Fix(es): * lapack: Out-of-bounds read in *larrv (CVE-2021-4048) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openblas-0.3.15-4.el8.x86_64.rpm a6629a2491ae9fac85e928c9d1397a912a9eaa5a1ced7dbb4a83560ed3be1966 openblas-threads-0.3.15-4.el8.x86_64.rpm 5afed1f25fc67c5aad9935e6655ba61da0d26a974c1b387c040fd8fecdef3e54 RLSA-2022:7640 Moderate: mutt security update Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: buffer overflow in uudecoder function (CVE-2022-1328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mutt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: buffer overflow in uudecoder function (CVE-2022-1328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mutt-2.0.7-2.el8.x86_64.rpm 15b13b12c60465cd9da41f83afc017da0d515a17b91dfa14956e532e72d6603d RLBA-2022:7641 fstrm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fstrm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fstrm-0.6.1-3.el8.x86_64.rpm 009be413cbe00ebcf5cc349e0db8d6913273bb26dec2c187860e69056b69bb9f fstrm-devel-0.6.1-3.el8.x86_64.rpm e5d3ee7dd9fc8a676544e1c9292a6cfe104da22e04bb79262578f31e8d939620 RLBA-2022:7642 setroubleshoot bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setroubleshoot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms setroubleshoot-3.3.26-5.el8.x86_64.rpm edbda7d3a6ed4c6cc0cb6448ee20b063fa2da9a9732390cf0817a275b4381c84 setroubleshoot-server-3.3.26-5.el8.x86_64.rpm 98a9ec6cb83707587e8cca917a9c439c81767a814560807fc9caf01d6e24677b RLBA-2022:7644 clevis bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for clevis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms clevis-15-11.el8.x86_64.rpm 7b1661586fc311cdbc1e9f476968c2dde04253a852c5f527d9d2435114d1eb11 clevis-dracut-15-11.el8.x86_64.rpm 0fb789c732ce81f56014c82ff1a145d917fdff04ff72eedb6cf78d365318a96a clevis-luks-15-11.el8.x86_64.rpm afda820f581b0fdfffd83e4c84c834ec3413291db1061d07b3d0f197bea52eda clevis-systemd-15-11.el8.x86_64.rpm ac473976855ebcdb18d17dd0fd52173ba7991cba4e2dcf2878ff04deed4c6a76 clevis-udisks2-15-11.el8.x86_64.rpm 85e206ef9a26491b946ac8aac5497e1c37f2e370ce1311ea4b609f1219a4c519 RLSA-2022:7643 Important: bind9.16 security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: DoS from specifically crafted TCP packets (CVE-2022-0396) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind9.16. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: DoS from specifically crafted TCP packets (CVE-2022-0396) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bind9.16-9.16.23-0.9.el8.1.x86_64.rpm 2a2f8c93e2cf8dc978845e2f946a10b46673a7b88cca2f46b4e3103374d51090 bind9.16-chroot-9.16.23-0.9.el8.1.x86_64.rpm c85fc4eefeb37b2918f95cd2902973374f64d5d83f02a3771d1fbc574c7f501e bind9.16-libs-9.16.23-0.9.el8.1.x86_64.rpm 21941367dbb4bbedc8dbdafe8df4e5c1beb98309d3d5062821ea31e2a7dacd4b bind9.16-license-9.16.23-0.9.el8.1.noarch.rpm 02cf60bbbf5a798b91a297d13987547563cd82aaa7f011b8edabc8efd7ac0988 bind9.16-utils-9.16.23-0.9.el8.1.x86_64.rpm c1c3d62196778f140ba4176cdbf89951f3ec4747e2606fb43f42cd92f6f9f33a RLSA-2022:7645 Low: openjpeg2 security update OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for openjpeg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openjpeg2-2.4.0-5.el8.x86_64.rpm 3f417bd20c742a615ead7114343b3dec930d6a74593f8120bb0cc89d8a45f5a3 openjpeg2-devel-docs-2.4.0-5.el8.noarch.rpm 420b2ee00501e932ee6e6a43f30918ec8359f6936a71181afcbd500f4cf1d307 openjpeg2-tools-2.4.0-5.el8.x86_64.rpm 1eeca900463ae48d084ef5a6579c884c5b641a2357ff78afb7ea6bf979206ba1 RLBA-2022:7646 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libblockdev-2.24-11.el8.x86_64.rpm 5da174eafaf69af62408a4815a01f3dc246ef681fcc8e7014b0fce0403a674cd libblockdev-crypto-2.24-11.el8.x86_64.rpm 2d4d820490c96a4d9c5c75b7cb3ae1520b579e609356fa336cd7fe4800f9f23d libblockdev-dm-2.24-11.el8.x86_64.rpm ddb1077966da4cd352a7e5054ecbd6393c5294c45a10185f794f19e1f5213924 libblockdev-fs-2.24-11.el8.x86_64.rpm 1ad19562185e8206dc5175b37b20453977bbeeaf4e69c90f0c2701f6a3297be8 libblockdev-kbd-2.24-11.el8.x86_64.rpm cb09b43aa55feab2e48ba005abfedfb8e8bb0170aaa731daeeecea050036b1d6 libblockdev-loop-2.24-11.el8.x86_64.rpm f99218c09d4e71cb3da31faf10c85a3e4e324fa30a2a499104bb554ee7ae9394 libblockdev-lvm-2.24-11.el8.x86_64.rpm 5987c9cd3365981b4e3f0c03f572adbedc4e6e2a27909cbc164c3f2f1b518235 libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm 95c137f79bd41a9f791c48be71008650e3aa7354ab5ac0d6cd54b5bc961cf294 libblockdev-mdraid-2.24-11.el8.x86_64.rpm 40841584b5e8ba50c0316fa6a41a6bb20e470fe8486cc8868bfd1fbf47b55186 libblockdev-mpath-2.24-11.el8.x86_64.rpm 6c11510d841ff0405a0630e37d1ed79d9f741fe85a18a6dc366a4daf7c6165e7 libblockdev-nvdimm-2.24-11.el8.x86_64.rpm 8f5f06d54c67ec053c3268a228e95c91c46741a9976adb23df6f7627ea27989b libblockdev-part-2.24-11.el8.x86_64.rpm 979ebb94b393928e80524a055ced8c32914e3bb69fdbeb7548d61e86048b49d6 libblockdev-plugins-all-2.24-11.el8.x86_64.rpm fd8cdb42a8c71a3313807d62340daaaa650588184e86a039197d94a44b31d7e8 libblockdev-swap-2.24-11.el8.x86_64.rpm 1a319f5063476b8af2207e8d0d8b8564ad66412886b4cf3c337e069c443b5c23 libblockdev-utils-2.24-11.el8.x86_64.rpm c954d6b891f0140d997e1f3106e9cc023ee920288c017910fed598501e321ee1 libblockdev-vdo-2.24-11.el8.x86_64.rpm 3397635712651d00661b4f91563eb6aaaec753824b97fb4e8de64e6a17d9de49 python3-blockdev-2.24-11.el8.x86_64.rpm 00fcf1707621b8ff4a0de879d5e401b5b738a05783621ec8e85c4bfef705300f RLSA-2022:7647 Moderate: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943) * httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719) * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377) * httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404) * httpd: mod_sed: DoS vulnerability (CVE-2022-30522) * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) * httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614) * httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615) * httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943) * httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719) * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377) * httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404) * httpd: mod_sed: DoS vulnerability (CVE-2022-30522) * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) * httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614) * httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615) * httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd httpd-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm bf0f17b753398917bd78b469b9522c1c69623c39d74e2e072785b506b5fc1394 httpd-devel-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 7e2a0eb54d1df679fb968511c68566e4577d12e5dedc8272b426a7613415bd89 httpd-filesystem-2.4.37-51.module+el8.7.0+1059+126e9251.noarch.rpm 969b64b86a34667e267ddad1ccfeedb854aee00abd1df97cff27c360b9cf96b7 httpd-manual-2.4.37-51.module+el8.7.0+1059+126e9251.noarch.rpm 96cac9b5c3a2d5e9b9d363dea0eafa48628bc52d7f5abf8fc9102c2c7baf35be httpd-tools-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 61d0353ca9006ce117284db172b80a31bd2ef425e0337cb67bfdf1e611da8a7a mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm 4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5 mod_ldap-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 835cfd3c56a0b13903a0ad8f0e3184664a2ba5d10eb801785b659ab2bb813b48 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 mod_proxy_html-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 7fb626480ab451a56be9818d127bf95ff3a867d94c0e6bce114562b063d08a7e mod_session-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 54e3780fd2bc9471198a3f222cf7ff9d36e72321ae82092959bf1624c9221b10 mod_ssl-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 7b2e2dba432aa6e941a52067aac0d10e918366742756a7331fe139258a36f5ac RLSA-2022:7648 Moderate: grafana-pcp security update The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms grafana-pcp-3.2.0-2.el8.x86_64.rpm f51b7ad4d487e5d4704112536ba57dfcf6ad0c993bd63117298c5045be1a4948 RLBA-2022:7649 hyperv-daemons bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms hyperv-daemons-0-0.33.20180415git.el8.x86_64.rpm dd8a73fb9d5128b96c6aa9a9df743b3e0c66d45677dcb76cd14e8bd669f46810 hyperv-daemons-license-0-0.33.20180415git.el8.noarch.rpm bfcda3489995f231a5c8b1a414acb58b0c74710fad37bf9725e8ba18052324d6 hypervfcopyd-0-0.33.20180415git.el8.x86_64.rpm b83c98927e6bf767536cb0255761884c0d9c88ee0614d9652a2b3665e7263f89 hypervkvpd-0-0.33.20180415git.el8.x86_64.rpm 6ebbb520fadb104c5082bee707a22e062a3a579f6d145ee2ce81613bba565c59 hyperv-tools-0-0.33.20180415git.el8.noarch.rpm 19683e1b36236c96fa80542addde387c50505b96bea2c08cac8b3d3891603b0f hypervvssd-0-0.33.20180415git.el8.x86_64.rpm 69cb064a0ee993002e232507b1ff8d181f3089001b8458aa7186ed717a5ce073 RLBA-2022:7650 xinetd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xinetd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xinetd-2.3.15-25.el8.x86_64.rpm 7caf679d6b941ca0c4b3fc40bb80a54c50dc631f1c6364e886eaacb25ca24769 RLBA-2022:7651 cyrus-imapd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cyrus-imapd-3.0.7-24.el8.x86_64.rpm 037557455d8da217bdfe6df1621de585d9427f70beae4256a6ed99ccafe03016 cyrus-imapd-utils-3.0.7-24.el8.x86_64.rpm bd6c2b4f212689e7858b86acb0e3bd1d1ad7f779b85ad3c8b4a3e2c02a249940 cyrus-imapd-vzic-3.0.7-24.el8.x86_64.rpm c38b07ae2373e61aa5091f1649071c17374d41acb213b325fb7eb6378529c7fd RLBA-2022:7652 oddjob bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oddjob. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms oddjob-0.34.7-2.el8.x86_64.rpm a481f325a915f2d704474ed8b4d1df97dd1c58fc168a511b2a1d937fb4039c15 oddjob-mkhomedir-0.34.7-2.el8.x86_64.rpm 91959c72f5382176996bd2a73d968ec84527d0ce3e79ad464d30296f0c630825 RLBA-2022:7654 rear bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rear. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rear-2.6-7.el8.x86_64.rpm c2a6c74dc0e8d4954a23b5aff5f33444a5b2127e65f41b0bbd3e317cf66c12f2 RLBA-2022:7653 cups-filters bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups-filters. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cups-filters-1.20.0-28.el8.x86_64.rpm f13e08457a6dd13449b5ac3d38c2d6536504d876287388fe77d00fa760d5cf3b cups-filters-libs-1.20.0-28.el8.x86_64.rpm 891cec03132923ded16005a191ba9c86b595e647f3eba52e58aaaaf00f4d9707 RLBA-2022:7655 xdp-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xdp-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxdp-1.2.6-1.el8.x86_64.rpm ca9a4c47c93fa78dda88d3e0877dccd474673e4b27eb0882dc7c728dc929613b xdp-tools-1.2.6-1.el8.x86_64.rpm 3d85888491af2f38a37afd748d9e0b8c808561aae77b35e3b66433c596361e3c RLBA-2022:7656 ansible-collection-redhat-Rocky Linux_mgmt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-collection-redhat-rhel_mgmt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ansible-collection-redhat-rhel_mgmt-1.1.0-2.el8.noarch.rpm 4d3548a092ce08108d8e84f1f8b244914491b05e0bdb386afbac45244b4e93c4 RLBA-2022:7657 openslp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openslp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openslp-2.0.0-20.el8.x86_64.rpm bee056de851dff0654790c1a354a461c5aa5f45e6cad2690ac62d6271431e94a RLBA-2022:7659 gtk3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gtk3-3.22.30-11.el8.x86_64.rpm 29a2f90df2465bdb2e4798d90e6d43933bb34cf742747f97efd77db0832c06c6 gtk3-devel-3.22.30-11.el8.x86_64.rpm 197af38646506159cb952caccb7bcbd054ff35f7d5283ae67d730c968af02f59 gtk3-immodule-xim-3.22.30-11.el8.x86_64.rpm edee3fe26bff0a288b5f1c754933e759991b2e77c006e02c8ee540f695a66612 gtk-update-icon-cache-3.22.30-11.el8.x86_64.rpm c574da0954ff6ba85c0eabe58a7acbded426be845d408c57e57cb443fe560933 RLBA-2022:7658 freerdp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freerdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms freerdp-2.2.0-8.el8.x86_64.rpm ee604c4fd7fef6716c1d342119560a2a7b2cde11d3fb089957633db2515e6dbb freerdp-libs-2.2.0-8.el8.x86_64.rpm 9f1ea5245ed7d523776a64a596d8bf686ece476548c7197578992d258ad228e1 libwinpr-2.2.0-8.el8.x86_64.rpm fcd8eed3c1863160827b0cd8a4ec6b38656765537e30213bd2c2855e14f0c716 libwinpr-devel-2.2.0-8.el8.x86_64.rpm 98e2869640d82f85e40a5e5c7712e5a5fdc5ea337a44cc277f7ec3cee64dbd82 RLBA-2022:7660 coreos-installer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for coreos-installer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms coreos-installer-0.15.0-2.el8.x86_64.rpm b965acad95abc501de61f10b0212329849bd0e097160287ad4d3611a37769b53 coreos-installer-bootinfra-0.15.0-2.el8.x86_64.rpm 443ab391cac10e8d56d6f1e09005da0386fbe89d4ef371cff6a50a6a4bf450f7 coreos-installer-dracut-0.15.0-2.el8.x86_64.rpm f330db1a24ea0e10aaeeb76f70e62c3b93159c5ee68b1d5375ce89235f9f24c0 RLBA-2022:7661 vulkan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spirv-tools-2022.2-2.el8.x86_64.rpm 4a1a23d9d2ac7da4c9bf89d16a203d55c6f6b539c82436f979eedf2e4eb03620 spirv-tools-libs-2022.2-2.el8.x86_64.rpm 4d25bc22840ed42e1e7e2e5e2cafdc808561de408112e85daa62dda183d78c53 vulkan-headers-1.3.224.0-1.el8.noarch.rpm e19ab508f27e871a450a0da79c7a91ec51619c85a590b8f1c6eb10efdd9928c3 vulkan-loader-1.3.224.0-2.el8.x86_64.rpm 04f8daa017250796784a780b73af1def53d4e83cca26aaf802595ddbe2182910 vulkan-loader-devel-1.3.224.0-2.el8.x86_64.rpm 46b79f8228dc0a0f36bd9c52ba433c4fd204aa274b90f6a98bc58306507bb029 vulkan-tools-1.3.224.0-1.el8.x86_64.rpm 52f91b57a908e181714bba6fbb51eeddd52ae1e3e960eacb23d3ad80e797163f vulkan-validation-layers-1.3.224.0-1.el8.x86_64.rpm d9cfa39a9d367a4058bb95303cce3ea2e6473ff387af278c30c4226c0ea9c153 RLBA-2022:7662 opencv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms opencv-contrib-3.4.6-8.el8.x86_64.rpm 57166933fcf4f60098b559813ff422da3f55b01077a0a6457200ea4cf49e4293 opencv-core-3.4.6-8.el8.x86_64.rpm c552fed8cd103e91ab4f5901dbf6c9c0464c90a9b712f376731067c97b6f4fd1 RLBA-2022:7663 wireshark bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wireshark. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms wireshark-2.6.2-15.el8.x86_64.rpm b011d4ee0d747b9d6329f622fa29b009cdf39cdd8454526aeb1a18a6b691c6e9 wireshark-cli-2.6.2-15.el8.x86_64.rpm 28750481e1ed6bcf20b13b29bd17e173bdf3be4c40fde886d3452306753df0a7 RLBA-2022:7665 ksh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ksh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ksh-20120801-257.el8.x86_64.rpm 11dfa340af7b52321ce90b0425c10c3e90835f6b400cba4b70fa48e107529779 RLBA-2022:7666 qatengine bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qatengine. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qatengine-0.6.15-2.el8.x86_64.rpm 7e82a279e2d83cbd406ebbb2b32b1893fd63554c0c7f77e60f8c5314309c9e34 RLBA-2022:7667 qatzip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qatzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qatzip-1.0.9-1.el8.x86_64.rpm d646b323481492a0ad52a4de12caaac8991d881b8ad4b882af159ec09c61cd9a qatzip-libs-1.0.9-1.el8.x86_64.rpm 33c3fc3aff60b4a339db9471d2e33efe9b4748081e9d0416223fd2dcd28d8cf3 RLBA-2022:7668 qatlib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qatlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qatlib-22.07.0-1.el8.x86_64.rpm 5107cb43c0648ca8f388dc30335e064d74c738a2f21f4ef95baade1d59244b80 RLEA-2022:7669 ipxe bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipxe. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ipxe-bootimgs-aarch64-20181214-11.git133f4c47.el8.noarch.rpm 0118e505403e318795ce056e565bd8acacf6a05b3b52082eebe1b452b4ebb7d2 ipxe-bootimgs-x86-20181214-11.git133f4c47.el8.noarch.rpm 7a4f1b8be52f0b60fb7fc53bf312f2862ebdcb43b7442b8338fd5d5254a96706 ipxe-roms-20181214-11.git133f4c47.el8.noarch.rpm b0552e3664dcce3ec599db80dcd3335add473fcff0c2a3f2d0e172bd75595acf ipxe-roms-qemu-20181214-11.git133f4c47.el8.noarch.rpm 402d256792a02af43415b6cfc9bd1db8696705abe9cc28788f3242e1cb9e4ac9 RLBA-2022:7670 mod_wsgi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_wsgi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-mod_wsgi-4.6.4-5.el8.x86_64.rpm ab58858a5e243f8fff7e96f7d9c5c995716545147cd4f152cfa660fad8b95d67 RLBA-2022:7672 spice-vdagent-win bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-vdagent-win. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-vdagent-win-x64-0.10.0-6.el8.noarch.rpm e53a14bfa86f429777d1d730fe86662008a8aeee8e73fbffd23f2fc3b16e6ad6 spice-vdagent-win-x86-0.10.0-6.el8.noarch.rpm b1814db118569b052f8164d9c00c49172ff49a87220300bdcbe768474daae489 RLBA-2022:7671 python-simpleline bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-simpleline. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-simpleline-1.1.1-3.el8.noarch.rpm dba9336ea7e7bf54b9f0f09bec717744c20f9506638c9786e60274c1cc45b037 RLBA-2022:7673 wsmancli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wsmancli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms wsmancli-2.6.0-11.el8.x86_64.rpm e5a175e6790a3a221f3c12f816a95fbb8d7f2b8655ab0a18269dd93ab3af505e RLBA-2022:7674 openwsman bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openwsman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libwsman1-2.6.5-9.el8.x86_64.rpm c91dc44a1f1b1e194acfc69be256e06b98b1fc9586790179470cdc3653ec7381 openwsman-client-2.6.5-9.el8.x86_64.rpm 3c8034aa23cff3e5b9bd6c0703da3fba9f1c519a8e44caa8946d4a0dd5c08d59 openwsman-python3-2.6.5-9.el8.x86_64.rpm 8ada5656aada9c3bc19e296c9c229b5b9a247b45684b41aa55c8c7452bff87b1 openwsman-server-2.6.5-9.el8.x86_64.rpm c478858538547c9457032f0e016425f9a3c2015b69f70d20fc531a147f155d05 RLBA-2022:7675 spice-client-win bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-client-win. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-client-win-x64-8.7-1.el8.noarch.rpm c98184f6376baea38a779a93d182d916df079e69871e6fcfc7fc7def6d9dc27d spice-client-win-x86-8.7-1.el8.noarch.rpm 1c0d0e51603717d6074c596f9ea2cd6a94709153ae7d5abbfd08563e9e14d870 RLBA-2022:7676 prometheus-jmx-exporter bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for prometheus-jmx-exporter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpm 85d52b6eb723113b6ba471b2ca26afae713997a89616d57739e7498226fdac71 prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpm 764abbe69bd693ff8794e3c9fa5fd5b609be9ba1e896ba02ed4476d2efb61dcc prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpm b252c5787fa070f1cad64f473a492dbbc981882ac49570b9a1b5b5bb9596a7a8 prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpm e747522630dfee8d219dbd8794386cd774564f4cdd5b688d3e4ee255c217d91f RLSA-2022:7704 Moderate: webkit2gtk3 security and bug fix update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628) * webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629) * webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719) * webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628) * webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629) * webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719) * webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el8_6.x86_64.rpm 6f9d418c7ea1f1201d9fce9c29a452dd5ff1e50186607bac1d8d5c36e9d0b081 webkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm f264c4563e2b6ed207ecba5bad82bc211e855fcabe1756b92db6001872f5118c webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm 857df66bf8107734cf442e7e59feab3e0d62c626e8738c46f676b57c99fa221a webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpm 022a74acac9929975cd817c2e8820af36362c80ba18c35525aa3143c238e2845 RLBA-2022:7820 virt:rhel and virt-devel:rhel bug fix and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix: * irtiofsd debug log's timestamp is NULL (BZ#2132391) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix: * irtiofsd debug log's timestamp is NULL (BZ#2132391) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45 libguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 4456694874c9d7346f28a9f1afa1a3456df30b16304fe183ff42190cd9e708c6 libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645 libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 3c9d51c249abda39f7eb4c3a9e7aec28fd90a7bbebcade157e9bae228e0c99fc libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0 libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b libguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 0c1afa84a2ce7357193c0eae89c65ce30a9e143e7ead6c774c16371f58da4ea4 libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm e6cafc935323470c7f0fa1156693ff1fb9816931387cebcfc33057f1f535fee8 libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm f45396ca362fd4fc35b9f14babd32cfaea1321a6417308a1292f44d1224898f2 libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100 libguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 5d5c05f7f8470a00208277eb34687306aab70af2ce1bd57ac78528e631505f59 libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52 libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm 8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0 libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm ea41423cb9ccd317d1a5ebbcb070b9e1a74f99ecce9c3e5051267bb64c188eee libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 7ed71d62ecf427822af3a0b9e20fc93f9e05bf2004fb7be9511d6ab5e9b3de7d libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 0ce8f2e8e6dca56e8a76186d1dfa73130956079bfd6f2818c1ee50944fc0b416 libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm d0cea4e0b6167849fb7edcb91531b3716e01887bfe9faea099bd0b8c7fc51858 libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 0c0d39b5bfd236922c883c4367c39d9c711ccdace73f36ece10088d466b889de libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 092bc77167d3a1d392f4f214a08a4eaec63d5b25c12f7f3f0850b48c2de205e5 libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm c484e35d7ad61b87ad9662109aecb110158136240c797bbc126dae3078f4414a libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 830a30966b383cdc2ed0cf28870c8af581d8a2b1dff4d0ed3fc1b4e6ec9941b4 libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 1f37a92b9f136ee4e4fc8f9bed72ca1cf858bbde132596cd5fcb789018e40a8f libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 97350f3e49235032387990bfadb529874b4cc8fdaa39edc6f13d69e36253b4ad libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6df6e0e49b97c69ff5b065e574b4c9eaa08c0ae4de46832fd1dc5c8b19abe6c0 libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm e8d54db9bd04dc675d8b44bab42de599af7c56fa68d5715135c1742056a0c6b3 libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm c87e4f8cb42bcbe09ed1c043fe3d57ffd7bc2e7f5adc56814651901db5f79a40 libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm ef4b347f15c6ab94fb348337c7856ba6acad1fbd7d425486741be6a5640a73e3 libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6c4b97bcb6b615b8c2bf886459f22fe782c05d2679c56fc1808e044feb60658b libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 087db2ba93134a2c732b4fa5fa37b3c9fc2369447398a86a1a6c10de5f467609 libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm a791d8f7e3badb26d0385db4d3c03fbc0c8c800c6f5e4b984c3fcb093ba36d15 libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 57a656c3775cd30fb0e46818c56616b2083bb5a6fc1268ef52cb2ba0bf11968d libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm b382f68a7b9146a952801ceeadf99f7ffacd5b3cdff873278f4c5e87dcf12169 libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6233e0708101c4fab6f867a5bd7081aea83c1b813f0b73b27d2dd066424feab3 libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm cfbadecd26551afc63bb73ffff83ed1a575276d71fae78783579b7200030e03e libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6118db5d391e5ea27aeb8131ed3f596d918706291f0cb7a0ad2df37aa7d8eb26 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm e2a47a6cd93b6be3cb6cfe5b2db5852bd9934cf0e959f37ee82ac6bbfadffe93 libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 4330e66821e29bc2d1412a0480aec1bcdc1f942a81da56d43653bfb9172d9636 libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm fd055f2146f2f2210fe413dcd3500896cfaaa4683cdd3ca9cb6d130f0eb56e51 libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 5853e8e20b37b510049a488594a5e92bfd022747013a2854fcbdcc21bae08757 libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm decc7c7175a8a8456aa9fcb8aa312d9a0aac9657b8cc8a427af79f203bcaf0cb libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 108e8b905f821306c1a18e368b647482898b6726e56268f57f967ba8ca263ee6 lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776 qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm f53d318c4b0613a22aebf4e177ad1f9105fce5fd18dc993e0229980aafc36b93 qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm c6429b4d1d9f6ac6162a7b0a6686ed3f2e1f856b1819d953dd73fc7207946275 qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 0adb29176532c04f3da5718b171484e4116fbdeb09cda55aecca84efeb2a8e98 qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 5fcca46736dc69adb0f7ff4f057607527a15031d5a13d87446cd377dc6eefe04 qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 9625fe3e4a5fffecfa1eb5b6451dd7c5a666bd468c0032198ba9dcefd2fb62cd qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm d587a9dbc9af15a3c4408189098dd620294b95f6673b0614fead295697e1b4d3 qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 13cb392b10b20cfae2cdc32435b6177b26180bbe18ad6108cc9af993090a6c4f qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 5ac7b977816ce165fed7737e3aba3bab5a7150730d979f1d12fb4d1a7ba62832 qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm f4cd7b44410c2c3a1c15413d45916901c818cdd79e8bff1535c416a4a74b3d33 qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 9f1769ac46cca5dd72edd4f2d7cc088d5c10dea45ec6802835aee4b2cdb0e79e qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm e38d06d10d96bf278ce730343fd70de5c90521a564c7b739839c1e24f78a0dd2 qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 161c40f475f3129578d666dc0e8019573443ef59be07e7559618b7ccf68fae31 qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 76329de8d248dfe414a30907f835662cc25fa1bb03823724d7a87c3f32aad717 qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm 631ac3650401c6f558dff57a24626a58aa7ad05e7dc8549e8bde07f483087b02 ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70 supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm 9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838 swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9 swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4 RLSA-2022:7821 Important: nodejs:18 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750) Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750) Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm 4a190f09bf708f5a45330129aa5663853fb49b007921d4bebcd2198b56ed9f65 nodejs-devel-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm e997573653d97bb0a0566ab66f16846f7a9e5416cbbaa9c836eee72b487842c9 nodejs-docs-18.9.1-1.module+el8.7.0+1072+5b168780.noarch.rpm eb458813c72a7d63c698cc201f1c65840d6629edfb5a88822754d698b61fdb64 nodejs-full-i18n-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm 7b243705740ff8777e283fba19ea10341b014068ebf1ec1adc6ab6ef63fe5f7a nodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm ec2f3e9547f189b1ac35d0ab8b0f84f81b80eb6639f17bf9a84dafea7dfe4e18 nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm ffece635c6d640eed8fb89b76b64e4b03874e8ae7d4a1e6fba7438ba7f1c231a nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm 0505c56e61229be002ba0b15b188bd7a31d7c3187ebadfe7e6348cf9c3f463a2 npm-8.19.1-1.18.9.1.1.module+el8.7.0+1072+5b168780.x86_64.rpm 0f5f81cecfd33ad56c588cdd18631041e491dc3098b1458aa1a064b04851bc6d RLSA-2022:7822 Low: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: possible information disclosure and modification (CVE-2022-2989) * buildah: possible information disclosure and modification (CVE-2022-2990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644) * (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645) * podman kill may deadlock (BZ#2125647) * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648) * containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686) * ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234) * containers config.json gets empty after sudden power loss (BZ#2130236) * PANIC podman API service endpoint handler panic (BZ#2132412) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390) * Skopeo push image to redhat quay with sigstore was failed (BZ#2136406) * Podman push image to redhat quay with sigstore was failed (BZ#2136433) * Buildah push image to redhat quay with sigstore was failed (BZ#2136438) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295) Enhancement(s): * [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360) * Podman volume plugin timeout should be configurable (BZ#2132992) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: possible information disclosure and modification (CVE-2022-2989) * buildah: possible information disclosure and modification (CVE-2022-2990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644) * (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645) * podman kill may deadlock (BZ#2125647) * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648) * containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686) * ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234) * containers config.json gets empty after sudden power loss (BZ#2130236) * PANIC podman API service endpoint handler panic (BZ#2132412) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390) * Skopeo push image to redhat quay with sigstore was failed (BZ#2136406) * Podman push image to redhat quay with sigstore was failed (BZ#2136433) * Buildah push image to redhat quay with sigstore was failed (BZ#2136438) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295) Enhancement(s): * [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360) * Podman volume plugin timeout should be configurable (BZ#2132992) rocky-linux-8-x86-64-appstream-rpms__container-tools aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d33e11f32b7ca8bb1ab9de7144786d8b949b688760adc1785e2fe70d5f39168a buildah-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d1f697d951572b67c4d0ab80a30722a3eda303306f5904ef8cb1d6c3733632cd buildah-tests-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1839a75a6f2fb5593d36c7e2d36012fa706711bf29077b42426eb8858ab34ac1 cockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b6ec4da8b57643e010868c767fe370c537f59dae20ec5459864a53d026a8aed conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 containers-common-1-43.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 201e2826e656e125b7a753e73fe57cf4c4189315ddc4a4e1fc329bb45f8387e6 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 119f90778569a22466b4a90fa278b1af63d137005aaf3aa5945f28a5514bec92 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c podman-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm a58af6159401ae01e54b33eff11fc07b6b40a20c6d09e375c6276451942c409b podman-catatonit-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 4e36ac569c72abc680821c471ad1a26236816c0c45769c2b627f0bb327c368ab podman-docker-4.2.0-4.module+el8.7.0+1078+e72fcd4f.noarch.rpm 3ab74a5b0f60cca22c86fd8c1f9d0b1a93d7577fe73545eefd1716271c0bdd12 podman-gvproxy-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1e0d9f6077e42fcdcd44987496509b9f68d7cc1165c49d1c5f013b100a04309f podman-plugins-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 5af440d5ee2dab182636926e7cf4b71c62847b6be75607dd95efb5b75dbd3ccf podman-remote-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 6aeee569dc76847d740d8863907786a80e1918abcaf6fa880a7ab58740538025 podman-tests-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d1c73fb86bcca0c43027e3bf83fd7fdf5ca67a46cd96dafae46cda06ec918e82 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d python3-podman-4.2.1-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b696d0f504dd20e219ec48da145b4324efcc4ee393ebd32de98cd14f7aba3d9 runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856 skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm b2dbacf676bb36b7d618c125bba63b03b16206500f903f8ce4b76e368f16dd26 skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 8d4dda0fee2dc95c05a961422237e3ab97a7f32f0371cd7dc91c447a09ce5b0e slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLBA-2022:7091 java-1.8.0-openjdk bug fix and enhancement update This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm 745a98184ac9a5515249b7cd168a5790d2b07407b3eca941cbb9bf9400d2f689 java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm 10be3aa175d2b7be220ed364679366f5b90ce479d11d65443fabba8fb5e23aa9 java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm a64f5fe29ba875659ccd0a3d6af6f3a1f5e87b0c4e5e93cbabe16cf8ed68ae68 java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm 6facf44a3ef195fb6c7f66ffce323acf6eccf4f331d5b9059e0c03865fdcd5ac java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm 01819f766f0cfdf6b035db3ead2f50c9539d65fb760d89728a34771c4b44a31a java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_7.noarch.rpm f17b77d4203cf1a819eb288008fd2080959d7dbfd894ecef89d69f0e0d023e4e java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_7.noarch.rpm 762991fd798dc9d95f9e2257ebde37ffd259e56d3bffb2c9c1a89fd16d523079 java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpm f0b9eb21a54ba79a63a963b57f7a2372954a3c88686a340713fa88332ab3ce4a RLBA-2022:7827 ansible-freeipa bug fix and enhancement update The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management. Bug Fix(es) and Enhancement(s): * [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132974) * ansible-freeipa Replica Install Setup DNS fails (BZ#2132988) * ipaconfig does not support SID and netbios attributes. (BZ#2132994) * [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135753) * [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135754) * [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135775) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-freeipa. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management. Bug Fix(es) and Enhancement(s): * [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132974) * ansible-freeipa Replica Install Setup DNS fails (BZ#2132988) * ipaconfig does not support SID and netbios attributes. (BZ#2132994) * [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135753) * [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135754) * [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135775) rocky-linux-8-x86-64-appstream-rpms ansible-freeipa-1.8.3-2.el8_7.noarch.rpm edf7bea18aa5aa09f08e6254dbcd806bd8c5bf373ee5bbb8c5e4e1d38b566f1d ansible-freeipa-tests-1.8.3-2.el8_7.noarch.rpm e453a34f04150c6379ed44a447f7a03901619c170cc5e661936d6e3a39356c70 RLSA-2022:7830 Moderate: nodejs:14 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm 401ad24969db74e1989ecab2aafb6192bd816113db6eca267893d54ec506446f nodejs-devel-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm a258182e176403cf51af2c6dd125924212ab63c9059b2e2a4c40506b638db5ab nodejs-docs-14.20.1-2.module+el8.7.0+1071+4bdda2a8.noarch.rpm ae67e51aa0aa621dc10bbf046420486aaffcff02ec89b5aee959668cedbb14b0 nodejs-full-i18n-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm f01702069e9268a2594987a91eb54adb343b4236983b1d300c8aa032a2c0bf19 nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm 55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642 nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c npm-6.14.17-1.14.20.1.2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm e25f3c8f2935111f4012a42737e70b79bce180b49aaeff9c720e169dc08279cc RLBA-2022:7833 pacemaker bug fix and enhancement update The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Bug fix(es) and Enhancement(s): * Running crm_node from an OCF resource agent's metadata action will hang until the timeout is reached because metadata actions block the controller (BZ#2125588) * Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589) * Resource agents that call crm_mon in their monitor action, such as ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown (BZ#2133830) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pacemaker. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Bug fix(es) and Enhancement(s): * Running crm_node from an OCF resource agent's metadata action will hang until the timeout is reached because metadata actions block the controller (BZ#2125588) * Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589) * Resource agents that call crm_mon in their monitor action, such as ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown (BZ#2133830) rocky-linux-8-x86-64-appstream-rpms pacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpm 3140cfc42a7891db48ccd246e8e9cbbbf6bd63470ca182d69d41b638bf54d33c pacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm 98c2f138e3b705ee8a47cb1649347a579fedee8fe73edff425f2e45b9d22e96e pacemaker-schemas-2.1.4-5.el8_7.2.noarch.rpm a50616f73a2a2e456d3bba21b8b4892c73814cc429db6bd992bd6eecaf5c6d3f RLBA-2022:7835 mutter bug fix and enhancement update Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mutter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746) rocky-linux-8-x86-64-appstream-rpms mutter-3.32.2-67.el8_7.x86_64.rpm fd4986a6c4ca4ba62462427c6b76264a5da45a7923a1253f78ad2671a8fb5b84 RLBA-2022:7258 java-17-openjdk bug fix and enhancement update This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms java-17-openjdk-17.0.5.0.8-1.el8_7.x86_64.rpm 4c83e47265fda2ce1754ddb46c2ade5c95d13e82851ae0d3a0c2ed6d69943ccd java-17-openjdk-demo-17.0.5.0.8-1.el8_7.x86_64.rpm ea691a070f8fcf9e1389200c0b89f2ea21ef6f4edab9af535789127fae32b81a java-17-openjdk-devel-17.0.5.0.8-1.el8_7.x86_64.rpm 9d8b71e2adced4576633c77a2607e532e1655149b2eaa4a38f090089e83b2e57 java-17-openjdk-headless-17.0.5.0.8-1.el8_7.x86_64.rpm 7ffee64f4d6987f5a2ec5be9980b2066dd61f7f865d5e81ee88646d13a63dd41 java-17-openjdk-javadoc-17.0.5.0.8-1.el8_7.x86_64.rpm 6846aa5cd7fae8d5ff1287646c43d7ad3747b43f0a39a0cd8fbcd6060bf8c880 java-17-openjdk-javadoc-zip-17.0.5.0.8-1.el8_7.x86_64.rpm 5c4784b2b0d76728db5459e983aecf854cbc19a0e01cfc48cfd60d33b5618368 java-17-openjdk-jmods-17.0.5.0.8-1.el8_7.x86_64.rpm cc35eda49192a3b003c507ba2364e6da75fa46d1f89e7e7c656aa42e5202cfe2 java-17-openjdk-src-17.0.5.0.8-1.el8_7.x86_64.rpm 14adfb04f91d8b7b41309a93093602f1daf21c41193d7b6834db657f22e5ce3b java-17-openjdk-static-libs-17.0.5.0.8-1.el8_7.x86_64.rpm aa95e8d2da7eef7c20406839ea98ea1f42af0a38e20dbeb5023d6c77d0ed3d8d RLBA-2022:7438 java-11-openjdk bug fix and enhancement update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es) and Enhancement(s): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es) and Enhancement(s): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862) rocky-linux-8-x86-64-appstream-rpms java-11-openjdk-11.0.17.0.8-1.el8_7.x86_64.rpm b4b8298d97ec3a0b3729caa82149c0e482625e9c1bae71d57102330281a9c249 java-11-openjdk-demo-11.0.17.0.8-1.el8_7.x86_64.rpm 413e2059917a6cfb0de0fa9b48b638181769d8c3962e7541033b49992e4150fe java-11-openjdk-devel-11.0.17.0.8-1.el8_7.x86_64.rpm cc2373fa88ae86db0f9056422882b00a8aa63a784241e40484e9f67bbfd5d26f java-11-openjdk-headless-11.0.17.0.8-1.el8_7.x86_64.rpm d7291c0e1bada7525bb4b9d11a516f3998d2faa1f6b441cf1cb765c6d465d326 java-11-openjdk-javadoc-11.0.17.0.8-1.el8_7.x86_64.rpm c69eaea884949a91c731e8bd382d39501f2466fa39ac40b79687e3271eb160c7 java-11-openjdk-javadoc-zip-11.0.17.0.8-1.el8_7.x86_64.rpm 203c475c5749084c9ce2838a10cc8fa4e060ce23daf07c194612b0a4c17f437c java-11-openjdk-jmods-11.0.17.0.8-1.el8_7.x86_64.rpm 376a70b9294fdf208cba2f3a18dbb4e998f7704ae3185f4f764a5b1be53516c0 java-11-openjdk-src-11.0.17.0.8-1.el8_7.x86_64.rpm f4e5bee82d6228dfeff59c4b3e29c4d49a89ae298983607e3745c623c7c2048a java-11-openjdk-static-libs-11.0.17.0.8-1.el8_7.x86_64.rpm 09c1f027ff03b8fa877f02900e2aaa9fdd746ba76c94b2fbcb92c0b91dc0f094 RLBA-2022:7861 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943) rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.0-1.el8_7.x86_64.rpm 878f9d6b5c38bff3b31ad21dabd579b984b8b4cadbd09a106e9daacdaadcaa38 aspnetcore-targeting-pack-7.0-7.0.0-1.el8_7.x86_64.rpm 151c726ec77a0463322cf8e6d85228f433bf9d639fc69d2ba2a62d97afddeb4e dotnet-7.0.100-1.el8_7.x86_64.rpm 206e2ee7237a5c0a55d1043be0537b58a162814fe44fe93f7592ca10a52e702b dotnet-apphost-pack-7.0-7.0.0-1.el8_7.x86_64.rpm 7fa30d5707209477c273499e8c19bed4f6ea19f18ffe37d1b7d050d4855f4942 dotnet-host-7.0.0-1.el8_7.x86_64.rpm aa043a73b66ef2e40266073351cd663c22223c3b1b4fd1f6acf6ed9c51efcf04 dotnet-hostfxr-7.0-7.0.0-1.el8_7.x86_64.rpm 421cb3357b477659fd3b7cb534ee9a3a735ff44b5a69f32e3a3088787c59a251 dotnet-runtime-7.0-7.0.0-1.el8_7.x86_64.rpm 8f9b1c50019b172719d57cde37b02dc769d3332898a710f3599ee174849b11dd dotnet-sdk-7.0-7.0.100-1.el8_7.x86_64.rpm 0461180b438eb7121f3f141e50d7bcf1a7d3b0e271b0c099fc512c82a0c9ddad dotnet-targeting-pack-7.0-7.0.0-1.el8_7.x86_64.rpm 25415080e2c9cf1d0ca5f3c304dc60566c490a4528aadb723ff6479feb685d54 dotnet-templates-7.0-7.0.100-1.el8_7.x86_64.rpm 21fde39f57873fea6b2bd78854959699ac14f8b88298aa0cc711dcc1b88693e7 netstandard-targeting-pack-2.1-7.0.100-1.el8_7.x86_64.rpm b24fc1b37cf501c6ee212bbfc5b112433b475ce0292b5f164529331848c30e1d RLSA-2022:8492 Important: python39:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-toml, python-urllib3, PyYAML, python-requests, mod_wsgi, python3x-pip, python-chardet, python-psutil, python-ply, python-wheel, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, python-cryptography, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm 7a8ee5a5cd1f0de76f24260d131d89147cdbe8050e0fdd8498bba2e7a02ec868 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-devel-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm 3b10a486f9f18d09c1172822d0bc10f4839819625b8485997d7ee0686f0e39b6 python39-idle-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm e549dc525b65cd3575243e24e0d3a8a0de0d8db72fc5485f889e74e7db2cdb4c python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-libs-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm 25c78438938258d4a4a38baa2ff0aeaeb5d2b0681305e03194c8a61721c44143 python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17 python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm 603e3ea442bedc2f6a2ab4f9b17eb4b50ee5bcfefdf2a90ac14eb32fdf1d3938 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57 python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm 49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12 python39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm 5204c287450cf1579ca958d4b8e807cb70b5b7f55903604f6e8c64b9da8df019 python39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm eb25c5ade496b7c9d8ac56a635c29813f9e7b57f108e146e4be32678bea3874d python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-rpm-macros-3.9.13-2.module+el8.7.0+1092+55aa9635.noarch.rpm be6912750857e863edf1eab1ae17f464094587f3f9a23a6e032f92ce32cd574e python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm 2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55 python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-test-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm 15257bab47c339067d514868f259751b4dc1ca12c07ce14fdb09f774d106dad0 python39-tkinter-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm c4cc624bba9ec5d36764ff31594acbe09f464a8227bb79851b38f252a8d1a33c python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm 58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190 python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0 RLSA-2022:8547 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms thunderbird-102.5.0-2.el8_7.x86_64.rpm 475f1d6df087435fcefe313a755054f818a67bba03b9dd066bf99dcbfdd5ec8e RLSA-2022:8554 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.5.0 ESR. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.5.0 ESR. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms firefox-102.5.0-1.el8_7.x86_64.rpm f96ae8017c6b8ae8fb7e05d01518c9e16be3bfc1d8cce9ca70672b6d2387762e RLSA-2022:8649 Important: varnish:6 security update Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: Request Forgery Vulnerability (CVE-2022-45060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for varnish, varnish-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: Request Forgery Vulnerability (CVE-2022-45060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__varnish varnish-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm 5a1fa7ed104adb107faaddafd8e877beba1351a69a607642a63c0379a383a4dc varnish-devel-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm ee7ce281889256348965d2ee8adbbcd754e77829762f455806fd8e514550afe4 varnish-docs-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm de9011b3a31dc1bef73344bf0eeca380405f881f2975d3bf29ae06cc7412454f varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm 9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e RLSA-2022:8833 Moderate: nodejs:18 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818) Security Fix(es): * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818) Security Fix(es): * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm aea785debf4481bd0e02678272a77396bbdc8dcf6b0f02d0a0c355ee25c67bde nodejs-devel-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm de3833917292c5c7473db9db975ae6ac53fe8887d0bf4699c0812ae1da27dc21 nodejs-docs-18.12.1-2.module+el8.7.0+1104+549f92a6.noarch.rpm 37ef414b21908c52aed4b6783d8d2102585a0fffe339215361f941dab617afe8 nodejs-full-i18n-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm 8dd89c09e0bbc8a8671c8f310147558f61655eb1147da5cbfe8de9bf1bca1257 nodejs-nodemon-2.0.20-1.module+el8.7.0+1104+549f92a6.noarch.rpm b0c10787f8ad3c63d98c7a029cd3d668008b7b4fbdc912dead848fe65263fc28 nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm ffece635c6d640eed8fb89b76b64e4b03874e8ae7d4a1e6fba7438ba7f1c231a nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm 0505c56e61229be002ba0b15b188bd7a31d7c3187ebadfe7e6348cf9c3f463a2 npm-8.19.2-1.18.12.1.2.module+el8.7.0+1104+549f92a6.x86_64.rpm 5aba9b1c42407f8e82c505064fc689e153c0939e96827320a17e7d389829d550 RLBA-2022:9018 .NET Core 3.1 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet3.1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219) rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm 321a9227f7a51654049bc09e0f2ce8a754e420e11c71a9fab4bc2a456dc2eb88 aspnetcore-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpm ef7b433a72ec8356e0bef8fcc4a48e4fa039b188abd2e815e0ef06bf31db9551 dotnet-apphost-pack-3.1-3.1.32-1.el8_7.x86_64.rpm 61ff6e071d2e85056d0211ad5d8a1983c9e10a8db1da945567f4f38a1396907b dotnet-hostfxr-3.1-3.1.32-1.el8_7.x86_64.rpm 733b0d67480937424b1628b33545714519511b60b4266f9418c8cbcf7b00484b dotnet-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm ecc3c698aa2fc5ffc1a4ae5af831423e80972178883d6897dce35692e0aaf976 dotnet-sdk-3.1-3.1.426-1.el8_7.x86_64.rpm 40687d8ce0358edb1597c22c456ebc8fdebb0b9af4a6839261b1b92d1a37b77e dotnet-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpm e9cfa562100cd5d4ea75e21d0f6f308b00ae1303c73b4e4ccce82e70145506e8 dotnet-templates-3.1-3.1.426-1.el8_7.x86_64.rpm 2eab8aa7fc541ef65617ebdda07745ffd3f98abca35ba60dcacd00df4332ff64 RLBA-2022:9019 .NET 6.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147) rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm 40eb805b34e75308a953b764f740cffc0b52ff48354e118ee2f8c0e1a9fd2f54 aspnetcore-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm 24679a9fa18db67d5e4d5af2f59bf8419100ae01076983c95f32ba3e70edf059 dotnet-apphost-pack-6.0-6.0.12-1.el8_7.x86_64.rpm 5ae896ebac661ffda075e21ce8d41cbca61f4ea1cf93f4126b64b98adfc0f8cf dotnet-hostfxr-6.0-6.0.12-1.el8_7.x86_64.rpm e053fc0aa64ba6a7eb3d21bb6e152838b3cf2bbff56e956a934df59c06444f8c dotnet-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm c8fd6a01a6d2dcf00f64cb90b6b821ceac85408d4928ff5205836a2709a7e6d8 dotnet-sdk-6.0-6.0.112-1.el8_7.x86_64.rpm 0caf19b488f04ef0674893521e5fcd92e8680d7c8fb2aac8a6ed3ceb4c7d3fe1 dotnet-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm 7dca74b8041934891ebadf7bf016390e64745223173672b9631a7b855c50d1eb dotnet-templates-6.0-6.0.112-1.el8_7.x86_64.rpm 67a7dc47e75c39a9743bff3cdc0551b7853024e017afc27773943f3e5445c83a RLBA-2022:9020 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151) rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.1-1.el8_7.x86_64.rpm 7e43fe0a5c4c88b1ddcf2d7f507ad38377da00a50e66b1936097cc9d029a2c0b aspnetcore-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm fd7290132750d545aa8c12072861ab647811219242e5e211961a357ee86f2cd7 dotnet-7.0.101-1.el8_7.x86_64.rpm a95b04fe3de2a4793f8cf8db2bb6e7485ab0c699784446a68a904c2dbad7446d dotnet-apphost-pack-7.0-7.0.1-1.el8_7.x86_64.rpm 0cf19b555eb333bd7382da6c3115543948caf0925634212e8b3ce9c415d9fbc0 dotnet-host-7.0.1-1.el8_7.x86_64.rpm 99fae50921aca12abcd7cb7df97937e13193d133912668f4e10d47b6d6335684 dotnet-hostfxr-7.0-7.0.1-1.el8_7.x86_64.rpm 8ee69163ee0f44a2503eca39c62712330a04830ea711776071004e83fa3a11f2 dotnet-runtime-7.0-7.0.1-1.el8_7.x86_64.rpm 9afab5eab6fbcfffadfb298c1abcdeb421a48d3dd3778e68b1e05d1698ed9905 dotnet-sdk-7.0-7.0.101-1.el8_7.x86_64.rpm 840928e1999fa87024dd8309803d3392288dfa6c08b7aa80fac6940fe14fd14e dotnet-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm fa4ccf679be8704480c144cba45ed10f2c7b3679c42b0440ecc5a98f32cf0f5e dotnet-templates-7.0-7.0.101-1.el8_7.x86_64.rpm 868aa99c208a5ee4098322b5142a27c51c0a9e093092a9c6601cb32a556fbe9b netstandard-targeting-pack-2.1-7.0.101-1.el8_7.x86_64.rpm f0fcc000efcb027874d095cd43fd9210fd8f2f5e61d40f2190bdf833506ed278 RLSA-2022:9058 Important: prometheus-jmx-exporter security update Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix(es): * SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for prometheus-jmx-exporter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix(es): * SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms prometheus-jmx-exporter-0.12.0-9.el8_7.noarch.rpm 7f0ee106105d94ea781c5708ae94636470835a481955f86d8287decc606eeeed prometheus-jmx-exporter-openjdk11-0.12.0-9.el8_7.noarch.rpm d55d78db5fa0b4a9613c03980a7acc56d80f9da749c0038b6a035945813827f8 prometheus-jmx-exporter-openjdk17-0.12.0-9.el8_7.noarch.rpm 744f60f7d304e56fcc61d9350522f83e20f744c834e2c3d04bc5f9c20133bbfa prometheus-jmx-exporter-openjdk8-0.12.0-9.el8_7.noarch.rpm 3de1b62ba2631039862963f1827e5faf5422b5c65aa0afd8c07337e3cba96ffc RLSA-2022:9067 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.6.0 ESR. Security Fix(es): * Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) * Mozilla: Use-after-free in WebGL (CVE-2022-46880) * Mozilla: Memory corruption in WebGL (CVE-2022-46881) * Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) * Mozilla: Use-after-free in WebGL (CVE-2022-46882) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.6.0 ESR. Security Fix(es): * Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) * Mozilla: Use-after-free in WebGL (CVE-2022-46880) * Mozilla: Memory corruption in WebGL (CVE-2022-46881) * Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) * Mozilla: Use-after-free in WebGL (CVE-2022-46882) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms firefox-102.6.0-1.el8_7.x86_64.rpm 34955a1b826608022b8a34be29ca7e0fc0a075a4a22577ba07aaebaf3b9b814e RLSA-2022:9073 Moderate: nodejs:16 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm 9627a638967cca454e0eb74aadfba8c320a4f90aff79b91ff116fffca8858675 nodejs-devel-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm 8f759716abc41be055e7d194521e5b8c294942f9a4d69cc8b7fdd2011ccafead nodejs-docs-16.18.1-3.module+el8.7.0+1108+49363b0d.noarch.rpm e4cad5a20aadf5c90d0fd2bdbb03f5e769a587f3760049b0bcfeb4ccd84a491f nodejs-full-i18n-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm 299c1e5c4de5ad93ac8947a3ff0a1e96cd9f1a4f7f3c4022b0adbf6e287e42fb nodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm 7cfdc2a79280af0253fe192f0b797d38da309b280564776c073ff1d43ed0eee1 nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 npm-8.19.2-1.16.18.1.3.module+el8.7.0+1108+49363b0d.x86_64.rpm 63e6c5dbb05c4244de9d5ebe69fccb1c9ddff7b735d232b69d4237db460e5ab8 RLSA-2023:0016 Important: webkit2gtk3 security update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el8_7.1.x86_64.rpm b66f4a20f2cfa416c253e59f5abdae4d60ab0c8eb6fa108b62e5dc437ab2063f webkit2gtk3-devel-2.36.7-1.el8_7.1.x86_64.rpm 80c833250fea9c202b88609c6b4ab83d58dc8c614c4ae61a711f0625e4c82053 webkit2gtk3-jsc-2.36.7-1.el8_7.1.x86_64.rpm 4e1275424c38905ac892ce8c1c0da21f05575d77cc349c53d2ef10e38b11aec2 webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.x86_64.rpm ebcdca510922906cce63a30a560158cc97a434cc1187796aa7a6ca34006f7ac5 RLSA-2023:0050 Moderate: nodejs:14 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm 56b0c87890dd9e9563794ebf5b65af30a92acddc18d7ae8c378a704621d1946d nodejs-devel-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm 17d8ad3686b58b35212ce357b7ce43e5fc656bdec8d101186f00e5a411b730ac nodejs-docs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.noarch.rpm d3c7996c0f56313a8aa1a7de5476ea69d6f54a8ec33eba74fb619a49a009de35 nodejs-full-i18n-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm 8f0511b89a54ea41b1e6e274cdd6e243a084b083d0edfe2d9ddfa5d55b37c2ad nodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm 7cfdc2a79280af0253fe192f0b797d38da309b280564776c073ff1d43ed0eee1 nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c npm-6.14.17-1.14.21.1.2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm a472fd1bc022b9a378a5db241fda34d0fc6c16d234ec9801494fd3c3c32e79af RLSA-2023:0079 Moderate: .NET 6.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm 19cd947e3adc70c742d707df2cb6d5002f3d6ac755bc76cb2de3e0967810c3ff aspnetcore-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm e92089de7ad5c684dc22fd190cadc07b0c50a97ad4c82c1d63b0f57b435104e6 dotnet-apphost-pack-6.0-6.0.13-1.el8_7.x86_64.rpm 428b8d78d564a4e70047245b632fdf13b7056b1092fb0f5ca3e9edbe8f6ac64e dotnet-hostfxr-6.0-6.0.13-1.el8_7.x86_64.rpm 1efcffd0ba52bafde6dfab411848e1254daba7bfec6e409a9c16ef31d3305084 dotnet-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm 0e2b60eb3232918cbc31eb82b3b894b49307ceeb33d8c99b72780cc8ea4c114c dotnet-sdk-6.0-6.0.113-1.el8_7.x86_64.rpm 1473d96fd6aeef8aefb3aa4a131ec9b1e20504d940aa8976d055d24aa85078b6 dotnet-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm 513d42eed786b52bac7a89debf53982b79f9c6c97df7dfb8aa82696e464697d1 dotnet-templates-6.0-6.0.113-1.el8_7.x86_64.rpm 8f3a7f3e4b65d6772d56ce60ec525958af78c523c41799386a585c1df0f52edc RLBA-2023:0081 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466) rocky-linux-8-x86-64-appstream-rpms dotnet-7.0.102-1.el8_7.x86_64.rpm e095f2d0625ef0686b6ea540ca45ac81f23bfc9153b5bd7203d31c27453a6298 aspnetcore-runtime-7.0-7.0.2-1.el8_7.x86_64.rpm 2b42f45d82b387cecbe3b41339bcd839a3bbbd0c8194a333a2a7db656bde81ba aspnetcore-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpm bd1b9b7f2c4bd7939c8f6322eae6aa599a18da3f560b2662ecb1a88db6671fed dotnet-apphost-pack-7.0-7.0.2-1.el8_7.x86_64.rpm 2c0e7c8657f597286fdbcb586b1ee995b4f3803c22cc704106a01cded0ec0af0 dotnet-host-7.0.2-1.el8_7.x86_64.rpm 8a4b1cbdf55add0651ee4fd080ac818067fb824fad3178069ed5c337cf2e0347 dotnet-hostfxr-7.0-7.0.2-1.el8_7.x86_64.rpm ce335e7036bf94cc18dc46791b19a44dd51bc2242377448e7df0bb324f51a42a dotnet-runtime-7.0-7.0.2-1.el8_7.x86_64.rpm 6f9a221cb96bfc8a8b3f5f62cfe7ca30ac568c07ff53d47a12c67f8ac97fb3c1 dotnet-sdk-7.0-7.0.102-1.el8_7.x86_64.rpm 3c283655f110b4aa7485baa93ae12f0d3de144d1beb0d7de2d61ab034d611608 dotnet-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpm 53ad722510b3b550ac22e53223f07d2e60a856009a55011a38e66c109ddbd5ca dotnet-templates-7.0-7.0.102-1.el8_7.x86_64.rpm d2dcf7c46309ce7ef4006d7dbba0c28b4d1a44c2da56ab9936fd71d6ccb608e7 netstandard-targeting-pack-2.1-7.0.102-1.el8_7.x86_64.rpm 7fd06fac7c6ed0309f2bd4fa26ea6bbd890e3be7cb59638a13fe9c46ba9cd7ee RLBA-2023:0084 stalld bug fix and enhancement update The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126494) * Rebase stalld to latest upstream version (BZ#2136559) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126494) * Rebase stalld to latest upstream version (BZ#2136559) rocky-linux-8-x86-64-appstream-rpms stalld-1.17.1-1.el8_7.x86_64.rpm c87a345a98e19f757a1d558cbca24f977cd2fbbdb2017d78e9c02f7567f3b292 RLSA-2023:0087 Moderate: usbguard security update The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. Security Fix(es): * usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for usbguard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. Security Fix(es): * usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms usbguard-1.0.0-8.el8_7.2.x86_64.rpm bead5d977d07d2d41fabef3a978ed0f2989c063e606ea9a758a1faeb5f65e7a8 usbguard-dbus-1.0.0-8.el8_7.2.x86_64.rpm 749989aad3eb094437083a29d3bd008e9931e285c123bece253553ab47ddb502 usbguard-notifier-1.0.0-8.el8_7.2.x86_64.rpm 2bfaaafc8666861af9200e1252999f34c139c92a668575b7f2d1c5bbb0549a0c usbguard-selinux-1.0.0-8.el8_7.2.noarch.rpm 41b4556682f318713d2a783e5c2c86715f238c6048f5bca6f74726471a5b70fb usbguard-tools-1.0.0-8.el8_7.2.x86_64.rpm dcb2b90d6dadd791ede0fdede5e3dd072b8b11c883bba4b0a38f149f88574108 RLSA-2023:0089 Moderate: libreoffice security update LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2022-3140) * libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305) * libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306) * libreoffice: Weak Master Keys (CVE-2022-26307) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libreoffice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2022-3140) * libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305) * libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306) * libreoffice: Weak Master Keys (CVE-2022-26307) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms autocorr-af-6.4.7.2-12.el8_7.noarch.rpm a2acbc1046337231a24999cd37fca96944da05e00544367f6bb6685b9ef1e1dc autocorr-bg-6.4.7.2-12.el8_7.noarch.rpm 8f097f4746b09367ed9215cd586d5e8795dc5bf32a7c1b46138503b2c0cae56c autocorr-ca-6.4.7.2-12.el8_7.noarch.rpm 8f4ef440119488e8ecb3a6ef7cc30427c27aa29ad90b2f57f2e535f4e5654f0b autocorr-cs-6.4.7.2-12.el8_7.noarch.rpm f32e6488318c1e13d9c8b00b6e6a07fbe5d1b3cd8ec2fd5c53e6e675bebb0b75 autocorr-da-6.4.7.2-12.el8_7.noarch.rpm 15a6ff3f93665cbeb9c58eb2f41630c27081af31c8cfcdf02cb4e0e827d823de autocorr-de-6.4.7.2-12.el8_7.noarch.rpm c9049d95f09fb038b7c5b390b53f1f275ee55e690e233e8db0ae2516c237caaf autocorr-en-6.4.7.2-12.el8_7.noarch.rpm 3226adb17ce830be21ef7a8cb76a6fa138ed07ac3ee3fc2fa6c7623382fc7cfb autocorr-es-6.4.7.2-12.el8_7.noarch.rpm 7c07b45d1978064c299b7027e783aa6bcf0511c9e2fffadf38907ec784d97d0c autocorr-fa-6.4.7.2-12.el8_7.noarch.rpm 86e067b3b4d491a3cee20596a983118d992d7548720014b056aba89c176f0e9e autocorr-fi-6.4.7.2-12.el8_7.noarch.rpm ba1197204009a896f2d00633361eef3bedb2db8f88cd134c306f71353680ecc1 autocorr-fr-6.4.7.2-12.el8_7.noarch.rpm 6fb38927571c258117c3166ed00555b4624d4e03499f6d53c38f1b8352ce975a autocorr-ga-6.4.7.2-12.el8_7.noarch.rpm 3928db67a6161adac5625d5b815f475df203b35d335651624de12f2014cb77a8 autocorr-hr-6.4.7.2-12.el8_7.noarch.rpm 6a4e0fb720ef6c25064a819aa7da27feb6e93c6dbed892958ad6d0048af2350c autocorr-hu-6.4.7.2-12.el8_7.noarch.rpm 8d1fcb8bb5c7ed28f58140aeda31176861b3b2a7f9106deb1e396933c0f2dac3 autocorr-is-6.4.7.2-12.el8_7.noarch.rpm d3a16592f86ab18412bc59649326709c07a8f3feae441be87a3fa92a1b624c1f autocorr-it-6.4.7.2-12.el8_7.noarch.rpm 2e6910004b3d74422d0482f70783ce6f0c72528871890fbdd917140322f6acf4 autocorr-ja-6.4.7.2-12.el8_7.noarch.rpm e2a63c2b2951b1abeabe02057bc45ea35fc13e100e620c74df1c85fda513372d autocorr-ko-6.4.7.2-12.el8_7.noarch.rpm 29b26f830640b56aaeb8d9cc772dc896f35c0aab32948ebe1e7b091e62b25f8f autocorr-lb-6.4.7.2-12.el8_7.noarch.rpm 7532ef199db910cce2bf7766bd973545101ef54e32056f214659e237407d0a04 autocorr-lt-6.4.7.2-12.el8_7.noarch.rpm 05dddfda6a539fde5906ac149733916a83a456975a0664dfc02d4f3dda78e353 autocorr-mn-6.4.7.2-12.el8_7.noarch.rpm df06c38efe4cb546f78d3769a2c773b90089307ea864f4f0f9159af7b5264af2 autocorr-nl-6.4.7.2-12.el8_7.noarch.rpm d09a924042e4ee0e08a8c16f4e26f2cc27af118c85f6eeed02680171aa7c9b15 autocorr-pl-6.4.7.2-12.el8_7.noarch.rpm a0a658eab1ca333565965b6400e231ec428b6a8be4689c2a484272da4a43b844 autocorr-pt-6.4.7.2-12.el8_7.noarch.rpm a4c941ce560fee4df7f6af856aa915684ce447bdc5caf252122901cba0764427 autocorr-ro-6.4.7.2-12.el8_7.noarch.rpm 6bd463ffb1a2a3fa4988ac2c045739768146ce156aafff7a3ad10898d6109a2c autocorr-ru-6.4.7.2-12.el8_7.noarch.rpm 906dd6c07b6d03f5c4a50be1080c2e6b091cd854a91afef30f030fc9a4e4eb01 autocorr-sk-6.4.7.2-12.el8_7.noarch.rpm 93da6f2d360f64e6cb94c3bc344a75432aafee2c1bbde6db0202eacd70cd2bfb autocorr-sl-6.4.7.2-12.el8_7.noarch.rpm 287d5111718e8deafb4fb98aa0155f8aba062d013527a6817bdc03d4e05fb8aa autocorr-sr-6.4.7.2-12.el8_7.noarch.rpm af0214216223c081b5afa1473d2e01991e6afb903cc9646511ad3b86efdac632 autocorr-sv-6.4.7.2-12.el8_7.noarch.rpm da1c4be215f13bf761c26f36c506b8aec974c7ba070d50f5ebb7f4a0656cefca autocorr-tr-6.4.7.2-12.el8_7.noarch.rpm 2bac7674a1755ed6d618c79e1cc9fba6fd127fb39487bc366aa6d33184abebf5 autocorr-vi-6.4.7.2-12.el8_7.noarch.rpm 4cdd2ec0475100c58257073a7e6c361bd84903b37f74d05b47e5c1596c03ea2c autocorr-zh-6.4.7.2-12.el8_7.noarch.rpm 02a5fb4ae36ae7931a8eb7c60d04a60839923203aa9bbffd1916a1818927326b libreoffice-base-6.4.7.2-12.el8_7.x86_64.rpm 9deebcb58ac4783324552f21a1f2f403c46efaaf2c849b29bbffd55cc149f4b7 libreoffice-calc-6.4.7.2-12.el8_7.x86_64.rpm 45f20bd885d9ea95ad3d38da587efd34ab8566aae1fc16b9edd8b799efe6b081 libreoffice-core-6.4.7.2-12.el8_7.x86_64.rpm 3cbd9785ee4477918182a0d4b8771efcc1d520d53dc900c0318a29804204a9c8 libreoffice-data-6.4.7.2-12.el8_7.noarch.rpm 55fe5fa4565a7232047d81dc1d8d473643cdd9fce3c448fcdb2ba6d5a0b9669d libreoffice-draw-6.4.7.2-12.el8_7.x86_64.rpm da2bf1fe25abbc8e25f9a27f00a70e09d77b385673f280252b6cfeda0cd0eccf libreoffice-emailmerge-6.4.7.2-12.el8_7.x86_64.rpm 5f909c8f53dcab427922a6fc30fabac33790535014bcd5c1e3c1fa3788e293e2 libreoffice-filters-6.4.7.2-12.el8_7.x86_64.rpm 90208aa5a9fb3dff1e62632a77c50cfe9f1c89b014821bf24cb9937006fae00d libreoffice-gdb-debug-support-6.4.7.2-12.el8_7.x86_64.rpm c1057c33b91da23d108669763b6f62c85628bd14806d4ca8360acabfb372c2a0 libreoffice-graphicfilter-6.4.7.2-12.el8_7.x86_64.rpm b2f5c65f1f9e81f470b062510beae2623009f6f0a3e531f6091c54e26cc6bda4 libreoffice-gtk3-6.4.7.2-12.el8_7.x86_64.rpm 31f275dfadd60e75590b981f5e2e3d350ca435eebb744f252af0449475bd3db1 libreoffice-help-ar-6.4.7.2-12.el8_7.x86_64.rpm 03fe1c78cc0fed63f87e2b58b02a94360ccda0a533cd603ce90b28ffd3c057a8 libreoffice-help-bg-6.4.7.2-12.el8_7.x86_64.rpm fdbdfcd0a4a4e575d5f655a7ceaddac1ca11fb33c3e83d5f7c8b913f22d97e6c libreoffice-help-bn-6.4.7.2-12.el8_7.x86_64.rpm d8a96b6f2015428cefa02cfdff90902e5ae27554f0be3164696b09ea50870ce4 libreoffice-help-ca-6.4.7.2-12.el8_7.x86_64.rpm 7179140afd77d3875e0d7c9ecd43e19a654ef96fb595ffca3f59c319a6d320e7 libreoffice-help-cs-6.4.7.2-12.el8_7.x86_64.rpm 3d0747ad197014f6ba2587c7606896fb34d877a51f6f9af6915427c63393a362 libreoffice-help-da-6.4.7.2-12.el8_7.x86_64.rpm 4f0d8defeb48b46dcb66115009dd6261449ac7460fd7bb83b9d0c2e963661e36 libreoffice-help-de-6.4.7.2-12.el8_7.x86_64.rpm 5fd82a98933a3c13395abf683e16582005f6ceaeed874da10a5584b584e4050a libreoffice-help-dz-6.4.7.2-12.el8_7.x86_64.rpm 061daffcf62d23b770309154ebc96c19cc8abb0efae134b87db778fc29b223ee libreoffice-help-el-6.4.7.2-12.el8_7.x86_64.rpm 905d4b9c9ad8867b4ce77b46854e59cb419cdb71aed4156ebd130c8e7320f9b4 libreoffice-help-en-6.4.7.2-12.el8_7.x86_64.rpm 63abd46aff7062d541a9f7e153f8a7b4b5386fd77fb3e9ac6b8c401582bfd79a libreoffice-help-es-6.4.7.2-12.el8_7.x86_64.rpm 1c85f4ffba87630dc09ccadd412dc0ed175478979946ef297a58a1bb656a30a0 libreoffice-help-et-6.4.7.2-12.el8_7.x86_64.rpm f4dbf53da1e2d0d0720616421abbcdcfc883b358d903e580ebed80d16c28a7eb libreoffice-help-eu-6.4.7.2-12.el8_7.x86_64.rpm 775d73a53772925ee49bf373319613ac438a1f1129fdace2c7de5ac5911639ad libreoffice-help-fi-6.4.7.2-12.el8_7.x86_64.rpm bd195ccc3acc49c1d308eec2c61be26235758c7f4d095b92692ce3330fba6121 libreoffice-help-fr-6.4.7.2-12.el8_7.x86_64.rpm e36bbcac8772045a802c2c3da20c842fb38bede9034866b92a0ab60bf8085705 libreoffice-help-gl-6.4.7.2-12.el8_7.x86_64.rpm cf44888c78e8b61c7d611bf573987395e9bb24c769aa5c0a39590aa52db4834f libreoffice-help-gu-6.4.7.2-12.el8_7.x86_64.rpm 0964e9568867d77881795baaabf001b6b1b83cfc545ad6656281f3e7ed2352d3 libreoffice-help-he-6.4.7.2-12.el8_7.x86_64.rpm 2019265a6a8c3f1fb76433e67772bd156628f247a7065ac4ee814f671b3a87a5 libreoffice-help-hi-6.4.7.2-12.el8_7.x86_64.rpm 550c3ba6e15ba8a62da4e5f958ec8d20984b0623a6198eb30e51c6cb17c56bcd libreoffice-help-hr-6.4.7.2-12.el8_7.x86_64.rpm e07ca69bea41a1a569a8401f609c5a54f549388222785ceca143578b8a987bb2 libreoffice-help-hu-6.4.7.2-12.el8_7.x86_64.rpm 32104e85d1d031346f887858c704e16d70190ec07fb7555ddeed1adbf8b4f271 libreoffice-help-id-6.4.7.2-12.el8_7.x86_64.rpm 07a8b6ef05bc1a755c7d3e520d0bbcf97c6ea1e79e81a42f71e5037379b8aefe libreoffice-help-it-6.4.7.2-12.el8_7.x86_64.rpm b71f395d01167807bdbd5002e72533eedcc5fece8194d5e88dd6e938781d36e1 libreoffice-help-ja-6.4.7.2-12.el8_7.x86_64.rpm d838bd3b65267a5ad627fc7dd5c30475a87087eeb8cec473dcff61a652ba883b libreoffice-help-ko-6.4.7.2-12.el8_7.x86_64.rpm 9f16281ca9e6b11a806965017526ee8de81302d5292db4f0a183e61e5a4225bb libreoffice-help-lt-6.4.7.2-12.el8_7.x86_64.rpm df83459ed931fb894b00b7982486dddf4b56b76c53ac4155ec6bb639ebfb2fd9 libreoffice-help-lv-6.4.7.2-12.el8_7.x86_64.rpm d9f30c2d7bbea6f8781a95f323822eba6cf5f131df607db0fb994969487e5950 libreoffice-help-nb-6.4.7.2-12.el8_7.x86_64.rpm 9ca2b4619438b7641e4c9d0abc5953c443b4a9560859f3802df03ac89d8c2bf2 libreoffice-help-nl-6.4.7.2-12.el8_7.x86_64.rpm 656922d1e3e46d135682be6c0217e5838d4e52a47efaf9c53845a4afb206de14 libreoffice-help-nn-6.4.7.2-12.el8_7.x86_64.rpm df201fc5e2502d02a02df4c764d56ff8e0c3278f54a4621f0827c8f5c9cab9a0 libreoffice-help-pl-6.4.7.2-12.el8_7.x86_64.rpm 140c982b96d38129606fe56e2261d8f0ae0ed185370bf7789ccd89d4970d15f5 libreoffice-help-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm a45a07329a4cf98a0764bb99741585c406b1772d8f5be084b4308f8a75cad4a4 libreoffice-help-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm eb226155b12d7226a5f0c0b48eb4a98286b5bbc22c0e57b5284acbc518144975 libreoffice-help-ro-6.4.7.2-12.el8_7.x86_64.rpm fccc471b6ee0475dc03a207ae980e6dd6ed74e0734e60a255a4484ce8966f347 libreoffice-help-ru-6.4.7.2-12.el8_7.x86_64.rpm 390774ed5168088441725a2b5e7eb34e8626d66867b5980c421911831e977e3a libreoffice-help-si-6.4.7.2-12.el8_7.x86_64.rpm 4094a72260b9c4bd81bf99ff29b977e2a5e87677c94fe3d5393de0b6cf3b2c5f libreoffice-help-sk-6.4.7.2-12.el8_7.x86_64.rpm e4bf9168efcfb7d0ecb9ee06356f99c2e75ef4e2efede5cd203f57bec12c4f66 libreoffice-help-sl-6.4.7.2-12.el8_7.x86_64.rpm de5a992db120952cb0f0b613680ba963859f360f0120e7069ca482b154ebe1a9 libreoffice-help-sv-6.4.7.2-12.el8_7.x86_64.rpm e62ba73a3ca1b85f88b7841e433966a4dab2b8df1c97284c8ba9f2e926cf1011 libreoffice-help-ta-6.4.7.2-12.el8_7.x86_64.rpm 249b6a093b879d4cea82077a601fee34f28550ac80614f91bbc477f77b3cde16 libreoffice-help-tr-6.4.7.2-12.el8_7.x86_64.rpm 4bebcd0b5d9c03d0fa2d7ce9183fcfa23734c370e829ba059bdf2f42aabf50d5 libreoffice-help-uk-6.4.7.2-12.el8_7.x86_64.rpm b3f2b9baef677289e1895e22a5d0260d5a96dcd98110ce697ae60367a64c5c77 libreoffice-help-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm aeb00838fb4028809963aa331b5bdd4780cd4ae0aaadd485dcbb5bf9d0868bda libreoffice-help-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm 252db31dae8a5646f2beb4bed1d7d45452adadcd40122ebc7c3860d89db30372 libreoffice-impress-6.4.7.2-12.el8_7.x86_64.rpm 67be3a38ec41a6a2a601c6581065badf857931b4c4913778dd308ba92026a849 libreofficekit-6.4.7.2-12.el8_7.x86_64.rpm b6bdbc45d9331f47f98f51365a3319370c23504399231f50c0621b5a2edd6fd6 libreoffice-langpack-af-6.4.7.2-12.el8_7.x86_64.rpm 988d4bb624e4092d22428ba3c02418a8daf433889d326f9442b2c17432efba12 libreoffice-langpack-ar-6.4.7.2-12.el8_7.x86_64.rpm b7d0ea249c8860ca81b86340caa2f478d74b592db6a65d78c2299cd49392975c libreoffice-langpack-as-6.4.7.2-12.el8_7.x86_64.rpm 9cce1c70933c751dd20d1a544fbaa0478291b6cb12b906b3f199cfa68f27b034 libreoffice-langpack-bg-6.4.7.2-12.el8_7.x86_64.rpm cc813cecf999bcb5328f6c513ae04b04ef3733c601c503b917ef58ec6b1d0e0e libreoffice-langpack-bn-6.4.7.2-12.el8_7.x86_64.rpm d022d597fe34c30fe08a21759530fcd70cdf22ecf6134bb0c49831dd492cdb6c libreoffice-langpack-br-6.4.7.2-12.el8_7.x86_64.rpm b5cc2916adb880104a19c834aa5b78ce82b6d3fdd5bc8db8a4e9fd4547dbb41f libreoffice-langpack-ca-6.4.7.2-12.el8_7.x86_64.rpm 67853fb62255bcf3402bf99bddb7146187f9ffe7ed15359a26171beb96ed0682 libreoffice-langpack-cs-6.4.7.2-12.el8_7.x86_64.rpm ff597264ac48be32cfeb88e4f3f6f0cd2bc4b919e2b8ca72ab4fff490e726671 libreoffice-langpack-cy-6.4.7.2-12.el8_7.x86_64.rpm f167869e5da9c0f90cf7863afd4c3108aeb232d25c24e069477acc6105735b1e libreoffice-langpack-da-6.4.7.2-12.el8_7.x86_64.rpm 71dff527ec52f21588c691391242da382f280eff6d3d2a58aebb5903e576afb2 libreoffice-langpack-de-6.4.7.2-12.el8_7.x86_64.rpm 7fa65109052fc759a641b02af8f0c62872d801f8cc7cc10cd78cf323bce336a0 libreoffice-langpack-dz-6.4.7.2-12.el8_7.x86_64.rpm 0fa381039a2d67ccd8c7b99b8a0e9a6d80cf3a683742a31366ff84b3584d863e libreoffice-langpack-el-6.4.7.2-12.el8_7.x86_64.rpm f835835d16e9840a1965d89fcc2866de00260d0dd60835c10e9cb17e6c5a85de libreoffice-langpack-en-6.4.7.2-12.el8_7.x86_64.rpm 2ec84959ce5836675aa81ad37aca5d28b8aa1d6ff1221605d24b74f61fd0919b libreoffice-langpack-es-6.4.7.2-12.el8_7.x86_64.rpm 34cb6e5d14a5d01f304ec9305da161db14d817c44cc03032235df8997dbf8d4e libreoffice-langpack-et-6.4.7.2-12.el8_7.x86_64.rpm 9d067670e2d1e873b76164c19d4c64883c11ee6c84da0968bf28f3e59ead02cd libreoffice-langpack-eu-6.4.7.2-12.el8_7.x86_64.rpm 5d1041d87c60aa7a925569fdade1d024b6eac454bc6f9a3289a3e659f6ffa5f3 libreoffice-langpack-fa-6.4.7.2-12.el8_7.x86_64.rpm 2daad575be18ab653d9c941c50f93e1ca3d0e58215b02b98a628639649be0ac1 libreoffice-langpack-fi-6.4.7.2-12.el8_7.x86_64.rpm ec659e9d5b7e6cdba759a28a157f1c0df8daaefbd10e091097b73faaf7a6b3f9 libreoffice-langpack-fr-6.4.7.2-12.el8_7.x86_64.rpm edd7b8db2de740f9f6cb4dd98582a662ffbad17c750ddac737d2e5c5e023db9f libreoffice-langpack-ga-6.4.7.2-12.el8_7.x86_64.rpm 851999159c382c1b90712630287801476a7e9d263374523bb77f9cbf6fa81df2 libreoffice-langpack-gl-6.4.7.2-12.el8_7.x86_64.rpm 979da47e05ad699f615140ff8023ea06bf9111f9904f1293803dcf79b2d58384 libreoffice-langpack-gu-6.4.7.2-12.el8_7.x86_64.rpm 1c278eb3f5a666c5ab131a702ec45df4afca8ab843dc482f014a470a755da3ba libreoffice-langpack-he-6.4.7.2-12.el8_7.x86_64.rpm 7a49ecc4b338b44bc9a1735c732fd235c27b44e7975501a176738d47ae5ecaec libreoffice-langpack-hi-6.4.7.2-12.el8_7.x86_64.rpm a8f1719030de272608a23246c6b570baec60ec9226eda53121be1837f7394775 libreoffice-langpack-hr-6.4.7.2-12.el8_7.x86_64.rpm cf01d61302e7a2be6894af3ad56aeef65c0684f293ce33dc5b0299621b4a1928 libreoffice-langpack-hu-6.4.7.2-12.el8_7.x86_64.rpm db1590dc81257b73a5ece23a5a1b5b0d84fbc04358c9f449e5ad6c163d0fe09c libreoffice-langpack-id-6.4.7.2-12.el8_7.x86_64.rpm d25e6f6b4cca141b5c095803714a386db9a3ff4dc7681ffeeb82510a42f313a1 libreoffice-langpack-it-6.4.7.2-12.el8_7.x86_64.rpm c533b032b03631ad895b6b25a6ba2c4c80f2e2b9569f57f105c73bc01d4834ae libreoffice-langpack-ja-6.4.7.2-12.el8_7.x86_64.rpm f80e02f8ef9b9a2622f4331ddce869eed199bf9840bd883b356233c0a3d3d88b libreoffice-langpack-kk-6.4.7.2-12.el8_7.x86_64.rpm e8b0d4061c628d08444a9f5aa8b9335d04e5d5a9e2f7b38454e586f91e673ae5 libreoffice-langpack-kn-6.4.7.2-12.el8_7.x86_64.rpm 270d35513dd77f54c0d1ca36211595616122ff259ac05a2620a3f9925bb9aa13 libreoffice-langpack-ko-6.4.7.2-12.el8_7.x86_64.rpm 9283ba31d93a13b3f55377a470dc1de640fcd206c336eb5e519e51abb81f4cab libreoffice-langpack-lt-6.4.7.2-12.el8_7.x86_64.rpm 0f7c47353e9ab31a8fb5458ba201ec9f94cd1011478fb367ccd68febf35eed3d libreoffice-langpack-lv-6.4.7.2-12.el8_7.x86_64.rpm 7195b5abd97ca239e1d3864c82283abdd8e04881af0b3492ba1ef85cd19a7d54 libreoffice-langpack-mai-6.4.7.2-12.el8_7.x86_64.rpm 2fb567b2c0480151158ef5cc67f7ec04bf74400103609688f21c5622f7b97d7c libreoffice-langpack-ml-6.4.7.2-12.el8_7.x86_64.rpm 7cc4b7f6788ebea37e668fe237832a8a66a6d442421edd8d6229d109d9ec7ae4 libreoffice-langpack-mr-6.4.7.2-12.el8_7.x86_64.rpm 91c115e543b49a5e78530f17c379e25b5cf9c78d7c93d9df2291e374d432a1b0 libreoffice-langpack-nb-6.4.7.2-12.el8_7.x86_64.rpm 581bd3d33b559812190568278625c2c39b4320d8d7fe74a85f01cb5eb87225f1 libreoffice-langpack-nl-6.4.7.2-12.el8_7.x86_64.rpm 20bdfb91d94dc101ec3d9bc2721ffbffd997fc9132119fa27db0b4ec06326769 libreoffice-langpack-nn-6.4.7.2-12.el8_7.x86_64.rpm 3016cb44ef0366306cb0078aac79e7f0a0c0206c575306c9008145d66ee95b80 libreoffice-langpack-nr-6.4.7.2-12.el8_7.x86_64.rpm db77dc0b8ec143e88acdc36da1d1bbb9e4084170010e03e2bf58b79c9d29ed8b libreoffice-langpack-nso-6.4.7.2-12.el8_7.x86_64.rpm 3155dd4c34722016ddd10eeafc9a24e81c1cb879e88b61c8223d3f4b84fdae96 libreoffice-langpack-or-6.4.7.2-12.el8_7.x86_64.rpm f4a92984a0239b5b27e5668681ca50a0f49e356eff6f03432c30d07d4a277e97 libreoffice-langpack-pa-6.4.7.2-12.el8_7.x86_64.rpm a76a68ec57ad97c6ac55c66508b85034731ff9ac6e4ddd68170c74eb1996abea libreoffice-langpack-pl-6.4.7.2-12.el8_7.x86_64.rpm 0e3273e0b23351a66d89d1b92906ef57dfdd8eba202391c7c3a84de0ca41296b libreoffice-langpack-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm c26e0a1df1c5978da0157481215ac413a68f0e0b434334e79d3e87f050e98c56 libreoffice-langpack-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm 76f0e47cdb1a1a74d5bebf594514dab49d7df026e3a38fce97905f0845327560 libreoffice-langpack-ro-6.4.7.2-12.el8_7.x86_64.rpm 392226e87c926f15bccdc29363d14c5eddcdb85d266dbda11f36fd5e9432d5e1 libreoffice-langpack-ru-6.4.7.2-12.el8_7.x86_64.rpm cd343cc7d2863559f675b94dbad89757e754d5461e82120d8175ea044ecf9e37 libreoffice-langpack-si-6.4.7.2-12.el8_7.x86_64.rpm deed82170b53eded2a2aa0c1d60837f073643ec999000c7ce0adc765b3ef6d77 libreoffice-langpack-sk-6.4.7.2-12.el8_7.x86_64.rpm ea1f596b1a278d77e25da670aaeb8216e7cd1b6292844e56fa9ab38d34a59882 libreoffice-langpack-sl-6.4.7.2-12.el8_7.x86_64.rpm cc206c8173612f9bb5b535c3328b54306b4833937c6fafeb21b16eded49a7bf3 libreoffice-langpack-sr-6.4.7.2-12.el8_7.x86_64.rpm b042a537c159401f41ef2e0126653ba8d024b6576dc51ea2a5be99b552591152 libreoffice-langpack-ss-6.4.7.2-12.el8_7.x86_64.rpm 314ab9d62b5f2ef1507ec47263b0814cea690d1d667e7a9fd475e651c2d469e3 libreoffice-langpack-st-6.4.7.2-12.el8_7.x86_64.rpm 19da6a8cae53dddf989aa0c8e80a6dc0cb984705171c1d3620fc7d1679f0ee4f libreoffice-langpack-sv-6.4.7.2-12.el8_7.x86_64.rpm be6a63714af0510293eb3948795f94187a9e00c3776a7c91d56ece689da948a6 libreoffice-langpack-ta-6.4.7.2-12.el8_7.x86_64.rpm bae0263723972988cd74c2a2007794067ab952d28e0fd551388e3ba37d5ec795 libreoffice-langpack-te-6.4.7.2-12.el8_7.x86_64.rpm 0815ac0b02309c801410f56820727d1c28461270a2fd72912b3bae3012ebd403 libreoffice-langpack-th-6.4.7.2-12.el8_7.x86_64.rpm 5937680a0666d69f4da85e0191a0ea83c9d09a8ffe87eb37005bc985539326d1 libreoffice-langpack-tn-6.4.7.2-12.el8_7.x86_64.rpm 9b510f83317401bbdbc8c69e7f4da8f16ebff05609a43e39c3a6daa14d735d2b libreoffice-langpack-tr-6.4.7.2-12.el8_7.x86_64.rpm 44df604dd9e2db643afbdd09cadb46e467e4d5590ca7093c36649c1905c61a1a libreoffice-langpack-ts-6.4.7.2-12.el8_7.x86_64.rpm 16bf5c549b119d19cc564f05ab68486ca081f0e9aaa4532055464e65c079d30a libreoffice-langpack-uk-6.4.7.2-12.el8_7.x86_64.rpm c3bef6a2f758a0d5699fc0be420705186cdbdf81b168b067233ec51269083c24 libreoffice-langpack-ve-6.4.7.2-12.el8_7.x86_64.rpm 23f86455843a306a63e0a33bd3bb1507ca273020fbeecb9773f20d891a0c4576 libreoffice-langpack-xh-6.4.7.2-12.el8_7.x86_64.rpm 692659385202977ef41b5fcbac8e5a15d08f171857881e4b7e705c96a932034c libreoffice-langpack-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm a1ebd7b525df5d4a043a61559927f8395f2b3d0787e939a1017fa08fb851ea92 libreoffice-langpack-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm 1bae9af8241b3121500874b11585917219e7e869436d1812a188c5bc31d7177c libreoffice-langpack-zu-6.4.7.2-12.el8_7.x86_64.rpm ba355fe119f5c58816bcf23497b6641c519847deafc51a29cd896b5768abefd0 libreoffice-math-6.4.7.2-12.el8_7.x86_64.rpm f37a4dbcdf9be4062d951074c8f4c7e1b225db426320fbb23b2eb79d8e09d21e libreoffice-ogltrans-6.4.7.2-12.el8_7.x86_64.rpm 877458794cb0df1f0fb61d3ad42a0438f7598474b1203d1fd62e1ddb55983fb6 libreoffice-opensymbol-fonts-6.4.7.2-12.el8_7.noarch.rpm a23e251ac634daab48bc8affc4b2f86afebcb56cd8669ebccbc0138a8977023f libreoffice-pdfimport-6.4.7.2-12.el8_7.x86_64.rpm 3275b3a571322c4ec901e81348a05f9a2904d493752cf9362c1c2c5bec3051db libreoffice-pyuno-6.4.7.2-12.el8_7.x86_64.rpm f21111acc9a9675d026cb4b0f9de7c61626e41263ae84dcacb261213fcb15e64 libreoffice-ure-6.4.7.2-12.el8_7.x86_64.rpm 5d5a232e7d047d4916fff8f25dcd7eb1e006f67ab3dce3360cb13b3bf0176884 libreoffice-ure-common-6.4.7.2-12.el8_7.noarch.rpm 2fbcb645e02e306e13308bedee3b63ee75c65750ae227d02a2fec1bb95120bb8 libreoffice-wiki-publisher-6.4.7.2-12.el8_7.x86_64.rpm 9e7273ad2d9312b23c505ab5a5012b56a6dfde9950999f0c3b5ee648644072a9 libreoffice-writer-6.4.7.2-12.el8_7.x86_64.rpm 85547a305424608f8050c5276bd51f33c6e06cb67a288d36d1296d3475c2fd76 libreoffice-x11-6.4.7.2-12.el8_7.x86_64.rpm cf0552c2b966545f00c5731c45675c250650b86e64e0ada61e86610347dabeb5 libreoffice-xsltfilter-6.4.7.2-12.el8_7.x86_64.rpm 690cb561854811ecb4df05a9e2ba6100eb826f141cd9f32b5fce436b914b1a43 RLBA-2023:0091 idm:client and idm:DL1 bug fix and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050) * vault interoperability with older Rocky Linux systems is broken (BZ#2148255) * rpm -v ipa-selinux produces warning (BZ#2150243) * ipa-client-install does not maintain server affinity during installation (BZ#2150246) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050) * vault interoperability with older Rocky Linux systems is broken (BZ#2148255) * rpm -v ipa-selinux produces warning (BZ#2150243) * ipa-client-install does not maintain server affinity during installation (BZ#2150246) rocky-linux-8-x86-64-appstream-rpms__idm bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm 615d759274eb3f3f8c28657012cfec65b67d8a47fbf38b897955cec7bdde1495 custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce ipa-client-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm b08c20bbe1ddb56b9a845e76ca57d91289061d67f2956ea7ee44fa3891564691 ipa-client-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 87209f819bc410977be2fa83c5f0c9910664df40eb1aec1e65ba0e418d102d47 ipa-client-epn-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm d4104096325d2375fab854ab7c562dd7613429b1c06608829bbf3322d63930c5 ipa-client-samba-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm 62e6bb5cf85e591fa9fef34727767c0d6797b68424c1df291a4e318683d7486c ipa-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm b496333e37ebefa19ca28f1b164a48520fc238fd40d1c7018ad7b47a6c456e72 ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm e273335ad4d42c167d380d2367e199f7b7df5b251a42c3fea602770a842f11d2 ipa-python-compat-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm d80c8881358e6d76f7ad4e1f4d76d8553951cd1c897b87baa0d5d2c3bc8e5875 ipa-selinux-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 56fe377a8c0e3f967d3c9e1d83ce2dded61834b1fd1775151b2e21cced39ee1f ipa-server-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm e4104c83e28300dd34f62a6690fa552cc6ad508ae449b8fd903612c566f1cff7 ipa-server-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 5191bd7ac871cd910d283a40e4fcfaf91798c1c57735e0e590e3e4eb175b4038 ipa-server-dns-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 9f41755796d71148e825ac0b799bb2f49d4ca25954bcfcce7246ea03fa8e8307 ipa-server-trust-ad-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm f1263ee2cc3474f99aaf58d505cdb4fed7528bf191c4536c0d4f8c95b8825ab6 opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-ipaclient-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm b580f064a347e161cb2311b81d764f0ed89c565ff596e28b749d3000e8c7569e python3-ipalib-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 7c780868b2fa76e2ae544cead2fb817bf49cc11de7411cfa31677e30ff8edd9d python3-ipaserver-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 7849ebb2a2aba9c753b23802e8b6d0941bb899261761909ecd33df6e1549ee4e python3-ipatests-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm e970ca6b367982e7a0a22590564f05ca9f640fc2148d1afcca14f16055038d90 python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpm 614fd471d5b1912f23791f8b533172d92d1c6b27d504b4a900180f83d7e8c37f python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm c5f6dfd01f04862214fa2f092a4574889d903e9a081cae92ead60cc020557baf python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 python3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm 94698890dc8f5935b11ac8d3e2cd070ed0095cbff39670a6a09638b03045452a slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2023:0093 gnome-settings-daemon bug fix and enhancement update The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962) rocky-linux-8-x86-64-appstream-rpms gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm 12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94 RLBA-2023:0092 fapolicyd bug fix and enhancement update The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fix(es) and Enhancement(s). * statically linked app can execute untrusted app (BZ#2137251) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fapolicyd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fix(es) and Enhancement(s). * statically linked app can execute untrusted app (BZ#2137251) rocky-linux-8-x86-64-appstream-rpms fapolicyd-selinux-1.1.3-8.el8_7.1.noarch.rpm abcda5f83019703a5b94424fc5d890f8738ff16df740b7dd445d2b9301485dfb fapolicyd-1.1.3-8.el8_7.1.x86_64.rpm df7e09dfb8ada037f0b86b5514bc92c5160a6005016fb8f7c293e1960f071ef1 RLSA-2023:0095 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867) * libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) * libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867) * libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) * libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libtiff-4.0.9-26.el8_7.x86_64.rpm 731d996009cf80a502bbdfbbe30647ef6e0bfbdd3f66554f9f48181308f6f50a libtiff-devel-4.0.9-26.el8_7.x86_64.rpm 25376cf67f42de475ae2ef2dcd44e7f27195cd1da1bf8e87927cec11f2a04fb0 RLSA-2023:0099 Moderate: virt:rhel and virt-devel:rhel security and bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176) * VMs hung on vnc_clipboard_send (BZ#2148504) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176) * VMs hung on vnc_clipboard_send (BZ#2148504) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45 libguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 4456694874c9d7346f28a9f1afa1a3456df30b16304fe183ff42190cd9e708c6 libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645 libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 3c9d51c249abda39f7eb4c3a9e7aec28fd90a7bbebcade157e9bae228e0c99fc libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0 libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b libguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 0c1afa84a2ce7357193c0eae89c65ce30a9e143e7ead6c774c16371f58da4ea4 libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm e6cafc935323470c7f0fa1156693ff1fb9816931387cebcfc33057f1f535fee8 libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm f45396ca362fd4fc35b9f14babd32cfaea1321a6417308a1292f44d1224898f2 libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100 libguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 5d5c05f7f8470a00208277eb34687306aab70af2ce1bd57ac78528e631505f59 libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52 libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm 8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0 libvirt-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm b9ef5d92b48763563bed303770260432928ebcf2644488ae404bb74cc990a15d libvirt-client-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm ce89204be0bd94f46016523a96a5b389b42edfb1f04ef2ba1689bb05a5f911a6 libvirt-daemon-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3c2ee70a5dfdfafc14132ab8c1da3137cd2c36a4b283e33cfcba41a4c8a924dd libvirt-daemon-config-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3bbec6e9b75d574eddd90a32fe68cf134e78eac5bf68d3bba1d7403da60fc624 libvirt-daemon-config-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 7467b42dd7c33d8cdeeb8a170c514ac0fdf35eebd3ab435926003cdcdbf60df8 libvirt-daemon-driver-interface-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 25787b85f42279a7a61c2267e81f2232668dbdecf49cbb5c4d70b8a96bf39d54 libvirt-daemon-driver-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3b6628a226e05e3c523bc8339df005e46743aa3c6763f8155b6160f5e91aa166 libvirt-daemon-driver-nodedev-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm ec35ee6d270ef5590cbc5be2742753e2e6ed38a55d2b41a1abb8473d8ae89682 libvirt-daemon-driver-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3c311b6cbc8d7d7b0be31e792b5c7bb93abd77cd7b997004d28b7d96b73680ac libvirt-daemon-driver-qemu-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 5b20d7d9542e3cd825eb9fdceae64234fdbfe6f62a2b53876f10a7e5ccbdd361 libvirt-daemon-driver-secret-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 623bd9705a5d7e75633710957002c53e941cc33728959c4d4a8f948173e8108f libvirt-daemon-driver-storage-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm b8a434b2b8ff4852d9cdde198f94ec1543a2c667dbd6ad597982940f20855f0b libvirt-daemon-driver-storage-core-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 68f20d69d3aff90fcdd916be2fcd9610030bd42c906f481df249e3e6a42fe8a6 libvirt-daemon-driver-storage-disk-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm fe835c82f15c31348503730b4b4e57b85829152e9c0d8b58dc2a48231b4c942f libvirt-daemon-driver-storage-gluster-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm add36e2a88b056a3fe1ca77c9da9f8029962bd7179cb5e138c02e097697d9c89 libvirt-daemon-driver-storage-iscsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 9186d8c082047bbfa659071f508a90374ca06563ff98973a89659630d4c44d2e libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm fee3b3f22d8c449e4e8e4f319a8f167af737d249942f18b380838caec7e14351 libvirt-daemon-driver-storage-logical-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm e36dcf2ac32139fe7c3ac8b3fb23d3bfa0cecddf1c6be2bf5b35675964d1038f libvirt-daemon-driver-storage-mpath-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm b4894c09aa627a04ace291333e127be2c75f3b31973dfd587cb3782543176b9f libvirt-daemon-driver-storage-rbd-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm a7c64cd57ef47df61152c1c9993f16452b532e64f81ca56d95b872546cac88a4 libvirt-daemon-driver-storage-scsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm d8875d26478fbcea076efa4e89d4f75af2d3f086608613e9f13984c3fd3b6beb libvirt-daemon-kvm-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3c1c5073aae25e492ab9f6421542564e1dc6b52bb005d39a865e39695355476b libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb libvirt-devel-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 69d009e43bf2e2c7c755d75a87e473493860fac49398b681c245fe4f9681cd9b libvirt-docs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 663c0e30efd09e486901471d7d97cd20e7bc3e247e31a12b50628c52ed3719da libvirt-libs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 718445c64a09e6ac9c9212279808804c8a25a2b826f130e9baf9c4c8a40f6928 libvirt-lock-sanlock-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 136bb6f44e439667a04e2ab2748e53990861904b2c7ad6dc2d0686a24af9bb63 libvirt-nss-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 88f45182a3be869343f5dbe202488c5b25250b5f9ff44755a152877868175cd2 libvirt-wireshark-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 1a86899f54ca4946dc2aeca213014b6bfb7549e1fbda3bf63aaacce2c38da254 lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776 qemu-guest-agent-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm 3e138b0caef20c972d92060520af3b08a1518c82f5ca8b17b3f5b7b471570d43 qemu-img-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm 651d72ca540d04b24dc11018280dd00e4c031b45375b309bd428f0232f29332b qemu-kvm-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm 17c16353ba08ac5c95435a0a2ab3f9b810f1527f9cfed3b4a2a6eeb3fae7d723 qemu-kvm-block-curl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm 98c6b056792d932a19c11652131dafe24b0d08c2d97554b884bab625769dc9f1 qemu-kvm-block-gluster-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm f7042d9588143e625436adc1f3816824ac1789a702f9cc616b22eba51a56b6ea qemu-kvm-block-iscsi-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm a722b24823c0f1b17b36541665e27dc84baad2c510014626ff634e47bea3b649 qemu-kvm-block-rbd-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm e9c4de50d97764c921d79310ff6424d158c9c36434e7c49c374b1792a7327198 qemu-kvm-block-ssh-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm 82cfea9ba87ec3e13349e52154a44f554f40091a06d56dd80dfe70f41a9aef51 qemu-kvm-common-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm b326ed3e1cfdb993752f5e44abc7d0a49d45cc4184ae6a8a78a513195457a3b4 qemu-kvm-core-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm fd293f5bac296f23c3f05498709c2b157829277249d99d12bc2dbd981da1b9bb qemu-kvm-docs-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm bab4c84407fd9367dfe99eb8c738315d880e57cdea467a03bd6c8774cb5f190e qemu-kvm-hw-usbredir-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm 893ce35525c4fb2096c4e55ac749b5e5d90a608c8399b126b0b123dbfd3fbe83 qemu-kvm-ui-opengl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm ba95df516f1a674f91291cd9bacea148e341b71ad4d3edec266f8dbbd17b3b9d qemu-kvm-ui-spice-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm 06cdca54b6dc044056cb4b127704eeffefdf5264eedd57e6c89812f339756088 ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70 supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm 9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838 swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9 swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4 RLBA-2023:0102 nmstate bug fix and enhancement update Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * nmstate verificationError on OpenshiftSDN (BZ#2128555) * kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698) * Addresses configured at different order than specified at state (BZ#2149048) * fail to create many veth interfaces (BZ#2150705) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * nmstate verificationError on OpenshiftSDN (BZ#2128555) * kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698) * Addresses configured at different order than specified at state (BZ#2149048) * fail to create many veth interfaces (BZ#2150705) rocky-linux-8-x86-64-appstream-rpms nmstate-1.3.3-4.el8_7.x86_64.rpm 9963e8fdf78582885c9e319141a036c2be07928e6fa6fb28aa3fafe17ea0fda6 nmstate-libs-1.3.3-4.el8_7.x86_64.rpm b5fff4e8d7d1b685e45fc80c8ca93c92e1a1a469c94f58e707044b71ad0f8fab nmstate-plugin-ovsdb-1.3.3-4.el8_7.noarch.rpm bed1142dcd60f7ef45d0a97b62b1bb15d781e1e6b42dc491ab045940156529fa python3-libnmstate-1.3.3-4.el8_7.noarch.rpm 7086da0fa75e219045f9601ad661b7d75c84fac7527009e8be80d58d41b0ffab RLSA-2023:0113 Moderate: postgresql:10 security update PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for postgresql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgresql-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm b5778e3c960ecbf1c282ae148a86bfeb5a8f7703cbb13259a35734462e5154f0 postgresql-contrib-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 312cce0ec240fd7f0cf098d08c895c5d07e85d3d503acce17782878be5f0b533 postgresql-docs-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 9573d11bb8b959f146b64a9e99357def762484c8db8863e2c5db2cdcd2b59ab6 postgresql-plperl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 8824a8921b5af548c5bba5be9934a9bdda71a115ef6f2e29b40db5dfb9733cf7 postgresql-plpython3-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 2d7b8151757f6b5457e7abed902a33208f721b8e109592daabeab886094c796b postgresql-pltcl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm a169e67733e21d3c80e7fca6a54ac834ec2b89cd37a4c4681f92c9e67660d860 postgresql-server-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 67d43533117445da9b60e89fb6e107491d9d3948bb6280032cea8a8097bd7e46 postgresql-server-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm bb1d784e73d49c3aa92583d77247412b2002d6bea658258db9fc8471cbd2542d postgresql-static-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 360192b1246b3462f2c05b04991a80ca8b16e1a736b3e672e5ecae64f7e44168 postgresql-test-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 37fff25b576ac9319660475eb135c592f227c4fbe1ea142cf59f497d46d03efd postgresql-test-rpm-macros-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 736329addee977b43c340be5e022888d76f657f36187ee6671446e8ea27f32f0 postgresql-upgrade-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 37cdc4fb9262b144f50b09476d2650147bbcdca92b540b55359e5b00ead4f660 postgresql-upgrade-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 577e4c656a2c95372939bfe9b2e0902a17a5ec2e8e1a12d40ddd84947e680398 RLBA-2023:0115 container-tools:rhel8 bug fix and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294) * The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171) * FailingStreak is not reset to 0 when the container starts again. (BZ#2149775) * SIGSEGV: segmentation violation on s390x (BZ#2150416) * SIGSEGV: segmentation violation on s390x (BZ#2150428) * buildah: ubi8 sticky bit removed from /tmp (BZ#2152017) * podman: ubi8 sticky bit removed from /tmp (BZ#2152027) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041) * podman gating test issues in Rocky Linux8.7 (BZ#2154403) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294) * The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171) * FailingStreak is not reset to 0 when the container starts again. (BZ#2149775) * SIGSEGV: segmentation violation on s390x (BZ#2150416) * SIGSEGV: segmentation violation on s390x (BZ#2150428) * buildah: ubi8 sticky bit removed from /tmp (BZ#2152017) * podman: ubi8 sticky bit removed from /tmp (BZ#2152027) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041) * podman gating test issues in Rocky Linux8.7 (BZ#2154403) rocky-linux-8-x86-64-appstream-rpms__container-tools aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d33e11f32b7ca8bb1ab9de7144786d8b949b688760adc1785e2fe70d5f39168a buildah-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpm 9f0c8864b500eadd5916215775f4378bbad990f39cda2b4247d11721b0db555d buildah-tests-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpm 457b0e8e2753f67ab411239d353bfb70f9cbe5ff92064182824159d43231bebd cockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b6ec4da8b57643e010868c767fe370c537f59dae20ec5459864a53d026a8aed conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 containers-common-1-44.module+el8.7.0+1122+04a7498b.x86_64.rpm 6354760e20840a090eec3a3222a796c67849c5fe6910c3fda36aafedb764f763 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 119f90778569a22466b4a90fa278b1af63d137005aaf3aa5945f28a5514bec92 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c podman-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 74f931fd657a10723ac15ef27d2397fd89faca721ad7fe60c194623d8a199c84 podman-catatonit-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 9e61420bc7d316ea9a7177590cb1c40f1cefeef5a32867bf5f3efc68f5b78bc9 podman-docker-4.2.0-6.module+el8.7.0+1122+04a7498b.noarch.rpm a62b5178722e0eafc533c22556109a27b4112c027f6c36c519ca214d068b30f8 podman-gvproxy-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 83da4ead1d4252fa4e7a371dcfe027d2c9238e66df135ba4e4085660f990a9c0 podman-plugins-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm b960dcc969cd8fbdc34056dab7aaaa0c952f6e1276b4320a5fac779f7f76bb9d podman-remote-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 17133a616cd92572e037cffb207203389c6dae38052742912719b1c678834dbf podman-tests-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 71ec468e01f86958f0ea70ce32eb9b514c56b445b8a0ef370fc4817aa1c66fa1 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d python3-podman-4.2.1-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b696d0f504dd20e219ec48da145b4324efcc4ee393ebd32de98cd14f7aba3d9 runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856 skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm b2dbacf676bb36b7d618c125bba63b03b16206500f903f8ce4b76e368f16dd26 skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 8d4dda0fee2dc95c05a961422237e3ab97a7f32f0371cd7dc91c447a09ce5b0e slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm 0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b RLBA-2023:0117 virt-who bug fix and enhancement update The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124812) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-who. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124812) rocky-linux-8-x86-64-appstream-rpms virt-who-1.30.12-3.el8_7.noarch.rpm 6742c5b921bd198cb398e575a267d856ce18f5d8a20669a08474a676542ba175 RLBA-2023:0118 gcc-toolset-12-gcc bug fix update GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix: * __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131) For more information about usage, see Using GCC Toolset linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix: * __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131) For more information about usage, see Using GCC Toolset linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-gcc-gfortran-12.1.1-3.4.el8_7.x86_64.rpm 03e13ea95319e3d645ea2f2775cc0ccea2621e466ff5c74dc010e167a98048ff gcc-toolset-12-libquadmath-devel-12.1.1-3.4.el8_7.x86_64.rpm 338c60ca232485761495e5da958d652b5330b1ccd65d3e261b5cdc9f5762fce1 gcc-toolset-12-libstdc++-devel-12.1.1-3.4.el8_7.x86_64.rpm ee54399f0565380b7b194f11584e5d6ebdd7101e200810af5c47bade1dc57be3 gcc-toolset-12-gcc-12.1.1-3.4.el8_7.x86_64.rpm 9b5f7a5010bc4cb9dabfa48d27f209c3f6e963269738c66b6f08326099b0b2b2 gcc-toolset-12-gcc-c++-12.1.1-3.4.el8_7.x86_64.rpm 781f245ccae0add23839d4278b321cf5b9d0ae2e5b331bb91855c52aa1947ca9 gcc-toolset-12-gcc-plugin-devel-12.1.1-3.4.el8_7.x86_64.rpm 2baf7899cb43579f8e5cb74f042fae21115f7efc0b92d5299d67139aa34d7f85 gcc-toolset-12-libasan-devel-12.1.1-3.4.el8_7.x86_64.rpm a586e52094f104dc0a73fecf7e362f0ac2ac152cf6ebddffc4fda259e67caee4 gcc-toolset-12-libatomic-devel-12.1.1-3.4.el8_7.x86_64.rpm 66c0661ce6dba20c42cb9fa1cf04c1822b105a5b7d6ff0f6df06d2c4b617c397 gcc-toolset-12-libgccjit-12.1.1-3.4.el8_7.x86_64.rpm 9d16c50238884ed4b02b99e704d75852304956efd5727bb61c37336de641c021 gcc-toolset-12-libgccjit-devel-12.1.1-3.4.el8_7.x86_64.rpm 41b25f295df072de2e028e63b8f80b0988197a44b02f7c977384f8f1ac902c74 gcc-toolset-12-libgccjit-docs-12.1.1-3.4.el8_7.x86_64.rpm 76c1ec66d911cfa17ec5fa210e59646b66681be32b85f704b1a1bd36d341aa3d gcc-toolset-12-libitm-devel-12.1.1-3.4.el8_7.x86_64.rpm 9801969984b980d98355a12aa4f3ac935473f916ebaaba28e876b9d499a10aa9 gcc-toolset-12-liblsan-devel-12.1.1-3.4.el8_7.x86_64.rpm d09572b0ab246d1b0e908639d8499c93b9e5c75f4c6918829cdc4c927fdb074b gcc-toolset-12-libstdc++-docs-12.1.1-3.4.el8_7.x86_64.rpm 4042323654ab887b49ad764815f849518606ab569f15867dd48761efeae307c7 gcc-toolset-12-libtsan-devel-12.1.1-3.4.el8_7.x86_64.rpm 6a1892832e34258a7f2d07f12f091240d29e0ed1eee3a433d738f8a4ca43e005 gcc-toolset-12-libubsan-devel-12.1.1-3.4.el8_7.x86_64.rpm ef5b84a88e6a7c18168f2e18e87c4d42a142826522d4e84f422fa7f8528e887e gcc-toolset-12-offload-nvptx-12.1.1-3.4.el8_7.x86_64.rpm f66d3ad97d0c2fd035b402ab9e21022acf0564d0f18dfb5591ad39d6ca369bb4 libasan8-12.1.1-3.4.el8_7.x86_64.rpm 307361224e4fb47633ef6951e403bd7c322357d3065bfada304232c528b02c74 libtsan2-12.1.1-3.4.el8_7.x86_64.rpm a8195ff5331c531630c0fb049bdd7f2a741caefa72995441f20c09490e3eea79 RLBA-2023:0119 tigervnc bug fix and enhancement update Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Bug Fix(es) and Enhancement(s): * x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tigervnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Bug Fix(es) and Enhancement(s): * x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915) rocky-linux-8-x86-64-appstream-rpms tigervnc-server-1.12.0-8.el8_7.x86_64.rpm cf3ab5e942cc1a5e393cd9e5acc1d0e8ed1397ff53ef65b75081e509de13b400 tigervnc-1.12.0-8.el8_7.x86_64.rpm ff93f0dcd4015fd3f3006b4acb04bd9a67b5a63a1131811eb98155fe8010cc68 tigervnc-icons-1.12.0-8.el8_7.noarch.rpm b48a3f840827e234acbfed0abb08ad08a13cecab1183f3522f442cb6387a1ef8 tigervnc-license-1.12.0-8.el8_7.noarch.rpm 1e5413dc3b70ecc8c912f59c64120131619ce041aab3322a3bde31acedf58b27 tigervnc-selinux-1.12.0-8.el8_7.noarch.rpm 5c869e831f1586662bd5d95602fda5a00a9f83da96ee9fd1327494a391c8c724 tigervnc-server-minimal-1.12.0-8.el8_7.x86_64.rpm a28d235028fbb8d31fc91e6e498973f686176edfabd61b2f47094464c7e042a7 tigervnc-server-module-1.12.0-8.el8_7.x86_64.rpm 27655616e55c29e91a07a8bc0fa7fd8d77df71f03c1232ca7dc95cf1ebd0c267 RLBA-2023:0122 ansible-core bug fix and enhancement update Use python re to parse service output instead of grep Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Use python re to parse service output instead of grep rocky-linux-8-x86-64-appstream-rpms ansible-core-2.13.3-2.el8_7.x86_64.rpm acab7391f2aa87d836824ce414bb373fb1bcfe619db49a8976f24c74e4a988b6 ansible-test-2.13.3-2.el8_7.x86_64.rpm bea3cd7956329c0cf0e6cb9a4a588d1a50d1d838a73e86bae4b2ba1281ded275 RLBA-2023:0125 sysstat bug fix and enhancement update The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity. Bug Fix(es) and Enhancement(s): * There is no option `sadc -f` in sysstat. (BZ#2153422) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysstat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity. Bug Fix(es) and Enhancement(s): * There is no option `sadc -f` in sysstat. (BZ#2153422) rocky-linux-8-x86-64-appstream-rpms sysstat-11.7.3-7.el8_7.1.x86_64.rpm d210af3b0b24e1bf4fc87bb15608fe57d20a25ab637e8d0864e4754ec7e9bc54 RLBA-2023:0126 hyperv-daemons bug fix update The hyperv-daemons packages provide a suite of daemons that are needed when a Rocky Linux guest is running on Microsoft Hyper-V. Bug fix: * Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The hyperv-daemons packages provide a suite of daemons that are needed when a Rocky Linux guest is running on Microsoft Hyper-V. Bug fix: * Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255) rocky-linux-8-x86-64-appstream-rpms hyperv-daemons-0-0.34.20180415git.el8_7.x86_64.rpm b91f33dc859fed5149f7b43190a8faa33098b35a50f6c5b132f836f261dceea0 hyperv-daemons-license-0-0.34.20180415git.el8_7.noarch.rpm 812a72780a3d0fc19c399dbaee8b875bd908e69ed8baf4e0be87b822d97f50bd hypervfcopyd-0-0.34.20180415git.el8_7.x86_64.rpm ca77af9b558f062a22f512e0ed57c043f3f00e20980dcfd13165d6ee8f23458d hypervkvpd-0-0.34.20180415git.el8_7.x86_64.rpm 61994e50a0a399493965113fcfa8751c50af20eb85daa469a447ac7de4a598f4 hyperv-tools-0-0.34.20180415git.el8_7.noarch.rpm c3162949f7f1502cb6fa41f01885ae317db7b864c5b9fdff0436454bc2430d69 hypervvssd-0-0.34.20180415git.el8_7.x86_64.rpm 2224846553a41b8b982cec8989b766d76875fc6cc4b0c6186becd0f71b406bdc RLSA-2023:0171 Important: dpdk security update The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Security Fix(es): * dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dpdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Security Fix(es): * dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms dpdk-21.11-2.el8_7.x86_64.rpm 22ca5300970c260c52b0ac7bbb1867cbba7b37cfacc18d0345188740cf1486a9 dpdk-devel-21.11-2.el8_7.x86_64.rpm 669089120d28a19848e177ff43b5195e44a34fcb44ff8fd94a61c121366f2278 dpdk-doc-21.11-2.el8_7.noarch.rpm 3e9b40443c42f8992bdc96064f4d90af5dc0e936e6ac17eddb4f385a855311c0 dpdk-tools-21.11-2.el8_7.x86_64.rpm d7744abc8e0a9411d5f0356a5d727b4d04e7644d7e37e524e03c92d676eabf7e RLSA-2023:0192 Moderate: java-17-openjdk security and bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010) rocky-linux-8-x86-64-appstream-rpms java-17-openjdk-17.0.6.0.10-3.el8_7.x86_64.rpm e9e7771e03089060558746cbba588207ae8eb9cc34e47e325025055dc20fc931 java-17-openjdk-demo-17.0.6.0.10-3.el8_7.x86_64.rpm 56ecebee6f99d42d0e8387ea87d0d09981712b6709aed998190cc8bc3b9d3c86 java-17-openjdk-devel-17.0.6.0.10-3.el8_7.x86_64.rpm 04cf59b2a2441495ca5d0f4076bb9cc7b5891649361009470aa723efcd58174d java-17-openjdk-headless-17.0.6.0.10-3.el8_7.x86_64.rpm 74bb8ea1814f2a4229c0720451f2f21cf0c82e14ad5edae44b223dc42ee63b0b java-17-openjdk-javadoc-17.0.6.0.10-3.el8_7.x86_64.rpm 6c6b0e7c4e618fb98c586eee72ef86342a6570e01776db4fcea08267afad09a2 java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el8_7.x86_64.rpm 1d269804aa7f62145a3591d94dfc51416a3776e123868e1e0cf26671965f99af java-17-openjdk-jmods-17.0.6.0.10-3.el8_7.x86_64.rpm 116c46fa6b3ab8119f821a2051d1d261baec9e2f69fc04d5b6706f8ad5a6ee2b java-17-openjdk-src-17.0.6.0.10-3.el8_7.x86_64.rpm 66123b657e97f8e17488451422f7665b99684c4c7fac04d453b90f99d36e485a java-17-openjdk-static-libs-17.0.6.0.10-3.el8_7.x86_64.rpm a50a6f999802c4e741f2b8a2e0387de74a5dc76f1fcfe70abced24fe988b7cee RLSA-2023:0200 Moderate: java-11-openjdk security and bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797) rocky-linux-8-x86-64-appstream-rpms java-11-openjdk-11.0.18.0.10-2.el8_7.x86_64.rpm 18caaa5e464fc13acdb83da92d7c3b53e8db27105452dd287ca7e09e19fe73ac java-11-openjdk-demo-11.0.18.0.10-2.el8_7.x86_64.rpm 707064838c229e1146437aa01c8c3ccfed3f8d69b0d25a27f268cab3c08e4c3e java-11-openjdk-devel-11.0.18.0.10-2.el8_7.x86_64.rpm fda01db703e1d2bd2ed4aea3246fffde8fe63cda80f7721463e2f408cebd765c java-11-openjdk-headless-11.0.18.0.10-2.el8_7.x86_64.rpm 54403a144e1cab8e5928f3737dcf8a0a4bd030b13e533c6e40c1a34cb355b1fe java-11-openjdk-javadoc-11.0.18.0.10-2.el8_7.x86_64.rpm 0e874d5fb7bd8dab939a6d1aaecb4fd1b19be7bd04db32a0dbdef2f891f3ffb5 java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el8_7.x86_64.rpm 73c7ec6923bedeb6894a69ed0d6c0b2aeab5491140cee92596c1101f1a88e661 java-11-openjdk-jmods-11.0.18.0.10-2.el8_7.x86_64.rpm be5f0e58cf493c61ce58e2bb1bfa51e602d9eb28dd93a40bc1e8e448a5ce9dc1 java-11-openjdk-src-11.0.18.0.10-2.el8_7.x86_64.rpm 7ba5c173af6b4e35d477dc83f7807c4edd9bf0e7955ba4c08add6361c69ebd36 java-11-openjdk-static-libs-11.0.18.0.10-2.el8_7.x86_64.rpm a649cac5b71ff161fc487f3d548fa87d8b4d4fdc52f6408f04c222b9214dde86 RLSA-2023:0288 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms firefox-102.7.0-1.el8_7.x86_64.rpm 12dca0ca292da0d77916e0a6f49faa74bf5100d6cbc63ea1d71d0a6c8d00e4d0 RLSA-2023:0379 Important: libXpm security update X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) * libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617) * libXpm: Infinite loop on unclosed comments (CVE-2022-46285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libXpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) * libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617) * libXpm: Infinite loop on unclosed comments (CVE-2022-46285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libXpm-3.5.12-9.el8_7.x86_64.rpm ab919e52846cb18cae305efedecf9d19fc6b679f6ccf024467ca77f763bd289c libXpm-devel-3.5.12-9.el8_7.x86_64.rpm f8bb3f4c75ef5a7e0d73e6d9774990eef9da575028c0e36cdcad25389c127c96 RLSA-2023:0446 Moderate: go-toolset:rhel8 security and bug fix update Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144545) * crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for delve, golang, go-toolset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144545) * crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313) rocky-linux-8-x86-64-appstream-rpms__go-toolset delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm be45db0ede57b9a9918c621811a3aaffb944f36ae3770ac645652983d9c3e4a7 golang-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm 8603fffe30255d5b874e1ace361b73ff274824c1be47c5464935479de82601eb golang-bin-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm cfb35da59fa55edb3068ce3421338462b997fb411f465feeb7911c2bab26eb24 golang-docs-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm 9e547f95eec6ffd22d9b5d3228f79071a73669ae38504dd6a88f6cf535034def golang-misc-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm 98ab11139193f6c3d5450fdd71d42f292d2c89654fcea60960fcd8ebd1ab0ad4 golang-race-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm 2368396421ed2c5be2dd5c94f8ab071b2422e9602e160ed5c0982611f5938b05 golang-src-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm 5e065b3f60812a5dcc497c556258037b1ccec24238c81cf11e4e1c14a7ffc084 golang-tests-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm 1dd2f5d01b4577af7d7090cd308dd1d8b1e58470fdffd801f4b84ec5b5ea96d6 go-toolset-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm 6e6d2cb6025b922df55b69d54f8b40a5881b26e5c467f75f896e3bf93165e6d7 RLSA-2023:0463 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms thunderbird-102.7.1-1.el8_7.x86_64.rpm fe994e04fe4e95089fae7ddca1706ebccc59912375901c75c119d626178200ca RLBA-2020:4718 aide bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for aide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms aide-0.16-14.el8_5.1.x86_64.rpm cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa RLBA-2021:1808 clevis bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for clevis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms clevis-15-11.el8.x86_64.rpm 7b1661586fc311cdbc1e9f476968c2dde04253a852c5f527d9d2435114d1eb11 clevis-dracut-15-11.el8.x86_64.rpm 0fb789c732ce81f56014c82ff1a145d917fdff04ff72eedb6cf78d365318a96a clevis-luks-15-11.el8.x86_64.rpm afda820f581b0fdfffd83e4c84c834ec3413291db1061d07b3d0f197bea52eda clevis-systemd-15-11.el8.x86_64.rpm ac473976855ebcdb18d17dd0fd52173ba7991cba4e2dcf2878ff04deed4c6a76 clevis-udisks2-15-11.el8.x86_64.rpm 85e206ef9a26491b946ac8aac5497e1c37f2e370ce1311ea4b609f1219a4c519 RLBA-2021:1934 mod_auth_mellon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_mellon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpm 4e2af6902d8948be02387c6a9ce5db3423f38ce4f60913a06e463b6ce72e7b87 mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpm 7b1ffed1c79ced0755d2f174d7e67f5d933ad0cc601c2c11f0010cadb54fdc3a RLBA-2021:4247 abrt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms abrt-addon-ccpp-2.10.9-21.el8.rocky.0.x86_64.rpm 5ee629b2dfe6da1292ba48a1ddcadb9a5fdfb979fdd83099bc50cad4641d1cc7 abrt-2.10.9-21.el8.rocky.0.x86_64.rpm 4ca848af1c32062ac9b90bae1cd4a1c01d6a865d1dd63826b88c30a3adf6998e abrt-addon-coredump-helper-2.10.9-21.el8.rocky.0.x86_64.rpm 112aaf826cb796f829d006f3eaefcd3233ee4ce96668fa543ba7c8b3f0dbe07a abrt-addon-kerneloops-2.10.9-21.el8.rocky.0.x86_64.rpm 94a71406aead2da319c9552db798d8a7806fc8f5cc3164b69ca2718d894dfb6a abrt-addon-pstoreoops-2.10.9-21.el8.rocky.0.x86_64.rpm 2f6a3f38e08fceca19cff8c252cf4b141e3be530480a2521f90ec2d2578fa2c2 abrt-addon-vmcore-2.10.9-21.el8.rocky.0.x86_64.rpm 366cb174ca0120fbd00f243b5bd83dd9052096d51db307805079e8cb3a90d110 abrt-addon-xorg-2.10.9-21.el8.rocky.0.x86_64.rpm b3dc7d6e6e4a33c4973231ff25e888cb32371846962411641d3460b438f7ec69 abrt-cli-2.10.9-21.el8.rocky.0.x86_64.rpm 334b657d7240155d9864880cf4cef67b74efd775d4227f276e67bad5dec4fd1c abrt-cli-ng-2.10.9-21.el8.rocky.0.x86_64.rpm 4d168d7ebe5a74cbd850cc605756c2d86e5aa82a2af8aabec1d3a2e339d78e79 abrt-console-notification-2.10.9-21.el8.rocky.0.x86_64.rpm fcb189060ef963e226a2b8923b9fe76394e4991d0e254becefe1f389a707ba56 abrt-dbus-2.10.9-21.el8.rocky.0.x86_64.rpm e7d2887ba2fd8cdc93e57060c72fd46a288d9716236da90ab8713d9029b71a3d abrt-desktop-2.10.9-21.el8.rocky.0.x86_64.rpm c78976d5bf0c77e0b77154aad0ac4090d567bc9cef6100cbadf993a36920c2b2 abrt-gui-2.10.9-21.el8.rocky.0.x86_64.rpm 2c4ae5e3e0f6adcc902dae5eb2446d2cec7acbb0fb9678f7b8e8da3cd234d586 abrt-gui-libs-2.10.9-21.el8.rocky.0.x86_64.rpm a6d1295d2465947ced80cb78e665d6776c5c0286d03a2587267fa8e94ca986c2 abrt-libs-2.10.9-21.el8.rocky.0.x86_64.rpm 27e4e0818f02c70f3e48301bf8207987a4ed22b6677152a9a81a392adcb43668 abrt-plugin-machine-id-2.10.9-21.el8.rocky.0.x86_64.rpm 791ab7a14fa6a55bd2a4399b1825a67fdf918128e55e375c67994ed5d34e26f4 abrt-plugin-sosreport-2.10.9-21.el8.rocky.0.x86_64.rpm 7a63914d9526e7d6100c91fa14aef1064ca9ea59725be17d18d94fcbf9b1a607 abrt-tui-2.10.9-21.el8.rocky.0.x86_64.rpm dbc9d102f654163ec08b5d34381c36b2b9b12c9edb72615d472bdef0d638865c python3-abrt-2.10.9-21.el8.rocky.0.x86_64.rpm f8ffcab298928db5b191a820fb31b01a3843521f4372ff711fcbbe9fe51ade67 python3-abrt-addon-2.10.9-21.el8.rocky.0.x86_64.rpm 2626a7d26f1a525796bc5a4a2a26634a579357a36c1d69f8df797153454dc8cf python3-abrt-container-addon-2.10.9-21.el8.rocky.0.x86_64.rpm e1d2344320275136cb943025c4df9bcbd51f5feb97bdce9015ce06fb38849021 python3-abrt-doc-2.10.9-21.el8.rocky.0.noarch.rpm f4bb18000e5345149bdf78267d6d1dfd1947fcab62f66c2f1e6f21b2553085bb RLSA-2022:7070 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.4.0 ESR. Security Fix(es): * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.4.0 ESR. Security Fix(es): * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms firefox-102.4.0-1.el8_6.0.1.x86_64.rpm aa4a64a6c0ff90a5258aa86aeeac315fdcb81a784e8308fc90dd393415542e94 RLSA-2022:7190 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Security Fix(es): * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Security Fix(es): * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms thunderbird-102.4.0-1.el8_6.0.1.x86_64.rpm d93cc63434e71cb0382a5d749f1d03ebb223967aac8e90377764b005d8b0b483 RLSA-2023:0208 Moderate: java-1.8.0-openjdk security and bug fix update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595) rocky-linux-8-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.362.b09-2.el8_7.x86_64.rpm f3f3e5d43c714c292338655d64120f56e0458bd17d277521d2e63a069d2649e2 java-1.8.0-openjdk-accessibility-1.8.0.362.b09-2.el8_7.x86_64.rpm d9963e64a08609dd914326a9f0fc3feb67b7f54635a609ba8212afac72ad52f7 java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el8_7.x86_64.rpm 3a6f8d6c9bb0e787948318bbcdac0c69249056b296abce7237c977bbf1befe2d java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el8_7.x86_64.rpm b2ac3e7305bc865c7225ee004394e2ddc8fdacf8b804ca0f5ff14d4b0ba074a0 java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el8_7.x86_64.rpm 4033ab8d78a462dd4edcba2a5908b47dee03b2a8b112eaa6f1f46d55c333cae5 java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el8_7.noarch.rpm faa16af4cabb6f1c12b3c280cc0b0f3933802386268b20e734150fdf7a1a2664 java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el8_7.noarch.rpm ac11250119463f45f90401b0563633a9f252fea39e761a6dfe7e49526e7b1de0 java-1.8.0-openjdk-src-1.8.0.362.b09-2.el8_7.x86_64.rpm 58b5c066c073e979b3277b0f56a0925d40762970e99bfab0d4f51de97d4e09f5 RLBA-2019:1957 python3 bug fix update Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) rocky-linux-8-x86-64-appstream-rpms platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpm e061be87d99f859fe7cac6853a43d7957ecc17ea0ded870b5850a4f24224df14 platform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm 588192663a8a3e778eadad56f14130aef027f3871a811e207c8c7a8771ac9649 python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm c70ef43afe7f308fb8412fe1fe36a7c555cc62e2ae5a26ff9afa96618997353d python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpm d5c856183b44e0e8769cc862ad7cc38d3d220ae3238d6bb3213baa7c6c0618db RLBA-2022:0315 glusterfs bug fix update Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges. Bug fix(es): * Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593) Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glusterfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges. Bug fix(es): * Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593) Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages. rocky-linux-8-x86-64-appstream-rpms glusterfs-api-6.0-61.3.el8.x86_64.rpm 4245c2155884aaea53a2fc2f47de6963d11dc63c14e860a4fedd4c8711ccfcc5 glusterfs-cli-6.0-61.3.el8.x86_64.rpm 74338514784fd16f87af53856fe909b14bf953837b22c2077051132190540f6e RLBA-2022:2006 python-pip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pip-9.0.3-22.el8.rocky.0.noarch.rpm 65271a7c3eca9c50250011cda76b6f71dd6d16e467d477bdb7463815f3c72616 RLBA-2022:7739 sssd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sssd-idp-2.7.3-4.el8_7.1.x86_64.rpm 3c6c95405c3b4e996b6bf4f2cc6485b989ea323907be522fad24fe0c3956679c RLSA-2022:7790 Moderate: bind security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bind-9.11.36-5.el8_7.2.x86_64.rpm 21abee84a89028d14ce98980aa383f28918bde55413fbd9e0cac50b19fb800df bind-chroot-9.11.36-5.el8_7.2.x86_64.rpm c0145d2d72c77b41ddd899f6cfbe5f616b0b9dff9c142767a31144375e78e082 bind-devel-9.11.36-5.el8_7.2.x86_64.rpm 09a84b9fa5fad18116b216c46c47aed57687a4836220f1efe46ccfab229322be bind-libs-9.11.36-5.el8_7.2.x86_64.rpm 91e2c3e97c80d3bf7889b9a54a56b5023f0f836b5ff90fa0d9d89c57daaa7dc0 bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm 1076cfd8cf8a54db16a2bd8ad4afac3af11af0c7b64efca9f099001be25abac7 bind-license-9.11.36-5.el8_7.2.noarch.rpm 6962b9370b7289b60f13dd744a4686cc326e572e0d78146d05bb2d185cc25609 bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpm e92594606ed4e209aeee470bdbbb0f914407eaacbaaf51287dd0b87d2c11f9e2 bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpm ff6eeac2c720aa70d0833d6f67674797320f7a604bd0e89d7e3b104dc218a09d bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpm ac101cab9169d403cb52c7102ccd5464f7bd937c8433402506275a1888b2f367 bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpm f4b183526a9aa05136adbb5e85f751d999d7890304108ba2398bf1d7c6c15684 bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpm dbe7c50b37b95e2cd134a1985e23e9c31573b20a06870e7e81280c52f78a7cf8 bind-sdb-9.11.36-5.el8_7.2.x86_64.rpm 0c54ec1aa90b2dbd9db277762b9c87e5c203662c7e9fb4e4f339fd5d0e508127 bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpm 4b1f0cbc1fb7fb538f4dfaffd41e20b56067054ab12452ead829aaeadfeba5f1 bind-utils-9.11.36-5.el8_7.2.x86_64.rpm 32150af88921ca072ecb2c37e21606693effcba9264fbe9b9acf52fe11a5df5c python3-bind-9.11.36-5.el8_7.2.noarch.rpm b218709131629d02a30d045c0bcf541ee2262bbd083d07b35e263675fce0703e RLBA-2022:7832 python3 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) rocky-linux-8-x86-64-appstream-rpms platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpm e061be87d99f859fe7cac6853a43d7957ecc17ea0ded870b5850a4f24224df14 platform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm 588192663a8a3e778eadad56f14130aef027f3871a811e207c8c7a8771ac9649 python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm c70ef43afe7f308fb8412fe1fe36a7c555cc62e2ae5a26ff9afa96618997353d python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpm d5c856183b44e0e8769cc862ad7cc38d3d220ae3238d6bb3213baa7c6c0618db RLBA-2019:3504 bacula bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bacula. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bacula-logwatch-9.0.6-6.el8.1.noarch.rpm 3016564651a9da24f61d8c4aa305a02824a187c9091bc1681a52d10a6832d067 bacula-client-9.0.6-6.el8.1.x86_64.rpm c346095d229f1528a36c8a82ceb7da20dba9df90e898cfeed6675b8f84030554 bacula-common-9.0.6-6.el8.1.x86_64.rpm d74736d715f0460f6e99bbb53a8b294d73322d79b44f72aff61cf67b6fd9368f bacula-console-9.0.6-6.el8.1.x86_64.rpm 328188f833994e665854f6e9dac0318f0d5b3b173cf61e99c9e90db263d83f1f bacula-director-9.0.6-6.el8.1.x86_64.rpm 223f0598bccfe7f7f701accdfb7ab1319b8dd5e2cb0fba0f3af8c019116e29d5 bacula-libs-9.0.6-6.el8.1.x86_64.rpm c807cfdfb40d327febd118a75b5b28cbecbca8a646b5a374043b48c0f29d51d4 bacula-libs-sql-9.0.6-6.el8.1.x86_64.rpm c72d1f9187711a8d0a2db2d266bfcb3becd60a04f626f95604e68ed4bd9fef60 bacula-storage-9.0.6-6.el8.1.x86_64.rpm 086250c48ad4da8f952c482078834afc9e206ed6a51d07011e34cca7c7994f72 RLBA-2020:1362 .NET Core 2.1 and 3.0 bugfix update This is a bugfix that fixes some issues in .NET Core 2.1 and .NET Core 3.0. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet3.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This is a bugfix that fixes some issues in .NET Core 2.1 and .NET Core 3.0. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm 03b09603d78a15dc7eba4508d4f9834f441d2a3b832b9f005870a5142c1da8dc aspnetcore-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm 80d6ad709313d91d603c9381cf205260c7bcd17bf47ee5bde3dc1576e762d8ff dotnet-apphost-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm 80b4decbb49a7acf692aa1a600e111e3f4ef7bc71cbe210da7e5ca674b84e559 dotnet-hostfxr-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm e7fe9237eddaf12854c060c75672919cbb6e254d1db07b90aba09261a939ee71 dotnet-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm 24ae1890686f4b846d5a6de6bcf5901f72e998785e38b444c716b76be73fbfac dotnet-sdk-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm 1e1712cf06699de75847284e234a4fc543a981e1d29adc4126d70c1d18be53c8 dotnet-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm cfd5643b251f02203de9ae5c584d349f43645b586ae8d4438b6507ac21c1e8b2 dotnet-templates-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm 98baacba1ce69bc37424dc56bacf75b27d3dbdeff537c94f5912c02fe6724ea6 RLEA-2020:4672 autogen bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autogen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms autogen-libopts-5.18.12-8.el8.1.x86_64.rpm e75151160d3fc3958dce91ffb51953b00e93a8cb3cb5a43b7f93bf59fad00ca0 RLBA-2020:4734 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libblockdev-2.24-11.el8.x86_64.rpm 5da174eafaf69af62408a4815a01f3dc246ef681fcc8e7014b0fce0403a674cd libblockdev-crypto-2.24-11.el8.x86_64.rpm 2d4d820490c96a4d9c5c75b7cb3ae1520b579e609356fa336cd7fe4800f9f23d libblockdev-dm-2.24-11.el8.x86_64.rpm ddb1077966da4cd352a7e5054ecbd6393c5294c45a10185f794f19e1f5213924 libblockdev-fs-2.24-11.el8.x86_64.rpm 1ad19562185e8206dc5175b37b20453977bbeeaf4e69c90f0c2701f6a3297be8 libblockdev-kbd-2.24-11.el8.x86_64.rpm cb09b43aa55feab2e48ba005abfedfb8e8bb0170aaa731daeeecea050036b1d6 libblockdev-loop-2.24-11.el8.x86_64.rpm f99218c09d4e71cb3da31faf10c85a3e4e324fa30a2a499104bb554ee7ae9394 libblockdev-lvm-2.24-11.el8.x86_64.rpm 5987c9cd3365981b4e3f0c03f572adbedc4e6e2a27909cbc164c3f2f1b518235 libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm 95c137f79bd41a9f791c48be71008650e3aa7354ab5ac0d6cd54b5bc961cf294 libblockdev-mdraid-2.24-11.el8.x86_64.rpm 40841584b5e8ba50c0316fa6a41a6bb20e470fe8486cc8868bfd1fbf47b55186 libblockdev-mpath-2.24-11.el8.x86_64.rpm 6c11510d841ff0405a0630e37d1ed79d9f741fe85a18a6dc366a4daf7c6165e7 libblockdev-nvdimm-2.24-11.el8.x86_64.rpm 8f5f06d54c67ec053c3268a228e95c91c46741a9976adb23df6f7627ea27989b libblockdev-part-2.24-11.el8.x86_64.rpm 979ebb94b393928e80524a055ced8c32914e3bb69fdbeb7548d61e86048b49d6 libblockdev-plugins-all-2.24-11.el8.x86_64.rpm fd8cdb42a8c71a3313807d62340daaaa650588184e86a039197d94a44b31d7e8 libblockdev-swap-2.24-11.el8.x86_64.rpm 1a319f5063476b8af2207e8d0d8b8564ad66412886b4cf3c337e069c443b5c23 libblockdev-utils-2.24-11.el8.x86_64.rpm c954d6b891f0140d997e1f3106e9cc023ee920288c017910fed598501e321ee1 libblockdev-vdo-2.24-11.el8.x86_64.rpm 3397635712651d00661b4f91563eb6aaaec753824b97fb4e8de64e6a17d9de49 python3-blockdev-2.24-11.el8.x86_64.rpm 00fcf1707621b8ff4a0de879d5e401b5b738a05783621ec8e85c4bfef705300f RLBA-2020:4842 anaconda-user-help bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for anaconda-user-help. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms anaconda-user-help-8.3.3-1.el8.rocky.3.2.noarch.rpm 12cf830d8c06d8c4a5f9de5f032ec9d3f9fb74fc87c8996c6a0d913e1076a2fb RLBA-2021:1864 initial-setup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for initial-setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms initial-setup-0.3.81.7-1.el8.rocky.x86_64.rpm b0679fe50c82447897f0c44b29a54a9a9687350456cd7ee3cc275ad7190c2efc initial-setup-gui-0.3.81.7-1.el8.rocky.x86_64.rpm 93a078d2f9570a23ba553f45d203254502708391e176eab4ebefb876761e70b1 RLBA-2021:3240 .NET Core 2.1 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * BUG_TITLE (BZ#XYZ) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * BUG_TITLE (BZ#XYZ) rocky-linux-8-x86-64-appstream-rpms dotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm a4d8e71402fc6bd36ccae8ba4395eb873b0f3c784db09d3084e6ca440cda925d dotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm cbfff6de30501753f7e3e22633e6bb2b79f127fe1aa3852be5f49569a0197f4c dotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm b01ae5a57232950f63cd3847d35e22abbbb6ed9546f798908e4f2c4f5e491649 dotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm c366fad3118e4a8e74178c05148f40faaf4f058e720a4bf78926f6713b259deb RLBA-2022:7462 anaconda bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for anaconda. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms anaconda-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm 14306fbc0585ea126092684577dd78c997a03dda55f075c5e860447729b820ad anaconda-core-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm a72b8c6d78e2df066d85d66436287bbe54e8681c738df026216680fcef5620a3 anaconda-dracut-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm decf0a6c4cf9205f0d5b7cf816b59d941dbf6989e5918b3fc267de57407d8869 anaconda-gui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm b489cf953ec8e843d54407de768f8a265835e8ece54f30de57de15722dfee29f anaconda-install-env-deps-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm 62f966ca820588e7047171e4cce1ac7bd5b15f0da633f9fd83afc77b9fe82ff5 anaconda-tui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm bebe596166ed2e9ce70c6108d011b8fab5e168af9a5b1e61c0ba387755736b14 anaconda-widgets-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm ef49cafda3feb4032b7c9d025ebc15ada7809a5c0e0394b0094ecfcf039a4dfd RLBA-2022:7563 scap-security-guide bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms scap-security-guide-0.1.63-4.el8.rocky.0.1.noarch.rpm b2a48fdcce6aecf0fc3e03ba450c2e5cd7e5d11b7d8d0409e62b4607e1d39d3e scap-security-guide-doc-0.1.63-4.el8.rocky.0.1.noarch.rpm 456dfa8d08ed0c210c6fc9c61c2614d08184c63be5b90e949e285044c11b8cb4 RLBA-2022:7573 pacemaker bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pacemaker. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpm 3140cfc42a7891db48ccd246e8e9cbbbf6bd63470ca182d69d41b638bf54d33c pacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm 98c2f138e3b705ee8a47cb1649347a579fedee8fe73edff425f2e45b9d22e96e pacemaker-schemas-2.1.4-5.el8_7.2.noarch.rpm a50616f73a2a2e456d3bba21b8b4892c73814cc429db6bd992bd6eecaf5c6d3f RLBA-2022:7576 WALinuxAgent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-6.el8.rocky.0.1.noarch.rpm 26ca415b8dd49908429e9eb6083d4021e9e59e6a5b4a104551eb5e1233819458 WALinuxAgent-udev-2.7.0.6-6.el8.rocky.0.1.noarch.rpm 289a7a9eaaa0b08fed39797e3dcff0ca31e1803de199982638d47f7c716002d4 RLBA-2022:7588 lorax-templates-Rocky Linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lorax-templates-rhel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lorax-templates-rhel-8.7-1.el8.rocky.0.1.noarch.rpm fafa48c90f1691b8b0d7a11db3797202891ebbb40141c69153116989d570ca53 RLBA-2022:7635 openscap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openscap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openscap-1.3.6-4.el8.rocky.0.2.x86_64.rpm a9c8fcf39e5a3c78777fd13e99ab9e9068ef7bc27f2e6a31d44a653e8a82af4e openscap-devel-1.3.6-4.el8.rocky.0.2.x86_64.rpm 797332aa46d047b77da8e2aeed59d299e90093423d0b5cc36537180d4c0bc7ec openscap-engine-sce-1.3.6-4.el8.rocky.0.2.x86_64.rpm 096db4413ec320ccc6b4b90a8e61a5e060e6bd03fb54a67eb454f348812a6dc0 openscap-python3-1.3.6-4.el8.rocky.0.2.x86_64.rpm 2029d8040215779088eda229a66dd9d8c62f21a263e1c2347a228f4f41dc0312 openscap-scanner-1.3.6-4.el8.rocky.0.2.x86_64.rpm b7434cd2d2fa7a294c62d1ffe0573d2c156d108cdab0f98d30c02253cceef8cd openscap-utils-1.3.6-4.el8.rocky.0.2.x86_64.rpm 2fb8149ec7f11aec5578c45ba7e146d7e149bc57faa6822371a661cd0acb6bb6 RLBA-2022:7831 osbuild-composer bug fix and enhancement update The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients. Bug Fix(es) and Enhancement(s): * osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osbuild-composer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients. Bug Fix(es) and Enhancement(s): * osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532) rocky-linux-8-x86-64-appstream-rpms osbuild-composer-62-3.el8_7.rocky.0.1.x86_64.rpm 8262e7655a6fcb6b2d662e008a04b7dd6cd220d068a5b5cc6bf988c18aab8ae1 osbuild-composer-core-62-3.el8_7.rocky.0.1.x86_64.rpm 94dc3d530421be596cf771a39fae7c08cb7e0b07ef95c95904f6ced4fc08ecb6 osbuild-composer-dnf-json-62-3.el8_7.rocky.0.1.x86_64.rpm e2bb916e89a9eb86f7d8bcdf96038cf6085cf44f3040692cecb55cf4a96131df osbuild-composer-worker-62-3.el8_7.rocky.0.1.x86_64.rpm 77c71158f924058584b2df864b8224a5e5f39b0d1a0361a9f87bac257a257184 RLSA-2023:0606 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms thunderbird-102.7.1-2.el8_7.x86_64.rpm 397c7a3d617f303fa340ad25ca56e7a82e592fcd0ee0b605fc3c7f7cca736eb7 RLSA-2023:0610 Important: git security update Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: gitattributes parsing integer overflow (CVE-2022-23521) * git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for git. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: gitattributes parsing integer overflow (CVE-2022-23521) * git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms git-2.31.1-3.el8_7.x86_64.rpm 9220dd3b23a10da6bb25972c39c0fb7b3c7c15b73e364a3f81d87a795a29b9b7 git-all-2.31.1-3.el8_7.noarch.rpm 92c2733e6f2b2645563181303f32f3b2d5a188a7778c8fd4dc8faba73d8fc36e git-core-2.31.1-3.el8_7.x86_64.rpm 20674b16cc56df61db92841fbd59588ca24fd21806c703c808cb44ecc4fcc770 git-core-doc-2.31.1-3.el8_7.noarch.rpm 4678360948f2e508f9ab7c4b00f80544d20933b3fb18756e6de86f5e7f3ce4b3 git-credential-libsecret-2.31.1-3.el8_7.x86_64.rpm 69ec8410420bc70ac0dbb562dccfaed5e5ed1fd82b11a629eccc839268483144 git-daemon-2.31.1-3.el8_7.x86_64.rpm 9357f576178574808fe508bd81ff93896917981e7b757c1fe814d39768307c5f git-email-2.31.1-3.el8_7.noarch.rpm b34c1136de772988f05da4d6b1f728e055e7e664d644110e539af54d32c1cdd0 git-gui-2.31.1-3.el8_7.noarch.rpm a2a35410f875c09789a0eb2fe5df9aa2f50ccff2358eafa95a27723b28c31375 git-instaweb-2.31.1-3.el8_7.noarch.rpm 3ed7d7cbaff42c2730ad0c2253188f5fbd539093dd6ec17b9af8f1c6263f0ba0 gitk-2.31.1-3.el8_7.noarch.rpm 7647f119c5e1fb3d7b1057b7e21e7a680ad70788929ed67e9b8d31abde6e514f git-subtree-2.31.1-3.el8_7.x86_64.rpm 1cac01052d2d6fe529ac48eb17744ff28fb715cff5adb010892a8b57c50585c0 git-svn-2.31.1-3.el8_7.noarch.rpm e7ffdb663725cab152b5eafd635a6bc5cf01e4cbd5c3c096d333d41317f36712 gitweb-2.31.1-3.el8_7.noarch.rpm 9bdac44d92e84e6e95ad7e57e44ed9974e875ae07c4d16cede18b0a22504364f perl-Git-2.31.1-3.el8_7.noarch.rpm 8ce9eb777428d346828044559ded2afa7b0f05ad5fb1037d1eca7e5933f549f8 perl-Git-SVN-2.31.1-3.el8_7.noarch.rpm cdd3d630ad5e75fb3c470197cd865f9a75ecb1e06ebec2047937f0544d5d0683 RLSA-2023:0662 Important: tigervnc security update Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for tigervnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms tigervnc-1.12.0-9.el8_7.1.x86_64.rpm 4c5a4f86b80bf7056ddb8958cfe88bf79f4dec20a575de0e2cafef9515696da6 tigervnc-icons-1.12.0-9.el8_7.1.noarch.rpm 1e7a585b86d309435f29652a9fc2f9a1e07c0797336ad4cc9c31221fc52d76a2 tigervnc-license-1.12.0-9.el8_7.1.noarch.rpm ae82f5bcd77a8bb854d780e344b39c468503cef8767de5e1a114d6c13317173f tigervnc-selinux-1.12.0-9.el8_7.1.noarch.rpm 82279d622f3b7172cde9cfa37e5ed89a4b5f0734e293d0f4c662ed67983bece3 tigervnc-server-1.12.0-9.el8_7.1.x86_64.rpm 7dff90cc4f543e04b61fee3f36d80e84a1e9c4adc6b5ecaf9b0761c87d4af68e tigervnc-server-minimal-1.12.0-9.el8_7.1.x86_64.rpm 9ee941199be3911ecfa7e203ad129d6292653a77032950edc91b07afa2259ecd tigervnc-server-module-1.12.0-9.el8_7.1.x86_64.rpm d12a5a5e1a1258f6e3eeb25acfc8d1c1013a6470d300bcbd232cd3a138aab396 RLBA-2023:0783 .NET 7.0 bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3. Bug Fix(es) and Enhancement(s): * 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z] Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3. Bug Fix(es) and Enhancement(s): * 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z] rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.3-1.el8_7.x86_64.rpm 20884c95c3afd7e70d88c2f8f8eac26a0bb8e897cba25df6ec8e09dd208b1884 aspnetcore-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpm 5a3c338518ec311c7dfcdb9270e18deb939be1d94433ea3011d93f1428143271 dotnet-7.0.103-1.el8_7.x86_64.rpm d3477447a067a18b36414603d7b523732a183752f8aabdb393aef93fbc31c813 dotnet-apphost-pack-7.0-7.0.3-1.el8_7.x86_64.rpm 990241696c3ca0502378577dd827ee5c384ba879251d7c931c38e17d04430b29 dotnet-host-7.0.3-1.el8_7.x86_64.rpm c062a02e6fb5bcb5278b7d51d10ea2e4dfb458e26b0640c0162ccb9f59bfa53a dotnet-hostfxr-7.0-7.0.3-1.el8_7.x86_64.rpm 68a035d80d6084f2a4ccec5ccb69c6e78f0fec825405c60edf1c27cfbbf3875c dotnet-runtime-7.0-7.0.3-1.el8_7.x86_64.rpm 2fa8101d8215618813e9ba6b2c184944084f046d5267ffc7f898a83a454a2b0a dotnet-sdk-7.0-7.0.103-1.el8_7.x86_64.rpm 9861a45dcab2dc661af7ab31eecfdb79f08a56b60236cd938fb28038241f83e5 dotnet-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpm 4f2929540b08ed3f22ea26382f07cb2eb865fbb1025021c9357bb038c012360e dotnet-templates-7.0-7.0.103-1.el8_7.x86_64.rpm 187896b19f8a806dcd357ca1e720e92e93bd5436531f71fecc5679f5f682f186 netstandard-targeting-pack-2.1-7.0.103-1.el8_7.x86_64.rpm dceeaab4ed466a0f86ea384ef902e4676aa83653aa6e7ac708694b9de89b57c1 RLBA-2023:0784 .NET 6.0 bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14. Security Fix(es): * 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z] Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14. Security Fix(es): * 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z] rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm d927a4505fdcad23195573f6d52c80434f5b4a621449aa24f516c9fe811239c6 aspnetcore-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpm 370d95f0e7be0454313071af1368521fbe6731df7e916787f93c6356c6d298e7 dotnet-apphost-pack-6.0-6.0.14-1.el8_7.x86_64.rpm f8bec232847567d9a518812b09dad2c46e721dda2a6b0408ee6aedd93f4a4e81 dotnet-hostfxr-6.0-6.0.14-1.el8_7.x86_64.rpm eae9ca989c5f4371de03757903e575490f006ace86b401c6cd138a43f0d3a071 dotnet-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm 25c974c86d5834beba5c58fd787b021f792c2b994514b7373749acf5c84aeff4 dotnet-sdk-6.0-6.0.114-1.el8_7.x86_64.rpm 8b6f7fe708e0d43d3c23a47f58a7ee148b609532c4403337c00d9d9854919635 dotnet-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpm 60e6b60fde9cbd89bfcb3ff099e9491e38ade49488d2285cfc50a3f06e736b2b dotnet-templates-6.0-6.0.114-1.el8_7.x86_64.rpm 7d68bed970785a9e9640e7f78e1d18b8e409c5763b25ead6eca982b665122d4e RLSA-2023:0833 Moderate: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms platform-python-debug-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm 936765318cdb96d7a45dda4bf78149a39f9f22d22573c9f4c8ac0a938145df70 platform-python-devel-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm f146e3879b706ef315779f3c166be4390e5e8d1b7955d3f4a03c9bc13f29f4db python3-idle-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm aabcaa0d5666f67972bf5b0a6fb6d43497eda585884c7e3596d5f33bb17da541 python3-tkinter-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm be68cdb65121707231fc3458a0d199b5792b1a43d51f45bbfc0ea153972e8e0f RLBA-2023:0836 OpenSSH bug fix and enhancement update OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732) rocky-linux-8-x86-64-appstream-rpms openssh-askpass-8.0p1-17.el8_7.x86_64.rpm 14a7425e79ab4665d925887de9418eac2d157d1cbddbdc1ce45ec08f67abbf65 RLSA-2023:0838 Important: samba security update Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms samba-vfs-iouring-4.16.4-4.el8_7.x86_64.rpm ae778fc011fcc31ac814544fdfa17454875fd044ee944a6492c570f6d4321ef2 RLSA-2023:0808 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms firefox-102.8.0-2.el8_7.x86_64.rpm 1b1d59a6021a0ac5ca295d1b120d2176cb87a73cba1bb35262a2d55dad536301 RLSA-2023:0821 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms thunderbird-102.8.0-2.el8_7.x86_64.rpm 3f2e6dee35aacbaec3ad880cb84c1c8b020b26d9bb82d5a4fb1845efaa5a8809 RLBA-2023:0829 scap-security-guide bug fix and enhancement update The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2168050) * DISA STIG: SCAP kerberos related findings after realm join (BZ#2168054) * file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2168057) * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2168060) * Rules concerning audit check for content of specific files, and not /etc/audit/audit.rules ( ex xccdf_org.ssgproject.content_rule_audit_immutable_login_uids) (BZ#2168063) * The stig rule xccdf_org.ssgproject.content_rule_sudo_require_reauthentication fails due to space in in the "timestamp_timeout" value (BZ#2168066) * Some rules have proper STIG references but they are not part of STIG profile (BZ#2168069) * Two CIS Level 2 Benchmarks are listed in scap-security-guide under CIS Level 1 Profile (BZ#2168072) * Update Rocky Linux8 DISA STIG profile to V1R9 (BZ#2168075) * Rebase SSG to the latest upstream version in Rocky Linux 8.8 (BZ#2168079) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2168050) * DISA STIG: SCAP kerberos related findings after realm join (BZ#2168054) * file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2168057) * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2168060) * Rules concerning audit check for content of specific files, and not /etc/audit/audit.rules ( ex xccdf_org.ssgproject.content_rule_audit_immutable_login_uids) (BZ#2168063) * The stig rule xccdf_org.ssgproject.content_rule_sudo_require_reauthentication fails due to space in in the "timestamp_timeout" value (BZ#2168066) * Some rules have proper STIG references but they are not part of STIG profile (BZ#2168069) * Two CIS Level 2 Benchmarks are listed in scap-security-guide under CIS Level 1 Profile (BZ#2168072) * Update Rocky Linux8 DISA STIG profile to V1R9 (BZ#2168075) * Rebase SSG to the latest upstream version in Rocky Linux 8.8 (BZ#2168079) rocky-linux-8-x86-64-appstream-rpms scap-security-guide-0.1.66-2.el8_7.rocky.0.1.noarch.rpm dfd5eb2341faf8bd344febca1e8f956ce8c4b8166ceaf62de578ec14f3135927 scap-security-guide-doc-0.1.66-2.el8_7.rocky.0.1.noarch.rpm 759b5bb60fe3c23980c8f6d86623dca109434f3cff6d589d290c2df3bb643373 RLBA-2023:0843 fence-agents bug fix and enhancement update The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * OCF Timeout occurring on fence_ibm_powervs (BZ#2136203) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fence-agents. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * OCF Timeout occurring on fence_ibm_powervs (BZ#2136203) rocky-linux-8-x86-64-appstream-rpms fence-agents-all-4.2.1-103.el8_7.1.x86_64.rpm fd7953a814d1018b0e42b1e216a639834e3dd22ea130d089be5805d15ef03970 fence-agents-amt-ws-4.2.1-103.el8_7.1.noarch.rpm 8c00ccea26f7b360ac09250aa2b2af0172c71fe2a42969dd04e977e239af31dc fence-agents-apc-4.2.1-103.el8_7.1.noarch.rpm 90dafd27ef4ef6dc99f86ca6e72acb76560dc191c212b82fbadb92b8f58a72cb fence-agents-apc-snmp-4.2.1-103.el8_7.1.noarch.rpm 95d84cc1cba8737941dec24ac541b16e2e5375e9ee45d1da49febdb37c6db9f3 fence-agents-bladecenter-4.2.1-103.el8_7.1.noarch.rpm 9f7a7df06ae78995cf11e04e74e5d73adaabe0fdd923ee3b7df0480e53df2de9 fence-agents-brocade-4.2.1-103.el8_7.1.noarch.rpm 362cafe82034539c42cf1c377107f8db5679ee8a44ad30c45b77237ca33df60c fence-agents-cisco-mds-4.2.1-103.el8_7.1.noarch.rpm 0ea69bd61343e42aeee408fc8f0028cb6f8873b7d14e2f3cad2d44e7c3c6cc81 fence-agents-cisco-ucs-4.2.1-103.el8_7.1.noarch.rpm 33d31ee82644f04f2edb6d7916547c4ba1eab1ad9f0a9f68b91a82026a4fffa2 fence-agents-common-4.2.1-103.el8_7.1.noarch.rpm 0a009c76338e52de26effaa57065835fe75e4fc9c863e0f552a686338f0efdeb fence-agents-compute-4.2.1-103.el8_7.1.noarch.rpm 2bade70a59ea019236552e56dfb03904650903bfc297506bd9d6077af1d89811 fence-agents-drac5-4.2.1-103.el8_7.1.noarch.rpm 4821543523adcd5f17f652cf838bbc741942f8887c0c3b9e27f934fd3360e12e fence-agents-eaton-snmp-4.2.1-103.el8_7.1.noarch.rpm 076412f8793f721e3be4bc4bfe162f93be81bea014aa23535516ac37f97c4074 fence-agents-emerson-4.2.1-103.el8_7.1.noarch.rpm 8022b609fac6fbece70d9fcb70cc8fcbfa43f99cb117433dc3d280798f4d4f74 fence-agents-eps-4.2.1-103.el8_7.1.noarch.rpm 1f8736221f4dcfd87c19c217c5be485a1481917887896cece3bd1cf0d592f3a9 fence-agents-heuristics-ping-4.2.1-103.el8_7.1.noarch.rpm 295d65e78509d881d8ae6890a99ec1de078d4e66a8a9472e82a583fec763495a fence-agents-hpblade-4.2.1-103.el8_7.1.noarch.rpm 2119227ac9586301e70369923a3b7e24a82f31b60e1c65127892eb07f26b7fd6 fence-agents-ibmblade-4.2.1-103.el8_7.1.noarch.rpm cb72d5809305a8a8129cf6652c598c9b9805bccac54c3c080e45e344c80eaa07 fence-agents-ibm-powervs-4.2.1-103.el8_7.1.noarch.rpm 85d4ef0da70ee8437ecb256f39f05c5ec2b1b3bc2cf89671a046a460f15e1a05 fence-agents-ibm-vpc-4.2.1-103.el8_7.1.noarch.rpm 1ed9adee37de6f6db948ef4b16a40074f467387f43054ce54028d8ed01ef33db fence-agents-ifmib-4.2.1-103.el8_7.1.noarch.rpm 1d27672002dd97ead87796e5feba88df86700a7e258d6ab0c48e117c885cca3b fence-agents-ilo2-4.2.1-103.el8_7.1.noarch.rpm adb8b31244de569051d719a7e4bde474a81210eef6f736105957065c6c568a34 fence-agents-ilo-moonshot-4.2.1-103.el8_7.1.noarch.rpm 57063d203d256fb552fd11731243d282dfca7da542292f18317dc249c17f6fc7 fence-agents-ilo-mp-4.2.1-103.el8_7.1.noarch.rpm bcf444b0f41d2feb3833dc22f1a5993aed51d24eb961f6cbcf0536a1d5112f15 fence-agents-ilo-ssh-4.2.1-103.el8_7.1.noarch.rpm b0d0ecb30a3941c270e47fc358dc8c3c59949e488b5e6b50e5573373cea0afd6 fence-agents-intelmodular-4.2.1-103.el8_7.1.noarch.rpm a56a98693b50a91d89299ebc7663092c550c458d2cd0b53c8f5f9e7234440cfe fence-agents-ipdu-4.2.1-103.el8_7.1.noarch.rpm ae32c1a30808ccbd570d8352691086866cad26aa9c7b34536c37461a19ce8d35 fence-agents-ipmilan-4.2.1-103.el8_7.1.noarch.rpm aecb4472fe7983ffa2b314871f95b72458ae6eb3a91e681a060754bfbae8d131 fence-agents-kdump-4.2.1-103.el8_7.1.x86_64.rpm 4ef7ebf360d2bc40d249815edb9c60da50420afd71c487d801e573d4d522af8d fence-agents-kubevirt-4.2.1-103.el8_7.1.x86_64.rpm c645f7046f2fc92b441b236b56c855fd575372cb776da360689b69b7fcbe39c0 fence-agents-lpar-4.2.1-103.el8_7.1.noarch.rpm 3e6fa201fb147a29a11c6cb9cabdf204789f65c38f0986af3f62486509f9fb8a fence-agents-mpath-4.2.1-103.el8_7.1.noarch.rpm e69b95d914b5a3d2da79a18b839560db1fc5ea429dbe7b2635d9a7493063b0c3 fence-agents-redfish-4.2.1-103.el8_7.1.x86_64.rpm 16124371e7bb5cdde13c6119951db9c727e54c288a6f162652daa83b84e6485c fence-agents-rhevm-4.2.1-103.el8_7.1.noarch.rpm 730b7a0e703ffacf8e7a46a31192504e3d9b969cf73e9b4c3240424133cb5e17 fence-agents-rsa-4.2.1-103.el8_7.1.noarch.rpm 8c9e7388cdb186c0a929f90152424cc656cb047754dec4bd9f4ed9598895b4c0 fence-agents-rsb-4.2.1-103.el8_7.1.noarch.rpm ae8818ff67e5e22ce7f1daffaf9cbe82e38e404ab921f39116d2d55824d94dae fence-agents-sbd-4.2.1-103.el8_7.1.noarch.rpm bbefee58de8b0123277ab7dd840ea7b5b0b8c429ad8b8b6a7585a20fdcfb2d08 fence-agents-scsi-4.2.1-103.el8_7.1.noarch.rpm cae0b470d289a9f373ba7c53133c2f0c782909e32b121775c7821c2ad7dccc41 fence-agents-virsh-4.2.1-103.el8_7.1.noarch.rpm b635844fdf91ff808687e3ff6071d9c34f1b3b641692277545161ccccce807d6 fence-agents-vmware-rest-4.2.1-103.el8_7.1.noarch.rpm d4f044661287872b3a854baa1818a2c66e6446c1aa3acd010b5bbec8e5456a83 fence-agents-vmware-soap-4.2.1-103.el8_7.1.noarch.rpm 8602fa3a0fa16cb9535b32f0e959318bd53357413745c7e1cd995ab09956a998 fence-agents-wti-4.2.1-103.el8_7.1.noarch.rpm e8b3d2554bf7e50b9e4119c3cbd5ceb43d727db31bed5a4234e682f7a1e4482b RLEA-2023:0844 rpm-ostree bug fix and enhancement update The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es) and Enhancement(s): * backport support for embedded container whiteouts (BZ#2137905) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm-ostree. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es) and Enhancement(s): * backport support for embedded container whiteouts (BZ#2137905) rocky-linux-8-x86-64-appstream-rpms rpm-ostree-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpm 58edfffc0deb83ae4499df770ec2d8f7c7126b75615307b9246819de1d1eeb4f rpm-ostree-libs-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpm e9a5fa26ad94103ea70bfe9b3d6c82039db3147038a94928421ccfe0382249f7 RLEA-2023:0847 new package: synce4l The synce4l packages are a software implementation of Synchronous Ethernet (SyncE) for Linux. This enhancement update adds the synce4l packages to Rocky Linux 8. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for synce4l. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The synce4l packages are a software implementation of Synchronous Ethernet (SyncE) for Linux. This enhancement update adds the synce4l packages to Rocky Linux 8. rocky-linux-8-x86-64-appstream-rpms synce4l-0-3.20221122git9564b5.el8_7.1.x86_64.rpm bfdae57b13b96b443cf813ad967fdd45216584224fa2a62bd784e381dbe3e97c RLBA-2023:0846 cloud-init bug fix and enhancement update The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix(es) and Enhancement(s): * [Rocky Linux-8] Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153182) * systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' [Rocky Linux-8] (BZ#2165945) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cloud-init. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix(es) and Enhancement(s): * [Rocky Linux-8] Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153182) * systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' [Rocky Linux-8] (BZ#2165945) rocky-linux-8-x86-64-appstream-rpms cloud-init-22.1-6.el8_7.2.0.1.noarch.rpm e14a2aa19017a32ea6cb0c568e931b3fdac42723ded7ab6e824a57f0ad16ae4c RLBA-2023:0850 openscap bug fix and enhancement update The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * xmlfilecontent probe produces invalid OVAL results (BZ#2165577) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openscap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * xmlfilecontent probe produces invalid OVAL results (BZ#2165577) rocky-linux-8-x86-64-appstream-rpms openscap-devel-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm 2cf728720a489353054d40208ba2298f96bc649ade04f328db4453354795ce41 openscap-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm dc61ffba6cc1eaf9e2c857948c37f08c0e1fa454e895ec96d172ba06d96f7b25 openscap-engine-sce-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm a187a038fd7436227918dabb52df651c0272b35bc50b81fd28d69e6ed08a596a openscap-python3-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm fc91a15732cdd4561ae0de5f24a85e59347850a74524b1efcca309f3d6388db9 openscap-scanner-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm 09a40ab8c899174530eb2115924db3aa5c71c3e0f65298153231cb6caec42608 openscap-utils-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm 66a7d268a5991f28f987610e3644e4ab2bce8d90ba00afb6388ec0c297de31d5 RLSA-2023:0902 Important: webkit2gtk3 security update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el8_7.2.x86_64.rpm c410ef75cde5b474c951e88b5af678d7329e45b5398b030027a8d9926e1f59b0 webkit2gtk3-devel-2.36.7-1.el8_7.2.x86_64.rpm 56013ee1adfad7620077622994baeed9d5ee9d37df76deebac40daf867cdd342 webkit2gtk3-jsc-2.36.7-1.el8_7.2.x86_64.rpm a7cf015c6fee90412e38ae998b3fdb4880e637f1945f5c597b9c17b04ca08361 webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.x86_64.rpm daa94962eaff4bb9e002007e3ebbf9fede3a7b27599909e079bf4207d140bf82