RLBA-2019:3337 perl:5.24 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl perl-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm e83074c6d1b50c55bc3c15d5da135053bee0f6f3ff53fa0a2d6f1f8fb787a7eb perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm 69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6 perl-Compress-Raw-Bzip2-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm 285386224d4aa4525a133a6a6c4b479a06db450c6a76e2a8f5ed0009abd37dc6 perl-Compress-Raw-Zlib-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm fed8bc594c15c41171ff9ff943c9dde016664afd8b97b19241cb6ce9665fbde6 perl-core-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm d20f7d7462ee2663c847590332337ce4103f31c021c59e4911fc750389ee62e0 perl-Data-Dumper-2.161-5.module+el8.6.0+882+2fa1e48f.x86_64.rpm ff07ac2ea84d231b230395335bf20e610d754b1a4c0c3dacaedd8bb86d91d36c perl-DB_File-1.842-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm 8bc4d236b809bc1ef3d87c8219c6bf5fd62320104fa54e0298cfc2af9a8b9e85 perl-devel-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm f0b3d906c537e8ada3ce00380d0db5fd2df04fafa02a969d7659f3196b5df7b2 perl-Devel-Peek-1.23-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm bd584a99e03a5acc7bc60c935bc43a8943d2debdb23c63d1c2058e3cb704fc52 perl-Devel-PPPort-3.36-6.module+el8.6.0+882+2fa1e48f.x86_64.rpm d7269e7ae9af14bd81f9c6e981dcd4b81a07759111ce4705e62cdddf1f80210a perl-Devel-Size-0.81-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm 7f0c0405c0c9a1a9076ea4cead8daedb86a8b06d940f39f0cb48ee943c2de1b7 perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm 457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91 perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm 4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3 perl-Encode-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm 10ff1f22fe59a1c62d0215cebe4436d920b31d0135be7ee841d8b977c607f125 perl-Encode-devel-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm f61f2d035346d60eb831ea5660545fb9051fb1959b1160602adeab91772510ff perl-encoding-2.19-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm 229ce0ac9b24ddc49cbdcb788fbc64849c999ed1d744b49a405c76499f5a4acb perl-Errno-1.25-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm da0174efbb99d46acb9cc7ecabe0c10c1a5a875af8040c820755de40eed4dcca perl-Filter-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm da4649b1e9d6198f6cf271a2a12b413213360f8c23195b56cf04c1c46605b767 perl-interpreter-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm aadf024cd62728f0b5d6cf682f154052bb5061e2104ef310edbfe694fad7b9a0 perl-IO-1.36-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm e50d1ac803c655e12334a2819eb42033fdfb4cee41dc7a59c973347a423f6711 perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524 perl-libs-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm 53051c9ca3d71fb202526a756dc8d9f240a0cf5b5477be5e3a8102d1ee19bd03 perl-macros-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm 22489b71c4137851c982c6f9c1217fda53481c70eb8636a1f9a0f45382140372 perl-Math-BigInt-FastCalc-0.500.600-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm 77bfeccfb00e64cdf5142dd9006801f920e846f3b2e568afac2f3c36712bfbab perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3 perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm 658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f perl-PathTools-3.63-368.module+el8.6.0+882+2fa1e48f.x86_64.rpm 2693dc95ae0325e1a3d4a3060f240cd5c33d5b034375fbb20fdd8e5e96e9bfba perl-Scalar-List-Utils-1.48-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm fc1755cf3306991660dc714ed4428f42d5055e65ff409ebdb9ed01e0451f83c7 perl-Socket-2.027-4.module+el8.6.0+882+2fa1e48f.x86_64.rpm 4957d55fb4afbc9b8bfd53e52932fcbc61472182ba93e76e000be9141cdf261d perl-Storable-2.56-369.module+el8.6.0+882+2fa1e48f.x86_64.rpm b40848f3bfc8f7f78cc797f0d2b9387f6686e1e4bdd543774bc1039d32221718 perl-Sys-Syslog-0.35-398.module+el8.6.0+882+2fa1e48f.x86_64.rpm aeb828691fd72e80c959c29712d6989e47e7a4ee532113ef5d8af2a4d668493e perl-tests-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm f728f0cd0b1d5e021a6e8d7e6a27c49f2d8a2c900ed7ef44e4afa1537dd4bafd perl-threads-2.21-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm 1e401a335988d10338dd37fc210ca1d6f9b38bca6aa896eafb69c2f8603ae9b1 perl-threads-shared-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm a3c6831646ca262f9aedaa0ef74d51f7f4ade5e3d62e235582b1cddda68f75bb perl-Time-HiRes-1.9753-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm d24075c8ff8a0eaf7d28f5a430bfc91d96b7f1875d7ff046bf93a3d263ef775e perl-Time-Piece-1.31-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm 587332904508887dd5a957a4e1fca0c7b4e52dc8b2218c0a9dc393932442eaf7 perl-Unicode-Collate-1.20-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm 6bb30ea26f566eba828e5f687184ce837c8022ed48283249cb18f0ca335c981c perl-Unicode-Normalize-1.25-1001.module+el8.6.0+882+2fa1e48f.x86_64.rpm 1de5e218c8b65c6fc046e64f0d8bb05a338d949f95ac08a80b186db0e8dd98ad perl-version-0.99.24-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm 0c78542fc30ceb5037a15225340896dfd25299c82a912dcfc025d9fa1638202b rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 RLBA-2019:3522 perl-DBD-SQLite bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-SQLite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 RLSA-2019:3553 Low: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gdk-pixbuf2-devel-2.36.12-5.el8.x86_64.rpm b8c8dddf847d45a247134741a359ee1bacb5f9ba572049535b170e93aaa535f0 gdk-pixbuf2-modules-2.36.12-5.el8.x86_64.rpm 4214f8cd9b483725dc3fe2413aa4b3d09eb9af33258c25da75aa099c7f2d2b90 gnome-desktop3-3.32.2-1.el8.x86_64.rpm ff7c272d2f8933f9583907ae692b65a3913d5beca8984b42c653d0b4b7200dcb gnome-desktop3-devel-3.32.2-1.el8.x86_64.rpm aedc70d3417a92959036b96aa11ef6789b39e7fd39254469cce07643fb66fcb5 libpurple-2.13.0-5.el8.x86_64.rpm adf778e01f5416a5dd127aca8da244dde19f30bca81ab690f5e0d4b6e6bbb558 pidgin-2.13.0-5.el8.x86_64.rpm 3884e426334ed867c8a62430e84cb727129b779cac36a5a160cef24189c0d7d9 RLBA-2019:3621 libidn2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libidn2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms idn2-2.2.0-1.el8.x86_64.rpm 1033e6e8663d25b8a67fe1bc623022b9dbe46c3677bdd57ff7479dcb702a478f libidn2-devel-2.2.0-1.el8.x86_64.rpm ea3c362189034cf785e27fe49c99adfad0d9ab6ce3b64cca0d1f83ecdf4182a1 RLBA-2019:3634 blktrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for blktrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms iowatcher-1.2.0-10.el8.x86_64.rpm 0e31b9e5b1600fe8941c67d4afda394165313bf883ee0768e631d4b6bce031d1 RLBA-2019:3667 mtr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mtr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mtr-gtk-0.92-3.el8.x86_64.rpm faca355f3c563059601dd8095f35d64f15265083e44d83f1fd6422a5113e5f52 RLBA-2020:1759 newt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for newt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms newt-devel-0.52.20-11.el8.x86_64.rpm d5f84c2c76587117c782bcc6b998816c981f9d7102facebab9febcea01982c89 python3-newt-0.52.20-11.el8.x86_64.rpm ae6af49eb197e57b1fef79a1ebf0057691e4c62c80abd173dc4392ce787b23ae RLSA-2020:1766 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms baobab-3.28.0-4.el8.x86_64.rpm 56f8a2293c11e3f19dc2cb0d4ca2dec49a6ef365db7e2962024faedbb6bc3a59 clutter-1.26.2-8.el8.x86_64.rpm 0a20b879448dc466b4b6969e4ea17f96e4260f34f75586dfb3bb4ef311f1eb04 gnome-menus-3.13.3-11.el8.x86_64.rpm 06cbc8d95bf63fee450c6c8368cb9fd644756a71a24abfadeedc40a59a32da94 RLSA-2020:4451 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dleyna-renderer-0.6.0-3.el8.x86_64.rpm 2f9749efc99a8d58051088a6503a0cc20f300275bfd73733af25a7108587b0a8 frei0r-plugins-1.6.1-7.el8.x86_64.rpm ecd0c1309283d96d8cbfd04092ae07b3fc18f873e531deabad44ecc116dbe33d frei0r-plugins-opencv-1.6.1-7.el8.x86_64.rpm 4af320468f53f2f48fd47dfb7759901d8bcd03d00c3c231cdb7e7f11f0e082a4 gnome-remote-desktop-0.1.8-3.el8.x86_64.rpm 6895a3d7cc1c05ec83c19af4e9de9542861f0aabf4c81e5c4bb4943c57ea89a7 libsoup-devel-2.62.3-2.el8.x86_64.rpm be82aed5a0a8ab97cca222b4749954ac549602e571e98fbb2615e98ce6aae810 pipewire0.2-devel-0.2.7-6.el8.x86_64.rpm c78cbf37db63fc70418f2625e614ed86a97722d745f773fc359538437039e65b pipewire0.2-libs-0.2.7-6.el8.x86_64.rpm a4e2934410c2f4b95acbd95e11e13b62886604d616a4df3b7f394ed3105fdffa pipewire-0.3.6-1.el8.x86_64.rpm 693e54ebbca5683ff27b042d8c41a428e0d7b33fa0790ab1b0a574cb58bf4cc0 pipewire-devel-0.3.6-1.el8.x86_64.rpm 419cd82f2ec598818f9d4671fed3aaae7c7d70c77fa732cb07532f94309f328a pipewire-doc-0.3.6-1.el8.x86_64.rpm 5fdf2f45560524bf4131d5e97307ae3dc3a57aeed287d9de4789d21e1d6958cb pipewire-libs-0.3.6-1.el8.x86_64.rpm f528472a4a2050271a728b61135788b4aa9abe64bf36fbe4eabbb6e40ce1e687 pipewire-utils-0.3.6-1.el8.x86_64.rpm 3fa26eff88f75628c7a3418e414bc1d6a17a268a07087b1f3a0569a8fe1d4583 potrace-1.15-3.el8.x86_64.rpm 4d635d9ca868a260a7ca30e12118d032ae73ea7cf08876d96119fd7731d2be33 python3-gobject-3.28.3-2.el8.x86_64.rpm dadec73f4be5ca582edcf9d723fd75b27e725b5602f764879a675dbf675716dd tracker-2.1.5-2.el8.x86_64.rpm 6b3aee540738b212cb7f1b9f4115a3a387d3f79626c6b3b2698d20d13bc83d9a vte291-0.52.4-2.el8.x86_64.rpm a25068629ad725d7630d121f24036dc4804b215ae3014e4f224b81e5efd8d2ee vte-profile-0.52.4-2.el8.x86_64.rpm b2c7f7eb37729c285c8c7c5902b408241b8cf8b25799e28f2849bb9797234cb5 PackageKit-1.1.12-6.el8.0.2.x86_64.rpm 443bb3ffdb7c33e79a5b8e187cb8a84e60bbac288ac1e01fcaca47fc80096c09 PackageKit-command-not-found-1.1.12-6.el8.0.2.x86_64.rpm 198e466a067517d90a9c2cb6aaeaa448879c7188287b015b2942639872238a21 PackageKit-cron-1.1.12-6.el8.0.2.x86_64.rpm 3068fc76ed2e84514a2a0cf4e3b46d4cec51982130b86620574bdceac6bc08e7 PackageKit-glib-1.1.12-6.el8.0.2.x86_64.rpm 802c4bc3ac43e64a4169ba2208ef40301af21de468efd95c01362c82e768f23f PackageKit-gstreamer-plugin-1.1.12-6.el8.0.2.x86_64.rpm 3625ed7fbde9cb61d319a0eb8fd18761084fcf4e552d2e8deed1ac387146a410 PackageKit-gtk3-module-1.1.12-6.el8.0.2.x86_64.rpm 165aaa0afa3c75cb66d40c66c9eed8dd7a34744eb1908775aaa5a3e96e56f89b RLBA-2020:4557 zstd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zstd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms zstd-1.4.4-1.el8.x86_64.rpm 3a5bea3f29f92bd1b4865f129ac8807a20201ccfb7d807b8e6e5a7a77174a2ac RLEA-2020:4727 new module: perl:5.30 This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm 69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6 perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm ed229dccbc0b92ac2a641e672a1b62281cb7887ad180cf0eb7bf70a72d8190e8 perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 70b3d3861ab9c1695c9bd398d4bd822fed4f52f843ccb34d987b1c72fb6f6190 perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm 49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16 perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm 847b4fb0ddf80554f9db4f306d9b404f77ff15198af23e1afe2abf866e91117f perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 1da6e17c67943d6d69e57ebd15f72bfa43b6015870fdd338c76b117b2be9f67f perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm 11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm 457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91 perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm 4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3 perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 7acf6021827fa52dc9a1fcebcb239d23d9096de93e0a6132f0fe4fd541f3f1f2 perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 4189d9a4acaa4add86f0991f50f74e444b59afb872b205e444480c428e247eaf perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 5e8ac50accc1d9281fedfb67c5f38066ac8d9e1237e1d7cc7fbef1e973fb89fb perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.x86_64.rpm c8ba40590e844230d1f154071d9e092cb479fa4993a8352a0d9c7b3ed9764e01 perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524 perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217 perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3 perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm 658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 19c9476b75c247420525ff36ad321453c46d0262305cad01bfd0eea652a70093 perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpm b60d7dc5e566fbe0b9282e1f90b628d86d87f6e7c091290737cddea24d9bdc1b perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpm b7f894a292d6278b60fb5754d1ed5ad9d199c8f84d140f47dbeb260d6a3eaa35 perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359 perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 2e5b2999050f52a5be6078a7024fa2d8696471958b37582c6ae57f869b22b247 perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm e95a1149d05da0bdfc99db4a561b0ffee93dd2d670951b8bf9e9f0bcd867473c perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpm c32bff30e752a3efa107b8a0d0a6758e720770d895c642fbd8434f86f54ef46e perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 329b8a55fd6c40d52610e15f55037edc8395d682ed5ceca6611930c6ec0c80fb perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 641de0fcef19c0f7ab506f797d92584ac6c17d3f1335d5fa6fb0d515c8220612 perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm 96805b92a1012403138db9d46d761fcafc05517684b5ff73a5ccfbf75edb0d59 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 RLEA-2020:4767 perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 RLEA-2020:4802 perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 RLSA-2021:1586 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms atkmm-2.24.2-7.el8.x86_64.rpm b04306a0fbc6f392a135fa1923e314ee71148dd95394002cb9278d2cf35040be cairomm-1.12.0-8.el8.x86_64.rpm f87200fc6c9098a97e7000b991c9d9b55665c936adf071461e857da01b6b74c3 chrome-gnome-shell-10.1-7.el8.x86_64.rpm d0c4998aaddb8c3b81afc3826beb1b1e046a0767269163fecbe4bb7e209ef64d dleyna-core-0.6.0-3.el8.x86_64.rpm 8061d05aa41fc9d4379e9882c88fe0d7081d8a18b3bcc3c928614261aa3b3cf7 dleyna-server-0.6.0-3.el8.x86_64.rpm da0bab305997b9906a2357a21e93c7f5bb7cd0334a55b0a537d60491a150113a enchant2-2.2.3-3.el8.x86_64.rpm 85cd0e04908d96550e8e132a527695d74d85113baa3ebb07847801a06a646554 geoclue2-2.5.5-2.el8.x86_64.rpm 74c8c4eee50054f5f23588b01d6486d847555ffade12edee2422223b9543b101 geoclue2-demos-2.5.5-2.el8.x86_64.rpm 9ccc5a181d474a2681fc432a1b8dffcf57a3f03485f9f702337da7ad5135e089 geoclue2-libs-2.5.5-2.el8.x86_64.rpm 8e9470a09160870f9d81a3f3a63f4ac445970737779a3c05f08af39fab2f89dc geocode-glib-3.26.0-3.el8.x86_64.rpm a2e669a2b25bfed174353e7921009a37f044f5d4db70248414a05d728205f242 geocode-glib-devel-3.26.0-3.el8.x86_64.rpm 1f0f79da8cd8327846386294463ce07a7fecd6fb4aa0b17bf8cb2585d7399dd4 gjs-1.56.2-5.el8.x86_64.rpm f2a3b03056695cd41cae4b0d078ad602c7b0478af1df7dcfce54b99b01517480 glibmm24-2.56.0-2.el8.x86_64.rpm 75d1f9cc2d4c44096a680f2f2922177cde0cbb3124b337ab13ec48a73aa859f1 gnome-photos-3.28.1-4.el8.x86_64.rpm 7c19b9128c3f6031cc1c96e50aa0f16ebd9e0108f52342e2259c56496875db0f gnome-photos-tests-3.28.1-4.el8.x86_64.rpm ca37177d2e0689a5d6652ae7a39f4baba08c61e8f7d77b45cf2f8fedb5581055 gnome-terminal-3.28.3-3.el8.x86_64.rpm dd27a423551804084221da7392ac0128cfd64447b1147140a83bbe5d8780d2f9 gnome-terminal-nautilus-3.28.3-3.el8.x86_64.rpm 285192366764466557fc62eab78f3de9a4462c2b166572ada7060510de416cf2 gtk2-2.24.32-5.el8.x86_64.rpm babbb096fbe18354be01a584983de5d2c26d69f318ee964c48850b9dbbb1b1ff gtk2-devel-2.24.32-5.el8.x86_64.rpm 33f6d0a0e7a5edf62e556cc364580a4e3e01d970f8e9d5f7cc4f3cb02bc8497c gtk2-devel-docs-2.24.32-5.el8.x86_64.rpm 68284375144a790dad399ac3abd677d59349c854fa20760690e5618807376293 gtk2-immodules-2.24.32-5.el8.x86_64.rpm df0d38789261a7af178f3b8914ec84cb0abc2c393372d4674320dd7d86431ac6 gtk2-immodule-xim-2.24.32-5.el8.x86_64.rpm 3c5dc65defe122704e59969bc2fbb7b17202f6e637c349669d367ff117b86fe6 gtkmm24-2.24.5-6.el8.x86_64.rpm 362aa1bf60d328749b4765fadd1febf5e43e36edf21e8ea03d90a0b6a38b1182 gtkmm30-3.22.2-3.el8.x86_64.rpm 871356ba2f4cc9a426dd1429a748237a8ab4c0b32ce61d0f1b22fb39500e0e24 libdazzle-3.28.5-2.el8.x86_64.rpm 6da46d51e00482965cf6bba9ac1f4cc1aa89a61ba645d343d273dcdece579971 libepubgen-0.1.0-3.el8.x86_64.rpm 4955abb3033684450018aac873107bb4e9e62a8e2835ce4e5b6cafa75f59dcbd libsigc++20-2.10.0-6.el8.x86_64.rpm 8f1c1f4b47c7fac19f15cc3815077b0677a1fb2c2cd1e7d5631370cf28ab07bd libvisual-0.4.0-25.el8.x86_64.rpm 770b1865cb2580cdf75ee48ba979fb912bc4a48fb2fd8af2d69f554d923a2c85 OpenEXR-libs-2.2.0-12.el8.x86_64.rpm 35f0d3fb2d52c671f9a86824a4d524d53a29d16e5437852eb12cfc10bc69f47a pangomm-2.40.1-6.el8.x86_64.rpm 0fb7b384cfe916c06b91f28b6abe87e16822b150af8a8bd096007a104d698b5c soundtouch-2.0.0-3.el8.x86_64.rpm 8f2d071970bdb85bcf2fc23f0d9fb7c327ab2f3aca90ea16159ad3a405fe8b8c woff2-1.0.2-5.el8.x86_64.rpm c4a5f23fe56dbbd6b222b45b19fa6b1e0728a4d5d2e7c9af366cdd609481be2e gnome-boxes-3.36.5-8.el8.rocky.0.1.x86_64.rpm c9b9679109843e21773525b39e990d4d6cee077d89c79cc31d8bb53a10b14af4 RLBA-2021:1591 libxslt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxslt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxslt-devel-1.1.32-6.el8.x86_64.rpm b370f997b6f3aad5205c0a37e646e8a5356adaea60e125bc1af7a4a73347e6fc RLBA-2021:1612 avahi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms avahi-ui-gtk3-0.7-20.el8.x86_64.rpm ccf168c311e9d313b7b68399b583f1f4ae322744ab63e76c923e6b846d8e19d6 RLBA-2021:1681 vhostmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vhostmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms vhostmd-1.1-5.el8.x86_64.rpm 003e5c788d60a86ba8f5a61d9f8baeda9f80c03ce584c50c316e7322e2bdd333 RLSA-2021:1702 Moderate: brotli security update Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for brotli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms brotli-devel-1.0.6-3.el8.x86_64.rpm d512ea0ff25f717bb9e8c779990e2ed42751637be036c574cc56c324b62b8dd2 python3-brotli-1.0.6-3.el8.x86_64.rpm 4ea1dcb3f2f40a6dab1c067a811163f1a07143e54a8e473c40c213c1cb8cf19e RLBA-2021:3594 libdb bug fix and enhancement update The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) rocky-linux-8-x86-64-appstream-rpms libdb-devel-5.3.28-42.el8_4.x86_64.rpm 4038cac5a947df780f43ad543f735f1c0307a106ae02b1ac518fba0349d5bdc9 RLBA-2021:4353 lm_sensors bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lm_sensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lm_sensors-sensord-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm 6fe3b62dd82076b44d2d79404bf82e491136151bd16c837331b3eb0df01fa795 RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-autoar-0.2.3-2.el8.x86_64.rpm ec104b742f1ee24ed3b790f8bcf2e9c3624d835c37d4f046226737569af9c0b5 gnome-calculator-3.28.2-2.el8.x86_64.rpm bfc480d1f9e922cdeebbd6056672a2a349776204c6be7a6240a5eea1a623de39 gnome-online-accounts-3.28.2-3.el8.x86_64.rpm 128fe18ab8bfd55fcf3d048764c08baa784e475c43e05bee007663ed65266f64 gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpm 2424a681b21ec3cc257eb8117d833e143b766ced3bb3f0d80fc6580ebe78b52d gnome-software-3.36.1-10.el8.x86_64.rpm 2a9f077aa8113e2a4c4c3788d5258918fd7aaa4a97a3b5696d604e849fd23c5d gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm 440c33ca267b2f26215df09174ce6574a2bb5113fe6d7c740eba3f1133c93af8 LibRaw-0.19.5-3.el8.x86_64.rpm df151c39f20ea9815d46aff810e74f2c837a34fb755909c23d2e159714999d90 vino-3.22.0-11.el8.x86_64.rpm 3ba0c279a775b11f29b6dbeb5daa462d4bbe721a3bc0f541dcaa8b0c25555ec1 gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm 12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94 RLEA-2021:4405 libmodulemd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmodulemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-libmodulemd-2.13.0-1.el8.x86_64.rpm 261911bd0c62a94982ee44638a391b2a47f18434e2b5371ea8c76a5b0ed4bdb2 RLBA-2021:4412 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mvapich2-2.3.6-1.el8.x86_64.rpm dd351b8868ff7bc80fae9dae488eaa189dc9c7f6eb396d4e79d210376ff9bf6b mvapich2-devel-2.3.6-1.el8.x86_64.rpm 0c0305bbe23485eb35b434972dac29fbf0eee28f6cf4b726fd6bb9c34c46612e mvapich2-psm2-2.3.6-1.el8.x86_64.rpm 825a16773f805807387cf6b32d8cac59df358d8d44fd6f312a9c78aae72eb3a7 mvapich2-psm2-devel-2.3.6-1.el8.x86_64.rpm 3526d362751e05cfb2f706200a3b03012ac93d07562a638d34f87fb6468ef04d qperf-0.4.11-2.el8.x86_64.rpm 8e2a2d8a488101682d7495de161c2083b8fb3f12ef9828c7fb4c12324df5c7cc RLBA-2021:4442 lshw bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lshw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lshw-gui-B.02.19.2-6.el8.x86_64.rpm e8bad6055146ad48980556830eaceb61a86e42c3b36955ccac1f2e4fbd8a287c RLSA-2021:4451 Moderate: gnutls and nettle security, bug fix, and enhancement update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nettle, gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nettle-devel-3.4.1-7.el8.x86_64.rpm e139494f5eaa94ff5410adc22013d4c5b3888d875e78089bb1c3a35be09c2933 RLEA-2021:4488 hwloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms hwloc-gui-2.2.0-3.el8.x86_64.rpm 27e4f5230cad7b62e5ce72e640fbae7afd9c48d35b72bc3e0e94084ceca508b0 hwloc-plugins-2.2.0-3.el8.x86_64.rpm 18903b95ff7ea05265d1fcf969c3dfde7a1191f277bdce76ad93925c6ffb9ce1 RLBA-2021:4501 emacs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms emacs-26.1-7.el8.x86_64.rpm 78f6e6a1910c95a773be74c70dce446bf600cd63cf289b56547447085b7eaa53 emacs-common-26.1-7.el8.x86_64.rpm 9c89bc8eb9a0cfe9f514a9100c41cd602d12f928497ad6e810b29a84587d7d7a emacs-lucid-26.1-7.el8.x86_64.rpm f689279f4d76738af86a78b6e546214a695034ea695edabba93c53d4f9b24592 emacs-nox-26.1-7.el8.x86_64.rpm a30a83b2f2aea300c30dc0cd3d5fbed857699495fca57cdb57209e84cb8886b7 RLSA-2021:4510 Low: lua security update The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for lua. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lua-5.3.4-12.el8.x86_64.rpm 49a648c94ed0da6494fd0e3b518c5c2e7d08f0f888b7de85f22f6577e4bccecb RLBA-2021:4516 usermode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usermode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms usermode-gtk-1.113-2.el8.x86_64.rpm 050b67bd0709281a9191f8e9be7b6849456c6d0bdcd06951ce44090e2aa686cb RLSA-2022:0658 Important: cyrus-sasl security update The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cyrus-sasl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms cyrus-sasl-sql-2.1.27-6.el8_5.x86_64.rpm 66fcc6223022b9410b104521f3eddc569f87487b818bd807a28a0feff071b741 RLEA-2022:1954 perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 RLEA-2022:1956 perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 RLEA-2022:2014 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mpich-3.4.2-1.el8.x86_64.rpm 74148fa6cc16f87b94559df63f245c2a028481b343e0ff625cb7065bc1dc2b80 mpich-devel-3.4.2-1.el8.x86_64.rpm 4bc763f8f86364ff81a5973199876e168cc9dbe0d36cfcc53c68baccd623c492 mpitests-mpich-5.8-1.el8.x86_64.rpm d0714e70449d9184851da372b81afb64dd1d73b5fd01fc558eb260f3df0ba756 mpitests-mvapich2-5.8-1.el8.x86_64.rpm bb8e7188cd01962e4e666416accabb8cc8cfde090ade2e3ffbfa4f9c9f885988 mpitests-mvapich2-psm2-5.8-1.el8.x86_64.rpm 7530a1544a8c5c220c7d4241216eed9507f270f46d4b5d5e5f09ce4fb5af6541 mpitests-openmpi-5.8-1.el8.x86_64.rpm 93e0650f54ef76aeb8fd9d533661c9ff699f6ad106c176fe56ff0e4e6d01d043 openmpi-4.1.1-3.el8.x86_64.rpm e7af704f8d835ca6f51c90949305ecb44501c84337b1370a7829eaf1920e4f0a openmpi-devel-4.1.1-3.el8.x86_64.rpm 22c66b5c2b99405d401d82a2d9f4bef3510964a36f5db51af4e10bcf3d107a64 pmix-2.2.5-1.el8.x86_64.rpm 52a6205c21965646bed592eb3d3bd2a87e15d3ce4891f4802ded71cb14a277cc RLBA-2022:2023 net-snmp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms net-snmp-5.8-25.el8.x86_64.rpm ad38b78a6c4715dab4f8426336d833075bf2ab0bd0ba552047020432da88ac74 net-snmp-agent-libs-5.8-25.el8.x86_64.rpm bdc3346d124753f657fcbd61969966bc3062a70bb05071378bd56bd30ec6a84f net-snmp-devel-5.8-25.el8.x86_64.rpm 8913a90a7e732bf28f2abcaf3861708bd4191691278b13e1388b469ffce39b42 net-snmp-perl-5.8-25.el8.x86_64.rpm 91b0132109c0ff1363158041fba5d5f248c91b99b0fe497940bdca04a48be150 net-snmp-utils-5.8-25.el8.x86_64.rpm 371193495c7e5caf863d812317dad5a133f49a919c2a09df9d13a8e963011ce6 RLBA-2022:2027 json-c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for json-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms json-c-devel-0.13.1-3.el8.x86_64.rpm 4486495d3b2d376b0571c35f1830566455e0678698c6dd475e449b99d38f53c8 RLEA-2022:2029 libseccomp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libseccomp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libseccomp-devel-2.5.2-1.el8.x86_64.rpm 6bea64b05e30226d2db6ed7221e8c7c0cef4165cd07a72c0435a00c0e9b8b81d RLEA-2022:1869 new module: perl:5.32 This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl perl-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm 7cbe324defaaf158029c8bb85417396a131c0562ba68f15912cf6caba39ee383 perl-B-1.80-471.module+el8.6.0+879+823e3012.x86_64.rpm 3fca367721228806c0535072913fc5da50b6146cf6c3fdf23488abf7f48afd23 perl-Compress-Bzip2-2.28-2.module+el8.6.0+879+823e3012.x86_64.rpm 45cb6b8ae71c45500be114d6512fab9cefe7922454e574573c69a6d6df255285 perl-Compress-Raw-Bzip2-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm 26b44886c1ecc20b683eaa0d86e61c0e21007111a78fcadb8e8fa1c0dad9866b perl-Compress-Raw-Lzma-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm 87107b833c9c8adeceddd6218a9af0cf5da0c4e3ce4b8ae46252548a5fd12aa2 perl-Compress-Raw-Zlib-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm 0a950bf8d5334642a3b3aca7ec0e8068af88efa404c283e6814cf645f06b7011 perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm 11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm 49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16 perl-DB_File-1.855-1.module+el8.6.0+879+823e3012.x86_64.rpm 294048e1443911d2c7fcbbe3957f8a40c992ba094174731a0af80b6fea60067c perl-devel-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm a0a14581d495ad3aa604f136657b00b5e07e01f9a31430180ae996750851129a perl-Devel-Peek-1.28-471.module+el8.6.0+879+823e3012.x86_64.rpm 76702e124b8837aedb53a200606bd97531fddd70a479d523652f4b5c4eeca3df perl-Devel-PPPort-3.62-1.module+el8.6.0+879+823e3012.x86_64.rpm eed2c853112750b1147a0318e8021dac109449701971f8a2fb0fdfb59a7bbe27 perl-Digest-MD5-2.58-1.module+el8.6.0+879+823e3012.x86_64.rpm 8b3bea86b235d1cdcb0d28912e7201458f04994558c6516adb8b52d141e5bbca perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm 4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3 perl-DynaLoader-1.47-471.module+el8.6.0+879+823e3012.x86_64.rpm cffb954b308ff49275e64194b68e33cbb3da9deb92bd27b40a803d63b90d45e8 perl-Encode-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm 77253b724ff748e21fa428d8f4bb5c67bdf52705f7c53b07ce812513e55f91ee perl-Encode-devel-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm 8a265047be5f34848b19cb882a8fd3ad39c11ee8cd53bca3632633c9b8b5392e perl-encoding-3.00-461.module+el8.6.0+879+823e3012.x86_64.rpm f03d602b657d6686a6e5e9881babc4686eb5f902b469c44d86c8583c4371209a perl-Errno-1.30-471.module+el8.6.0+879+823e3012.x86_64.rpm 76658c7a3779fd65500ab4f9c6f6b203481d8bad79e2f5a10fd288046a53e22b perl-Fcntl-1.13-471.module+el8.6.0+879+823e3012.x86_64.rpm b13ed0199de86c0afa7cb56b07fe89968febe4bd713514dcd8f0d1926a0d9b61 perl-File-DosGlob-1.12-471.module+el8.6.0+879+823e3012.x86_64.rpm e1ff76d84cbc0debbbb36d08abe8ba711e2e162bb46abd049e2768aa08f4905c perl-Filter-1.60-1.module+el8.6.0+879+823e3012.x86_64.rpm 26ad0484430812ddabc5f1998e2c262481b7116b396d68669c2b8465d11d6c54 perl-GDBM_File-1.18-471.module+el8.6.0+879+823e3012.x86_64.rpm 256a011b9c3d1714752273382e297e474e8b39caf3e9de390f1612eb0006762e perl-Hash-Util-0.23-471.module+el8.6.0+879+823e3012.x86_64.rpm 7a82010f9481e8348bc8f4d3420a4b36b6603388325bb039ba977724ad5cf627 perl-Hash-Util-FieldHash-1.20-471.module+el8.6.0+879+823e3012.x86_64.rpm b61d92583075cb764edcd00571874a66ad6b8604b34c062acac7f18e0ec459b4 perl-I18N-Langinfo-0.19-471.module+el8.6.0+879+823e3012.x86_64.rpm 2623e457fc54df6cdf59e7cb367600debfb9e9dd4ed80c9c1168afca8907e3ab perl-interpreter-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm 4624784fafbb106fa3c2ede801be0a3ab3287d8dd65e8b86e5322b9956a953ee perl-IO-1.43-471.module+el8.6.0+879+823e3012.x86_64.rpm d88ffbb0fb6a54b382944fd9b4f64cec99cfa3dcb25bffd44d8c53e9c9938085 perl-IPC-SysV-2.09-1.module+el8.6.0+879+823e3012.x86_64.rpm b50105e5a0de165d0d60f55df6a89a56adde83f940977893ee6d2d4fd3b19b41 perl-lib-0.65-471.module+el8.6.0+879+823e3012.x86_64.rpm 4bc4e1fc0465b77d6f1458a5bf2929b3af9d7b6ee094966a08f60501c873c801 perl-libs-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm 2c72efd56a0c43f88b948f2baa76d8967cdd727e28eea76520e748bb889fa448 perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217 perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3 perl-mro-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm 866fc141c8bcc8aab318c0c4455b6615b17b0ea8a09d68dc8f1aa5fea05fa79d perl-NDBM_File-1.15-471.module+el8.6.0+879+823e3012.x86_64.rpm 0f3c32d42439f2aa209820ddd83fbb58fc8f69ddc1547c211dd10fdef981d7e9 perl-ODBM_File-1.16-471.module+el8.6.0+879+823e3012.x86_64.rpm a5dc7f814ed12d914d2fdf89cf69337225d723522c430e58964541d63907e076 perl-Opcode-1.48-471.module+el8.6.0+879+823e3012.x86_64.rpm 68fb12de43afe023752218b8f161dd9d1cea74734108b1c50358f6528cfbe999 perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf perl-Params-Util-1.102-2.module+el8.6.0+879+823e3012.x86_64.rpm 1619c60e20f21d259c619d3e4140efe4ab69e095a33ea26e5a6114fa2efa5bb8 perl-ph-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm 071c53fc3b1508ea0794c71615a8a105b02d194653b3f4fabdd3c45871a7807c perl-POSIX-1.94-471.module+el8.6.0+879+823e3012.x86_64.rpm ad0bfffeb0f0371d2449ef8b63e0e96481b4d14217ed73fbb6f2f7ba8bbe3b7f perl-Scalar-List-Utils-1.55-457.module+el8.6.0+879+823e3012.x86_64.rpm 834d2180a77a193a02d3eb6ea02c76e87b89cbbeae8d246fcb8e1eae50891f3c perl-Socket-2.031-1.module+el8.6.0+879+823e3012.x86_64.rpm b784bd497c1513d31623f76cfcdbcf7190d2501f1929d2dff53ada8a2bfd60c7 perl-Storable-3.21-457.module+el8.6.0+879+823e3012.x86_64.rpm e66945a1abd7ed97d71e9f176facb28f76f70e85cb7586af58414ecb080fb0a5 perl-Sys-Hostname-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm b3aebb55c9c25f8ab97d6957108e80ad2c2998ce1dc69dc5cdebf3e6eabb71b5 perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359 perl-threads-2.25-457.module+el8.6.0+879+823e3012.x86_64.rpm f0478b6cb7f9e5493a8c7d233a817484589962f6164334f6813a306d2e52a9a7 perl-threads-shared-1.61-457.module+el8.6.0+879+823e3012.x86_64.rpm a3c7d91fb51aa3a9ec804723d69b05cb86288e78ced03ac361521aa3f76624a7 perl-Time-HiRes-1.9764-459.module+el8.6.0+879+823e3012.x86_64.rpm 2a2d4011516f4a020d24de2d2706513be6f04b8608954a84d2a2f71d7b8a59d7 perl-Time-Piece-1.3401-471.module+el8.6.0+879+823e3012.x86_64.rpm fc5ea636309c25ade4a9ce4be19732b102da1ce61a4e4b910a9192f35b79b867 perl-Unicode-Collate-1.29-1.module+el8.6.0+879+823e3012.x86_64.rpm 819e4e179ecf1b3b45beb9755217e03e5219f1c0e4aa808a7bd27d0495070697 perl-Unicode-Normalize-1.27-458.module+el8.6.0+879+823e3012.x86_64.rpm 5696de7c803145cae3ecd568451295cda3c8b9d4949f9991702f8e1aed5fff18 perl-version-0.99.29-1.module+el8.6.0+879+823e3012.x86_64.rpm 22908f36f713a9de7e1bad7bc3233b722dff2557f49d067ad93bb5d66b43a02f rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpm e5aef8c6bbdd4a6de57484cce458f522a95163174acbbc8eda2dfa4f705aabf4 RLEA-2022:1955 perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm 4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm 8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8 rocky-linux-8-x86-64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47 rocky-linux-8-x86-64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm 262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8 rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpm e5aef8c6bbdd4a6de57484cce458f522a95163174acbbc8eda2dfa4f705aabf4 RLBA-2022:1999 trace-cmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trace-cmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms kernelshark-2.7-10.el8.x86_64.rpm e28b68cf43f4d1c02ab2a79c4323b7cd47289064f3e0036785f08d09925bec02 RLBA-2022:2018 perl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms perl-5.26.3-421.el8.x86_64.rpm de27f706ec48d1157ea764e5e00b210769f25773b79ada5edc315add5a410cc2 perl-devel-5.26.3-421.el8.x86_64.rpm 7e84a978e37a73520535dce1fd70aa2db75274b0339e6e0e13383a4814660292 perl-Devel-Peek-1.26-421.el8.x86_64.rpm 5f8937a9d898a252a7ac81d9c52cef2840e4c63dd6452c1f52002b84a1d0a764 perl-tests-5.26.3-421.el8.x86_64.rpm 07f7486385c9e9cfb78b7ccc40cd13bfc78054671398a882d19236eec1e9bee4 perl-Time-Piece-1.31-421.el8.x86_64.rpm 18005c88512126fa7401c38a030b01a053ef2c7bda411aaafcc4d4ef2e66a99c RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libssh-devel-0.9.6-3.el8.x86_64.rpm 7cb2b675798815b1a1bf842d17c69edf8dfc941ece898b2d471e235161e0cccc RLBA-2022:2061 jansson bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jansson. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jansson-devel-2.14-1.el8.x86_64.rpm 35b0b0591cbe5cddaf91736f2d564e332cdf3332321e88c020eebb9ac5d20053 RLBA-2022:2079 setools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms setools-4.3.0-3.el8.x86_64.rpm 92e03aafb9f6d19f1725d8ee7cc9f0f61be095ef701a093ce0dad91809314afc setools-console-analyses-4.3.0-3.el8.x86_64.rpm 21696c7309cba8e7e944a8cc8c7d73ec33dd729f1b00467eba2c754176eb6132 setools-gui-4.3.0-3.el8.x86_64.rpm 12f3002986a110dd30f171b09700f9ab4427dda79355903c09d830fc3b0d6446 RLBA-2022:2091 postfix bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postfix. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms postfix-cdb-3.5.8-4.el8.x86_64.rpm 63e360386cb151bf0a338d57a3e52cf4bc3eed8372013fb802e70a9b0c7504f5 postfix-ldap-3.5.8-4.el8.x86_64.rpm 10b1d1dba27b6cb581629867dee9bbaec38b6e795d071165898782f6cae741da postfix-mysql-3.5.8-4.el8.x86_64.rpm 5486249aaeb70a5d9aa2f11e6b10fdc8a6cf31e5a208baa06d1beda213601306 postfix-pcre-3.5.8-4.el8.x86_64.rpm 6a00c9e929bf2c21d174ebd36d666db74a4625c0398817a107b712f7b76d19e2 postfix-perl-scripts-3.5.8-4.el8.x86_64.rpm 977cba0e36d8bcef037636fe5fd9302f7396f029efe3dd501551695e3d5d5863 postfix-pgsql-3.5.8-4.el8.x86_64.rpm ac275db2c2062f885ce5ce04d6f80171e41a654b8f51bb8970d21c7a87a369d0 postfix-sqlite-3.5.8-4.el8.x86_64.rpm 11433addb8f58c2f4c0169e995941ae25e7a02406013239b5deee3abbe2b1bf5 RLBA-2022:2097 cryptsetup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cryptsetup-devel-2.3.7-2.el8.x86_64.rpm b5e72ac21ea1b38f767fa1ebb0598d0d69418f86eb274f8ab0b47d28808cbb0c RLBA-2022:2099 sysfsutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysfsutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sysfsutils-2.1.0-25.el8.x86_64.rpm d6e32caf879b2d8d4f33f1257ab6a2d391d5d1d9db2e29329471eda80d0adf9d RLBA-2022:2117 gpgme bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qgpgme-1.13.1-11.el8.x86_64.rpm 25d6f8ccd77cf48a02d86239ef91981a7f93a3395adea817cdee2d296996d9a3 RLSA-2022:5813 Moderate: vim security update Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms vim-common-8.0.1763-19.el8_6.4.x86_64.rpm 58fb2fd64740f3dddd0465d725779b9a92382096a451b38a3d13e598fb537a65 vim-enhanced-8.0.1763-19.el8_6.4.x86_64.rpm 555bf2c9cb7a631f91195a2c477713668210b2dfcb82c5dc5258fe411bfb7e4c vim-X11-8.0.1763-19.el8_6.4.x86_64.rpm 138b57307d0b6d219d4739841ec0d118256c885f6357c4052400276513f5dc63 RLSA-2022:7105 Moderate: gnutls security update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms gnutls-c++-3.6.16-5.el8_6.x86_64.rpm 57818cdd7188acbf57263517b2a9e81d7d283bb0e0e87c280c58d831933c9ad4 gnutls-dane-3.6.16-5.el8_6.x86_64.rpm 1738781e0a92c8c890bf53efc9ee95b8055d9ad51ea408e5f0e4d22d6dce3643 gnutls-devel-3.6.16-5.el8_6.x86_64.rpm ee433690b3583469d732499e6419ae573fe88152d0417def1fc4814ce35dcc54 gnutls-utils-3.6.16-5.el8_6.x86_64.rpm 6a0485d3cc9fa5cb3c26e88cd5a1affb2b377a1c599ad886be3aa58fe9fe957d RLSA-2022:7108 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms lemon-3.26.0-16.el8_6.x86_64.rpm 7378a4f1edf1a34321ee4e735db4302fdc3c780cc7df9fe235f263ee50817ca6 RLBA-2022:7115 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) rocky-linux-8-x86-64-appstream-rpms rpm-build-4.14.3-24.el8_7.x86_64.rpm 677b722768bb6fbb4b9479ffad9cb7f69aaaa06718686d75d66dd87a8081f0f5 rpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpm 321b320ea3f4f0e28d68daf77bd6f004329e48700273b0f6138519ccd7474e6e RLBA-2022:7684 glibc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms compat-libpthread-nonshared-2.28-211.el8.x86_64.rpm 0d987ddaee5aa093feb72296aa630e0cab8c6b86dda5e560652ae561cc06b113 glibc-utils-2.28-211.el8.x86_64.rpm 8decd744120cef26bc1ee1253cd7d56326391b14fbf896c9249a3330b4b5f015 RLBA-2022:7688 gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cpp-8.5.0-15.el8.x86_64.rpm 28cf4357b326dc03b53023b4a3368c4dac6ac058c850d3e787302436f3e90b84 gcc-8.5.0-15.el8.x86_64.rpm a775ba87b97355a442098c6ff1381f92521a2ba8201e9af62c1fe1167490a78d gcc-c++-8.5.0-15.el8.x86_64.rpm d9ce7589fafa13e929ad62b8db7507844a842e23bdf006915ddd19e4b9f2740b gcc-gdb-plugin-8.5.0-15.el8.x86_64.rpm 164d664e573149c79415039b67dfe110bf69fef0030f857136f1d46d1dbd8580 gcc-gfortran-8.5.0-15.el8.x86_64.rpm c65a3cbe3a87e0d181ccfd4305331422e6427090d59b25daa4621e8b483e05d9 gcc-offload-nvptx-8.5.0-15.el8.x86_64.rpm 6b134ae3ff20d035c857122d2dcbf3cb0ccf85813cf896eda6dc13f4e1fa605e gcc-plugin-annobin-8.5.0-15.el8.x86_64.rpm 789b09dfb84ce5000de464228a4f376343415861749430f694002a3c364bcc60 libitm-devel-8.5.0-15.el8.x86_64.rpm a4cf4b140dd638ab5bfdf21c2608b7231cfd72dce246016dc2624224b4fca265 libquadmath-devel-8.5.0-15.el8.x86_64.rpm 5402ec862817511fe5b2a6cfefcdd46404f0220cc3405028288e1b9026c0c48b libstdc++-devel-8.5.0-15.el8.x86_64.rpm 5fc96d87ea16dc1a72c61f7e81a4c7b4cfa9ffebe0eff215639c442e1cd945f0 libstdc++-docs-8.5.0-15.el8.x86_64.rpm 3358d2c9007ea4e04e326a1c43841dca505bb2e566a72224ec1944194e231b84 RLBA-2022:7693 binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms binutils-devel-2.30-117.el8.x86_64.rpm b756947caed110dbd7309c580685a01e1b32c56ea253ce72dd8f0b8665096be2 RLBA-2022:7698 samba bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms samba-vfs-iouring-4.16.4-2.el8.x86_64.rpm 293bfdcd38d29e1c5d2d0b3bae70d030335b5930798fd40776a937e377d0d278 RLSA-2022:7715 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxml2-devel-2.9.7-15.el8.x86_64.rpm 4b107cd7b8a27df7a1c9af249ff0a61e749290c282fca5c1230b4f274d9e9b73 RLBA-2022:7716 cups bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cups-2.2.6-50.el8.x86_64.rpm 1517378cb5ed82be222d6499d7a4ee724e680a9ce66821a62ea7822e84ea6993 cups-client-2.2.6-50.el8.x86_64.rpm 1e739decd05133d57837a8eb165a9cfc3f2d6c816b175d28e5c23d22b9e96d78 cups-devel-2.2.6-50.el8.x86_64.rpm 702da979d61c4ed0202ee91e3c3a9a431641fae9eb13cf0f535ef6eee757fa57 cups-ipptool-2.2.6-50.el8.x86_64.rpm 7f2b504aa5392955ce26dbc5ef7da19d7f23803476ccaecc6cc189898e44f674 cups-lpd-2.2.6-50.el8.x86_64.rpm ac704b6073e258756580693de27b42288f30b9ab2cff142d04e6fc33c2416f50 RLEA-2022:7719 subscription-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms subscription-manager-migration-1.28.32-1.el8.x86_64.rpm ab1ac527e986bf52f691534aabef8e7f8b830e3837f84e44bd82417439a31f2f RLBA-2022:7735 bluez bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bluez-cups-5.63-1.el8.x86_64.rpm 7f4571280a8f4a40728e6956e10da82c26377c28e1c620d69a17cbb83667dfaf RLBA-2022:7738 authselect bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms authselect-compat-1.2.5-1.el8.x86_64.rpm b0e97bad8179ed01ff00f73175d7a65a51ceb824d4d546ced7d0068260f4cff7 RLBA-2022:7760 ndctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ndctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms daxctl-devel-71.1-4.el8.x86_64.rpm 157d2afbb8abdd8d1fe02d06a46606c5a4548ebaa4b21d49702ac2baa6d54181 ndctl-devel-71.1-4.el8.x86_64.rpm 4b2034b6068692d1caaf0c99575a263c397a0edc309bf1ddd3dd8859c6ca4a32 RLBA-2022:7763 openssh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openssh-askpass-8.0p1-16.el8.x86_64.rpm 46b9b55d7c2a500abe0b2012b4844cd340f9994350d092c7b837c44f8516239d RLBA-2022:7769 dbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dbus-devel-1.12.8-23.el8.x86_64.rpm 95cd8f0b705189258d6c9be2b274457fb77617a3b94d2ce50df2dadb4b4d6d8b dbus-x11-1.12.8-23.el8.x86_64.rpm 63a0db5acdf451a16ddcb6158cd211af4b0d57064d8353f6c617efea50aba460 RLBA-2022:7774 sanlock bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-sanlock-3.8.4-4.el8.x86_64.rpm e5ec992a8929df979daba0e9cf56ace4d4e7bbf916dc1fe4dcae37fb1603eea7 sanlk-reset-3.8.4-4.el8.x86_64.rpm 5d99904b88d20974973b30e16d118ed1f4fba2b9138897bdf392eb00fe62c107 sanlock-3.8.4-4.el8.x86_64.rpm 654cebaf1bf1b42cb78225bc15ce12bb9282ff53e06627ec0b7f9ed469e03a00 RLBA-2022:7776 libverto bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libverto. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libverto-libev-0.3.2-2.el8.x86_64.rpm c0f58652b59ca82763860f53f288449c6707c61e769ada7010454abd0603865a RLBA-2022:7783 util-linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-libmount-2.32.1-38.el8.x86_64.rpm ea9c81249ea546c2a79b65edb54694a9a0e1bab7d51cb9432d6ef8089dfe6439 RLBA-2022:7786 libselinux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libselinux-ruby-2.9-6.el8.x86_64.rpm 2a5b7dbd02c5776cd8ec453af6971a94c486325d05f86cb877979095a9c7daf6 RLEA-2022:7797 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms eth-tools-basic-11.3.0.0-1.el8.x86_64.rpm b737a706ddd7eb66e5ec36939762facfca9ef1024c5f54e0861dda61bf1e6cf0 eth-tools-fastfabric-11.3.0.0-1.el8.x86_64.rpm ba86e4ca08507ace4effef1704dd98444dd4643b1b92b29f28379a6fae833e22 fabtests-1.15.1-1.el8.x86_64.rpm c7ca517e48ea1f77adc9bc0ee2f7176adf2c331b90d7ccf92f850022f31a1a7e libvma-9.6.4-1.el8.x86_64.rpm 2b31ad656b5a84b2568145bcc11ce61a4ff6d2c555caf0ff5f2d2a0b954e061e mstflint-4.21.0-1.el8.x86_64.rpm fdcb52a33b993aa19181e3d0665a467ea8405cb7ff88078fa8b169511dcac099 ucx-1.13.0-1.el8.x86_64.rpm 1d7ec0c05bb2563c4c5fbc6f4d38778b1bfc2667387ec7c0cd88a81df070bf58 ucx-cma-1.13.0-1.el8.x86_64.rpm 272cd740693dbf9243e665dc84f3fa92a5dc2a2a974ccb283a311f58466d569e ucx-devel-1.13.0-1.el8.x86_64.rpm 31c1637913be8ef679e273b472264cfd6741e6ce50e6835c744b10a78d846471 ucx-ib-1.13.0-1.el8.x86_64.rpm dce07ebbd90ca1f8d20853a2fb42c0f8fbf512bc633c68e309fc985c11e4a1c0 ucx-rdmacm-1.13.0-1.el8.x86_64.rpm 4a10f4601d8e5fe574fbc8fb996f06985521aa807c39a58c30465e57489e8d14 RLBA-2022:7805 policycoreutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms policycoreutils-sandbox-2.9-20.el8.x86_64.rpm b6dcb5c056adf4f355f2fb41e46feb691faf5c3bd2ba26e5afef9538c6ef1871 RLBA-2022:7819 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) rocky-linux-8-x86-64-appstream-rpms rpm-build-4.14.3-24.el8_7.x86_64.rpm 677b722768bb6fbb4b9479ffad9cb7f69aaaa06718686d75d66dd87a8081f0f5 rpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpm 321b320ea3f4f0e28d68daf77bd6f004329e48700273b0f6138519ccd7474e6e RLBA-2022:7828 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) rocky-linux-8-x86-64-appstream-rpms NetworkManager-cloud-setup-1.40.0-2.el8_7.x86_64.rpm 1759b995a9e30a6e3237ce2e58473e1a0bdcf88663abb49967dad49a8f94ae5c RLBA-2022:7829 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) rocky-linux-8-x86-64-appstream-rpms sssd-idp-2.7.3-4.el8_7.1.x86_64.rpm 3c6c95405c3b4e996b6bf4f2cc6485b989ea323907be522fad24fe0c3956679c RLBA-2023:0085 net-snmp bug fix and enhancement update The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) rocky-linux-8-x86-64-appstream-rpms net-snmp-5.8-25.el8_7.1.x86_64.rpm 8e7570faa67317a9a726d1323277d9efd27a9b291c3dc345c18f7e741cd39ce5 net-snmp-agent-libs-5.8-25.el8_7.1.x86_64.rpm 739c2a903c800b8afd884b0b67a5aa02683a5f6cb145b1b5aeaecc5f8ec5ea2c net-snmp-devel-5.8-25.el8_7.1.x86_64.rpm 6d6a6b021a77c170e8ef0b1df2c46d6c59e77305469232d38f5068d443116691 net-snmp-perl-5.8-25.el8_7.1.x86_64.rpm cfec9b175bfa5cb9978309ef54574d767d0fff689899780ac3cea2f171a332de net-snmp-utils-5.8-25.el8_7.1.x86_64.rpm 0b85a6937805187a8507ac0e374a11d2414b5008fcc92e2d94fc27bd23ff541e RLSA-2023:0096 Moderate: dbus security update D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms dbus-devel-1.12.8-23.el8_7.1.x86_64.rpm f3459cfbe2e627daed858265868a5c0c4d657e939594cc0e0269423090018cd8 dbus-x11-1.12.8-23.el8_7.1.x86_64.rpm a998c811a937fd7398a0f7821ff5272a8da1b1cb4be7e2733caa1c68055cdef5 RLBA-2023:0098 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) rocky-linux-8-x86-64-appstream-rpms NetworkManager-cloud-setup-1.40.0-5.el8_7.x86_64.rpm 02a5132a0d3b86743d4f6f24d1f74aacfcdf566b45967ef872f4e09c8d01b466 RLBA-2023:0105 util-linux bug fix and enhancement update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) rocky-linux-8-x86-64-appstream-rpms python3-libmount-2.32.1-39.el8_7.x86_64.rpm f614fd2c1fc6b957438d93fada12ea568af9ca25305eb3b3025579c4b897e852 RLBA-2023:0106 gcc bug fix and enhancement update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) rocky-linux-8-x86-64-appstream-rpms cpp-8.5.0-16.el8_7.x86_64.rpm 023d14d82ff5f25ecc443509a50d3ea5ef0f42fee1805ef8c3d4bec535324e20 gcc-8.5.0-16.el8_7.x86_64.rpm 5b8aace21801f6e6702d6c33e3279dfd9fe894f28d3450236090d075f4509aa2 gcc-c++-8.5.0-16.el8_7.x86_64.rpm 57eb119d1affce29d7c09427b3d2427ef18ed75513c2e9e178f2833b3f6bbdf1 gcc-gdb-plugin-8.5.0-16.el8_7.x86_64.rpm d3b4ec734d470f1c9d7465a9319b2b2d2eac0002a8d8fadd8e578f63c60e77d7 gcc-gfortran-8.5.0-16.el8_7.x86_64.rpm e67137a484d7cca1e388ff92031924bf979e485c85c75ab4887ab93f91cecfa9 gcc-offload-nvptx-8.5.0-16.el8_7.x86_64.rpm 9c79ffc7831ffcac7bb2fa8dab7b9a47e1cc4c8f75bd62f174b68cf0baccfef3 gcc-plugin-annobin-8.5.0-16.el8_7.x86_64.rpm 4c251a06c8b5032d7bb6b3bd3cb637cce6e8f6698e6c76460d436498c2c1b8f7 libitm-devel-8.5.0-16.el8_7.x86_64.rpm b786e7d6210051d4d18a5208fb0ee426ffd6287b49252f502c69c4137320234c libquadmath-devel-8.5.0-16.el8_7.x86_64.rpm 47a32750c89cf5e9cdf6a43a4c93556542997c14c8cf9cd83c2f2f97131b93cf libstdc++-devel-8.5.0-16.el8_7.x86_64.rpm 4967a6b2121388225a306e92f6de0f0208a07f614cf7fa5083c87ed433170fed libstdc++-docs-8.5.0-16.el8_7.x86_64.rpm a7ef4e076abca80ffad691972f006805d09d37c90bfb3d3c661ff096344f2a3c RLSA-2023:0110 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms lemon-3.26.0-17.el8_7.x86_64.rpm 47817f17935b6af44be335b39a44b5a6d0772b6ea2d78d245d549a8e56c01d41 RLSA-2023:0116 Moderate: libtasn1 security update A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libtasn1-devel-4.13-4.el8_7.x86_64.rpm 0d55122e296074efde594a2ff30970b1cfe31086b7273908aa34d2b1059ae1a2 libtasn1-tools-4.13-4.el8_7.x86_64.rpm 46d0db87e2f9d5aa78b591286d07345cb18efaefc4c93756852468c7801fe040 RLBA-2023:0120 authselect bug fix and enhancement update The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) rocky-linux-8-x86-64-appstream-rpms authselect-compat-1.2.5-2.el8_7.x86_64.rpm 0dcb5ee8ac4d74314203eda35bca1ed32982ff799e837977f92a580e6892c52b RLBA-2023:0124 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) rocky-linux-8-x86-64-appstream-rpms sssd-idp-2.7.3-4.el8_7.3.x86_64.rpm e3a0ab19cdf0ff2dec20c7e33f97069bae225df8c11a5b01a4d193b524c15bab RLSA-2023:0173 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libxml2-devel-2.9.7-15.el8_7.1.x86_64.rpm f779a0f9675a3365dffafa0e432c44e9166dec2ce6164f1d3baf17bde23f2bfd RLBA-2019:0973 container-tools bug fix update The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc. Users of container-tools are advised to upgrade to this updated package, which fixes several bugs. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc. Users of container-tools are advised to upgrade to this updated package, which fixes several bugs. rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:0975 Important: container-tools:rhel8 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675) * [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669) * [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675) * [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669) * [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689) rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:0981 Important: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636) * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636) * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d RLBA-2019:0987 mariadb:10.3 bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Bug Fix(es): * Altering table's column used in primary key causes data corruption (BZ#1702602) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Bug Fix(es): * Altering table's column used in primary key causes data corruption (BZ#1702602) rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLSA-2019:1529 Important: pki-deps:10.6 security update The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Open redirect in default servlet (CVE-2018-11784) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Open redirect in default servlet (CVE-2018-11784) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 RLBA-2019:1970 authd bug fix update The authd packages contain authd, a small and fast RFC 1413 ident protocol daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd. Bug Fix(es): * authd authentication fails with ERROR:NO-USER (BZ#1730802) Users of authd are advised to upgrade to this updated package, which fixes this bug. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authd packages contain authd, a small and fast RFC 1413 ident protocol daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd. Bug Fix(es): * authd authentication fails with ERROR:NO-USER (BZ#1730802) Users of authd are advised to upgrade to this updated package, which fixes this bug. rocky-linux-8-x86-64-appstream-rpms authd-1.4.4-5.el8_0.1.x86_64.rpm 2cd8989ff633196026606258fc42d248b1ff003662ee845a9e9f197af077da1b RLSA-2019:1972 Important: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 RLBA-2019:1954 python27:2.7 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757) rocky-linux-8-x86-64-appstream-rpms__python27 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d RLBA-2019:1955 satellite-5-client module update Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) rocky-linux-8-x86-64-appstream-rpms__satellite-5-client python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 571a4ec8b5b17116dc1105367bf344d2d5e99d7f64cdd139abed68156604ec5f python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 711ac546b34b0800ad9a428df43abb16d49657037165d9346094b2ef7b1d4838 python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 12bed1b1726516134b87a833019a03971acdd2647ee20d835a508123e93e6e28 python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm eaa1b2f91389b2137df2afee36b21556592e777c9c5fea50173ae7d325c4c803 rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm c6ebd58dbc04bc16d86ad30394c59c6252992b6a9b7c05322b1245927b6a78d3 rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 32e4a7d4235da0cca307470b72205611adf539711e176d057fb8deb1e08a5641 rhnsd-5.0.35-3.module+el8.3.0+178+27415451.x86_64.rpm 7f2a23b3dd1997439a3c6e06b639d153a960ce6f0224be8bba18423a69050124 rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 9e363cfb7f6d2dc976c53838116bfafcb58be49f3f261af1ab1f64df89111d9b rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm bd1750ce82956377455e3b6de5ac8700eb1a34405d6d6568794da3e97330abe5 RLBA-2019:1956 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470) * Performance Problems with Podman on systems with IO load (BZ#1724522) * podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470) * Performance Problems with Podman on systems with IO load (BZ#1724522) * podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270) rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:2511 Important: mysql:8.0 security update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs. The following packages have been upgraded to a later upstream version: mysql (8.0.17). Security Fix(es): * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503) * mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752) * mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536) * mysql: Server: Connection unspecified vulnerability (CVE-2019-2539) * mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737) * mysql: Server: XML unspecified vulnerability (CVE-2019-2740) * mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780) * mysql: Server: DML unspecified vulnerability (CVE-2019-2784) * mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795) * mysql: Client programs unspecified vulnerability (CVE-2019-2797) * mysql: Server: FTS unspecified vulnerability (CVE-2019-2801) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819) * mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mecab-ipadic, mecab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs. The following packages have been upgraded to a later upstream version: mysql (8.0.17). Security Fix(es): * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503) * mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752) * mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536) * mysql: Server: Connection unspecified vulnerability (CVE-2019-2539) * mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737) * mysql: Server: XML unspecified vulnerability (CVE-2019-2740) * mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780) * mysql: Server: DML unspecified vulnerability (CVE-2019-2784) * mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795) * mysql: Client programs unspecified vulnerability (CVE-2019-2797) * mysql: Server: FTS unspecified vulnerability (CVE-2019-2801) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819) * mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mysql mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f RLSA-2019:2512 Important: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a RLSA-2019:2593 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLBA-2019:2717 python27:2.7 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732326) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732326) rocky-linux-8-x86-64-appstream-rpms__python27 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d RLSA-2019:2720 Important: pki-deps:10.6 security update The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 RLSA-2019:2722 Low: libwmf security update The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick. Security Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libwmf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick. Security Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libwmf-0.2.9-8.el8_0.x86_64.rpm 4f37891f78181ba5c63beed49787b5dc6576856fddadac0da20d190f25c58590 libwmf-lite-0.2.9-8.el8_0.x86_64.rpm af3108a84c555c5b19277f7f16ab43f0f3b406c601be1b7b8c4364e33f17c633 RLBA-2019:2723 container-tools:rhel8 bug fix update Bug Fix(es): * race/corruption: podman failed to launch containers (BZ#1741110) * podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * race/corruption: podman failed to launch containers (BZ#1741110) * podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163) rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLBA-2019:2724 container-tools:1.0 bug fix update Bug Fix(es): * [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707) rocky-linux-8-x86-64-appstream-rpms__container-tools fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:2799 Important: nginx:1.14 security update Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage. Security Fix(es): * HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage. Security Fix(es): * HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm d77c1f61ff7c954fca0a2fac6b5d215deb913be94829d83e7669a94326341d88 nginx-mod-http-image-filter-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm af1755fac641c16ca7dbfd78ecd5853b85189fe2a9013a80d6cc15c790c20758 nginx-mod-http-perl-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm 68ffe1514e55b20afe3fd0d9de5651c799941543bc015e44f9524e30a665639d nginx-mod-http-xslt-filter-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm 337667809e6b461078276949229dbf337915a06945bd083743501c0247d7f9f5 nginx-mod-mail-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm b154bd4e42e272dbb325d06f7eae09abb9feb4038299f6dce1fc95b9c918ffd4 nginx-mod-stream-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm 19a19fe758d472c9c8b471a8ae875482372f340f668184510ff7121d0832d5e8 RLSA-2019:3335 Moderate: python27:2.7 security and bug fix update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446) * python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740) * python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947) * python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446) * python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740) * python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947) * python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d RLBA-2019:3336 nss-altfiles bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nss-altfiles. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nss-altfiles-2.18.1-12.el8.x86_64.rpm 9c32bc933f3ad0cc751246893ab76d85f3839afe2d70f6f2d945dcc97019ad85 RLSA-2019:3345 Low: virt:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755) * QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755) * QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLEA-2019:3361 gedit-plugins bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gedit-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gedit-plugin-bookmarks-3.28.1-8.el8.x86_64.rpm 8ee55f18c9ef924892aa658c08c4ee530cb746cc53c55b406995db7d500bb9e9 gedit-plugin-bracketcompletion-3.28.1-8.el8.x86_64.rpm 56c21923ee5a336aee82c875144d0ed34336611e97bd0f14a90debe433afb39b gedit-plugin-codecomment-3.28.1-8.el8.x86_64.rpm ab8bb5e0f23e617cbf0492b714c384c8a84f133e2cc91215268d1e3b40e4f485 gedit-plugin-colorpicker-3.28.1-8.el8.x86_64.rpm 6e2a9fd2d5b7c4c15b5f143635c1cccd1ddd3328d7114d91dab524b2183a7ba4 gedit-plugin-colorschemer-3.28.1-8.el8.x86_64.rpm 8c76c2706aadb7d8b94da6c1f6aaadc265bc54af15fdfd111debeba11653a961 gedit-plugin-commander-3.28.1-8.el8.x86_64.rpm cef1bdf4601e1a18dacd7489b8ae0a6eaba6a88bd6faeb00ff34d33372205869 gedit-plugin-drawspaces-3.28.1-8.el8.x86_64.rpm 32093993ce0f43cbf5808c19504f7f54f6e2dd2e0c3ec55b896b27a83000acc9 gedit-plugin-findinfiles-3.28.1-8.el8.x86_64.rpm c9e327e321b30c1277553b9fb078f61b0b0faecef864462ace636eae756c0cad gedit-plugin-joinlines-3.28.1-8.el8.x86_64.rpm 3099b3395a9f8da5b15e20da5eba3fe5a71ba310c7d8a1868d24c932f9d5ce90 gedit-plugin-multiedit-3.28.1-8.el8.x86_64.rpm 444af7dbedaa40019c503f13d0a82f74f7b7d87bf687190a04be717de6fc51cc gedit-plugins-3.28.1-8.el8.x86_64.rpm 60987cdc33bea0a8464f6f351a7cef7d2dda4b464c7addc316b1cf7128af31ab gedit-plugins-data-3.28.1-8.el8.x86_64.rpm d56b807f59f8559097c097eca3cc8124ca9c4dc9c4c4c7051bfa0d92501163a2 gedit-plugin-smartspaces-3.28.1-8.el8.x86_64.rpm a95cfd63cf7ad33d989da3aff0583f8ba5005be4c34fe4421a82bc9e4d0421d0 gedit-plugin-terminal-3.28.1-8.el8.x86_64.rpm 8e2cbc6e55d8695c8538ab32cb61d05b2c9d9f29c69a1df115f0d2a76559db4f gedit-plugin-textsize-3.28.1-8.el8.x86_64.rpm 387df64b03c799e437a87611a9740bdb794d4c4ff16e8437ff4d0a82d7eb1247 gedit-plugin-translate-3.28.1-8.el8.x86_64.rpm 1687bf81b496c1c398996db23046a9fb27046ec197dec3f4df82e944ce32af1a gedit-plugin-wordcompletion-3.28.1-8.el8.x86_64.rpm 0e61a5476f5485156b60fb3d04687f88b52364a34aa52ab9ab09334a54c6729d RLBA-2019:3373 criu bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f RLBA-2019:3374 php:7.2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475 libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372 libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5 php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482 php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68 php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm 52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b RLEA-2019:3375 new module: php:7.3 This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5 php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7 RLBA-2019:3382 python-gevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-gevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d rocky-linux-8-x86-64-appstream-rpms python3-gevent-1.2.2-4.el8.x86_64.rpm 97d0e59dbd8e57beffd16895bf906d7cf06d02ee9a310e79860fef6ae78cd9bb RLBA-2019:3384 ruby:2.5 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 RLEA-2019:3399 alsa-plugins bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms alsa-plugins-arcamav-1.1.9-1.el8.x86_64.rpm 549d5132d498ac5385320ac8bb8df3e3e618f43e615cf453f7350ef4a304b5d4 alsa-plugins-maemo-1.1.9-1.el8.x86_64.rpm 42044dad79db97f15ca117d0850fc457c00d7728c3129af779d8f7a161fc1caf alsa-plugins-oss-1.1.9-1.el8.x86_64.rpm b5d262787692b35ebf7476e839e7977589f580726407602f525a7456cc7dfffd alsa-plugins-pulseaudio-1.1.9-1.el8.x86_64.rpm ddbee7fff19b4e1f87929dd688047339a3ad7e3fd2a6e917f417508020a6b8e7 alsa-plugins-samplerate-1.1.9-1.el8.x86_64.rpm 3b3898b0e2e748f3614d076dab4f9bcf392581a8832c8777312edfbea2d3e8ad alsa-plugins-speex-1.1.9-1.el8.x86_64.rpm 025cce6f35fcd4e0b04e329c51e37d7af2de086e39b30f3d7ae59921b186c683 alsa-plugins-upmix-1.1.9-1.el8.x86_64.rpm df4a2a71c782fae44e5f349a87ef63190682d47f8499c204e75f1c8d88f3d9de alsa-plugins-usbstream-1.1.9-1.el8.x86_64.rpm d47e53bbb122ecc904051a02b5ba3d693b8446573f58660a615f617937d6716a alsa-plugins-vdownmix-1.1.9-1.el8.x86_64.rpm 37b572f3cfb040633527f9b6ab083de2952e2f7615a6f656dcb43dbf18050ba3 RLSA-2019:3403 Important: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLBA-2019:3406 python-gssapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-gssapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-gssapi-1.5.1-5.el8.x86_64.rpm 8e40257c5b6d46b869e64fc234db0c7d78fd4659ed191df14c0d5ac45d905daa RLBA-2019:3411 lttng-ust bug fix and enhancement update This update fixes two issues in lttng-ust and subpackages. There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed. lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lttng-ust. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This update fixes two issues in lttng-ust and subpackages. There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed. lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux. rocky-linux-8-x86-64-appstream-rpms lttng-ust-2.8.1-11.el8.x86_64.rpm 69324bb766990259ee748c0fe4b146ee919478fd8c828cb2c6b48a1126c49a08 RLBA-2019:3412 X libraries bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libICE, libXt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libICE-1.0.9-15.el8.x86_64.rpm 2568b940439e3ab124234560251c5ccf3b82969b9a489a8c944919c1de9893e9 libICE-devel-1.0.9-15.el8.x86_64.rpm 12362899f5263ddce92e808a63b5e86c6f3f3c16e43faa39b71b053f3e8862f0 libXt-1.1.5-12.el8.x86_64.rpm 30df272fc4623a96e973ef361cbc6ea2eff0b5645b34f274c4a58f0ab968d6d0 libXt-devel-1.1.5-12.el8.x86_64.rpm d41ae80a927a31d8f6111dce855f27ced876a991dcf1bbe1b796d3450ebfca3e RLBA-2019:3416 pki-core:10.6 and pki-deps:10:6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 RLEA-2019:3420 enscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for enscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms enscript-1.6.6-17.el8.x86_64.rpm 8526cca5224af50c658f7c1e04b192c7722cce4595458a7c2f2c95527cc6b565 RLEA-2019:3425 compat-libtiff3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for compat-libtiff3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms compat-libtiff3-3.9.4-13.el8.x86_64.rpm 1304c7f70782eaa2903ca449db76e1811e0d37c90afd71ee8b511df4d4dcc164 RLEA-2019:3426 libpng15 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpng15. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpng15-1.5.30-7.el8.x86_64.rpm 8ce7dae0d8ef80a5d1feee1ebece3bec3bdef3d185d0a6b64289b01c145b2cd9 RLBA-2019:3439 new packages: gcc-toolset-9-dwz GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-dwz-0.12-1.1.el8.x86_64.rpm 5f8261a71f62b3fb4e1472718b81b1189652e72710d37df6eb38296b5b543f4b RLEA-2019:3443 new packages: gcc-toolset-9-elfutils GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-elfutils-0.176-5.el8.x86_64.rpm 2eef2ff31d574cea7416d85d9399fd82c8b3e59387c4cc33be87f3912f42bac9 gcc-toolset-9-elfutils-devel-0.176-5.el8.x86_64.rpm e9e08f5165c99f3c1de380b7918ba1e60a284640d92d0869620aeb062f85394b gcc-toolset-9-elfutils-libelf-0.176-5.el8.x86_64.rpm 846436e017c2d77367ada9744eff3c9f589343f9e85fc042fc83f498aa0db80a gcc-toolset-9-elfutils-libelf-devel-0.176-5.el8.x86_64.rpm be68c4f4732af6e419a828278bdc346e8d00ef69295efe40729edd8bfb19736a gcc-toolset-9-elfutils-libs-0.176-5.el8.x86_64.rpm 47517201979ac2449b61ab24f82ff5904364fd163721a72aa6350f054350f99e RLEA-2019:3444 new packages: gcc-toolset-9-valgrind GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-valgrind-3.15.0-9.el8.x86_64.rpm 1eb88892de938b9d4e1bd78a8014cb802c1ef6e412959a38ed7757136db4b731 gcc-toolset-9-valgrind-devel-3.15.0-9.el8.x86_64.rpm 95aa574532e5bcb97b0a73165ef1e2f77270161acba2b4a782ad0429520302fd RLEA-2019:3447 new module: ruby:2.6 This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm 2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df RLBA-2019:3449 new packages: gcc-toolset-9-dyninst GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-dyninst-10.1.0-1.el8.x86_64.rpm 6df02dd5b151ecb1e4cdd9025b16fa9e921ef15a6b03533e3b46a215bbea8bb6 RLEA-2019:3454 new packages: gcc-toolset-9-systemtap GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-systemtap-4.1-4.el8.x86_64.rpm 5a6dc6ffb6a37f157aefbfc02164b38c1db6325000e9968867e0a2ebadbbe3af gcc-toolset-9-systemtap-client-4.1-4.el8.x86_64.rpm 8897e248306da3821d112e1f692c5a635f62ef7983b7330756e3f08191eaae13 gcc-toolset-9-systemtap-devel-4.1-4.el8.x86_64.rpm 0c9dccc40c8aafdffe1122b6060de0f59e5dcaf65027260845dfea524393ccc9 gcc-toolset-9-systemtap-initscript-4.1-4.el8.x86_64.rpm 982d1e1a8db7e14221ed71f6352bc1a52d4c835eb3a84ffb3d7d058b90f3f975 gcc-toolset-9-systemtap-runtime-4.1-4.el8.x86_64.rpm a48dea3a6f266f31d24387aafb49b337b57c384d96b5348a2d530351f68d3662 gcc-toolset-9-systemtap-sdt-devel-4.1-4.el8.x86_64.rpm f9953a98d5629774e66ec9c7a23eb9426387406cd2842bfd12664d450c3653f0 gcc-toolset-9-systemtap-server-4.1-4.el8.x86_64.rpm ec1a0beb49da172370b38ab991bafed35d2e35f057c903ccc37b54fe40d3d2b8 RLBA-2019:3455 new packages: gcc-toolset-9-ltrace GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-ltrace-0.7.91-1.el8.x86_64.rpm 8417a0a4f057afbee21e8ce44573a85c6059affeeafb4b3fc63436b4051706c8 RLBA-2019:3457 new packages: gcc-toolset-9-gdb GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-gdb-8.3-1.el8.x86_64.rpm c402ca12acdc3aba7cec6add66be4ac51a0694e46377830c2194f80f85e37cc6 gcc-toolset-9-gdb-gdbserver-8.3-1.el8.x86_64.rpm ff3d9a1c2d55a09a49b304e680107d73e0941c45a26d32d0d12c94f8f1e7afb2 RLBA-2019:3462 libcdio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcdio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libcdio-2.0.0-3.el8.x86_64.rpm 6a060a4f1db6ba186a94e8a733dc16045b90352200136898005ef516101c1c1d RLBA-2019:3465 hplip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hplip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms hplip-3.18.4-9.el8.x86_64.rpm b6ddf49b9620356330be16bd3aadce81e022fd52b3eaeb466332cb0f18bc1dfd hplip-common-3.18.4-9.el8.x86_64.rpm b2d6d0450a7b58bf970fc13cb5d3792e37ce0111c9ff99b135d3409471a8fe71 hplip-gui-3.18.4-9.el8.x86_64.rpm 561f58c36b5e5c98848e6b9025edfe5b988590166c776805997f0a549efa4125 hplip-libs-3.18.4-9.el8.x86_64.rpm fcdeb5dbff590b4c154b56471d0f3592b5998eb20cff0e8c279df0b9134b0d02 libsane-hpaio-3.18.4-9.el8.x86_64.rpm e59779857cfee8069795c2b567e877cbf81c3cb962bfe9ac98d355381471dd41 RLBA-2019:3466 libkkc-data bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libkkc-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libkkc-data-0.2.7-12.el8.x86_64.rpm 8932c5300df500745f4e27cc9210313bfa68501c5b8c98b94f336c32d7358a88 RLBA-2019:3468 sblim-indication_helper bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-indication_helper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-indication_helper-0.5.0-2.el8.x86_64.rpm 9ce614765666f2b1844db8b46414736e62a129fbbaa65a0718ecc8e9946158c3 RLBA-2019:3471 container-exception-logger bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for container-exception-logger. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms container-exception-logger-1.0.2-3.el8.x86_64.rpm 226566224f9bbee3c0b7ec102ddc1ce3f4e84fdeded9027ae7c41478e23e1063 RLEA-2019:3472 libpmemobj-cpp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpmemobj-cpp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpmemobj++-devel-1.6-2.el8.x86_64.rpm 391cececabace73d050b8bb563f1315638653716f594e042e4e9cb86f61c4b9c libpmemobj++-doc-1.6-2.el8.x86_64.rpm 9cd1db8bef466f7b30b35dbf9780d661c62b248ae6b8b37264ce18ffe8d8115f RLBA-2019:3474 satellite-5-client module update Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) rocky-linux-8-x86-64-appstream-rpms__satellite-5-client python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 571a4ec8b5b17116dc1105367bf344d2d5e99d7f64cdd139abed68156604ec5f python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 711ac546b34b0800ad9a428df43abb16d49657037165d9346094b2ef7b1d4838 python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 12bed1b1726516134b87a833019a03971acdd2647ee20d835a508123e93e6e28 python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm eaa1b2f91389b2137df2afee36b21556592e777c9c5fea50173ae7d325c4c803 rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm c6ebd58dbc04bc16d86ad30394c59c6252992b6a9b7c05322b1245927b6a78d3 rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 32e4a7d4235da0cca307470b72205611adf539711e176d057fb8deb1e08a5641 rhnsd-5.0.35-3.module+el8.3.0+178+27415451.x86_64.rpm 7f2a23b3dd1997439a3c6e06b639d153a960ce6f0224be8bba18423a69050124 rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm 9e363cfb7f6d2dc976c53838116bfafcb58be49f3f261af1ab1f64df89111d9b rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm bd1750ce82956377455e3b6de5ac8700eb1a34405d6d6568794da3e97330abe5 RLSA-2019:3476 Moderate: squid:4 security and bug fix update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLBA-2019:3487 abrt-java-connector bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for abrt-java-connector. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms abrt-java-connector-1.1.0-16.el8.x86_64.rpm 7e6373b1a4d155667f3d37f19a035af395ef37324f31af8968ce3b237fc85fb8 RLBA-2019:3490 ldns bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ldns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ldns-1.7.0-21.el8.x86_64.rpm 579cbe08fbd4d2870363ad94dcaac1517bfefc02621f94d79ddaf783f0ed9338 RLBA-2019:3492 jna bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jna-4.5.1-5.el8.x86_64.rpm 75e7e9bb4c13e26e4665020f7fe0ea4709ba807c6a4221fe1d9d1bedf7492074 RLSA-2019:3494 Important: container-tools:1.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLBA-2019:3500 volume_key bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for volume_key. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms volume_key-0.3.11-5.el8.x86_64.rpm 962a11cdf4fb9ce68fa7fceb99a1f3b34199320dfb11a7e4c0a1bdd7ff805f63 volume_key-devel-0.3.11-5.el8.x86_64.rpm df504d9ef85876617735bd3316c16cad07524b2622aeb16b7d7078b7af72c657 volume_key-libs-0.3.11-5.el8.x86_64.rpm f998500b251c3416e796c60f171bced0eb190acd2c4a0a6c0469fdb6072e4eb1 RLBA-2019:3507 qpdf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qpdf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qpdf-7.1.1-10.el8.x86_64.rpm 174b0828f65c2c71d0d4bf8f883e58b0369b16dfed5aec5c917717a4270026ff qpdf-libs-7.1.1-10.el8.x86_64.rpm e36f1b137bf58ed4b21f333b59fbb93b4855cb9045a2c41322320e9cf58ec2c9 RLEA-2019:3557 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cmocka, nss_wrapper, uid_wrapper, socket_wrapper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nss_wrapper-1.1.5-3.el8.x86_64.rpm 5ba1254970834a881d6be6a64f03d1a5660602f5cc40f351c4d46cb04b36e5d3 RLBA-2019:3623 NetworkManager bug fix and enhancement update An update for NetworkManager is now available for Rocky Linux 8. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list An update for NetworkManager is now available for Rocky Linux 8. rocky-linux-8-x86-64-appstream-rpms NetworkManager-libreswan-1.2.10-4.el8.x86_64.rpm 60d73cbb869b8753e3627cf96d9fc5f175bc8719e912958ac88274852927ac7b NetworkManager-libreswan-gnome-1.2.10-4.el8.x86_64.rpm cab52e3f13b05fa3c1211589d2d6550fecb49d5a5dde5581995693d6c85a8294 RLSA-2019:3703 Low: libvorbis security update The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates. Security Fix(es): * libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392) * libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libvorbis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates. Security Fix(es): * libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392) * libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvorbis-1.3.6-2.el8.x86_64.rpm 2fc30d8b8e41b392adc0ecd2cd63377cc7bba4c2664d9b0437b2c6bdeed5c620 RLSA-2019:3708 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358) Security Fix(es): * mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510) * mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628) * mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739) * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740) * mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for asio, Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358) Security Fix(es): * mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510) * mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628) * mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739) * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740) * mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLSA-2019:3735 Critical: php:7.2 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475 libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372 libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5 php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482 php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68 php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm 52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b RLSA-2019:3736 Critical: php:7.3 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5 php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7 RLBA-2019:3785 libcacard bug fix and enhancement update The libcacard packages contain the Common Access Card (CAC) emulation library. This update fixes the following bug: * Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477). Users of libcacard are advised to upgrade to these updated packages, which fix this bug. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcacard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libcacard packages contain the Common Access Card (CAC) emulation library. This update fixes the following bug: * Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477). Users of libcacard are advised to upgrade to these updated packages, which fix this bug. rocky-linux-8-x86-64-appstream-rpms libcacard-2.7.0-2.el8_1.x86_64.rpm dcc0805bce58d3f08b032fc8dae90ff8a0c35da6754643c25cd4c8f08acb81e1 libcacard-devel-2.7.0-2.el8_1.x86_64.rpm 68396d58b579bd54d1428654d9811ca4089ef7096677e225e6f868d16de147be RLSA-2019:4269 Important: container-tools:rhel8 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318) * backport json-file logging support to 1.4.2 (BZ#1770176) * Selinux won't allow SCTP inter pod communication (BZ#1774382) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318) * backport json-file logging support to 1.4.2 (BZ#1770176) * Selinux won't allow SCTP inter pod communication (BZ#1774382) rocky-linux-8-x86-64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 RLSA-2019:4273 Important: container-tools:1.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc RLBA-2019:4274 virt:rhel bug fix update Bug Fix(es): * Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829) * [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133) * Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134) * [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829) * [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133) * Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134) * [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2020:0279 Moderate: virt:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLEA-2020:0346 new module: postgresql:12 This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLBA-2020:0347 perl-DBD-Pg:3.7 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 RLSA-2020:0348 Important: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for containernetworking-plugins, python-podman-api, udica, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 RLSA-2020:1379 Important: container-tools:rhel8 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194) * fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016) * buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for udica, python-podman-api, slirp4netns, containernetworking-plugins, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194) * fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016) * buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLBA-2020:1354 gcc-toolset-9-binutils bug fix update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958) rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpm c4fd1717fd48949497da91cc88989d24e81fe925bb57e995aac790154d865c41 gcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpm 4664b94c012a43fd9cbb22dbb2b5717b8f1c76453bdd654a0df1ce5c5a1ebe88 RLSA-2020:1358 Important: virt:rhel security and bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2020:1360 Important: container-tools:1.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc RLSA-2020:1577 Moderate: exiv2 security, bug fix, and enhancement update The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917) Security Fix(es): * exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421) * exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005) * exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868) * exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303) * exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338) * exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229) * exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099) * exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143) * exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109) * exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111) * exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112) * exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113) * exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libgexiv2, gnome-color-manager, gegl, exiv2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917) Security Fix(es): * exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421) * exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005) * exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868) * exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303) * exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338) * exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229) * exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099) * exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143) * exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109) * exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111) * exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112) * exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113) * exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gegl-0.2.0-39.el8.x86_64.rpm 9da238520faee587b7d4c213e996ed1848c00dd0dd80efe1e497f0e91197e443 gnome-color-manager-3.28.0-3.el8.x86_64.rpm c24a3854ebc59169cedd0d384f7dff9047c81299d5ab7b13c282dbbd20dd55bd libgexiv2-0.10.8-4.el8.x86_64.rpm d6e26f8aea4dfd969f068749aeb11b99ea1a19f85b311d4c2414fc3c1332db43 RLEA-2020:1579 whois bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for whois. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms whois-5.5.1-2.el8.x86_64.rpm 2222561be8aa7f17033cf8dcbf8bd823ac3c8ec61e11da943008ecba6726bc37 RLEA-2020:1587 virt:rhel bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2020:1599 libselinux-python:2.8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__libselinux-python libselinux-python-2.9-2.1.module+el8.4.0+532+c114ce35.x86_64.rpm ae7f81152647d4c05b01209e235a4844d6f51a82e70168bb11966ca43cc776ff RLSA-2020:1605 Moderate: python27:2.7 security, bug fix, and enhancement update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944) Security Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python: Cookie domain check returns incorrect results (CVE-2018-20852) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944) Security Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python: Cookie domain check returns incorrect results (CVE-2018-20852) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d RLEA-2020:1607 http-parser bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for http-parser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms http-parser-2.8.0-9.el8.x86_64.rpm 7cc537d8110104b9e9a9d7e1602fea66bf3f3258e0475cc1327f0f228f339e21 RLEA-2020:1611 input stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xkeyboard-config, libevdev, libxkbcommon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxkbcommon-0.9.1-1.el8.x86_64.rpm 51f79ea9268dae9826ece0bc98c135dd5ca62b08581694ae5401971690fd3766 libxkbcommon-devel-0.9.1-1.el8.x86_64.rpm bc172de2c44bdbf518ba6558aa8ae7db3ee9779f00a456278fa2247369b6c17b libxkbcommon-x11-0.9.1-1.el8.x86_64.rpm d8864abf376820a1a7ac8060fa753486b6a189f1ed3f9287080740dcd89d511f RLSA-2020:1616 Low: irssi security update Irssi is a modular IRC client with Perl scripting. Security Fix(es): * irssi: use after free when sending SASL login to server (CVE-2019-13045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for irssi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Irssi is a modular IRC client with Perl scripting. Security Fix(es): * irssi: use after free when sending SASL login to server (CVE-2019-13045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms irssi-1.1.1-3.el8.x86_64.rpm 52d26652faf272caa1948ed66b71ee827443f8a8a374e99186a5afda8bab7085 RLBA-2020:1617 pmdk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pmdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms daxio-1.6.1-1.el8.x86_64.rpm 1e9c5f2802c05afb6f6a3245e63f9903da9624c37af3844eb7222ac0b402a3f0 libpmem-1.6.1-1.el8.x86_64.rpm 9390e81eff676f6d996eeee96bd8b357eb3bdbfe33e8f58eb992214d836437ca libpmemblk-1.6.1-1.el8.x86_64.rpm 3542e03b622e8ccab260c766656e20eda1108986d18a417b5c2bfbe87a4ec0e8 libpmemblk-devel-1.6.1-1.el8.x86_64.rpm 54855006772d493e4b01789c8d61a53cfd4e65e0f4892d921b32ba7c7fdd866a libpmem-devel-1.6.1-1.el8.x86_64.rpm db5ffdd71e17560f76194194ab8991f101dfc2ebfcc0d0eabe2b5be29431b392 libpmemlog-1.6.1-1.el8.x86_64.rpm 3f6888905e519eba4431e5131c93f483f5d48ee4343069d27de3148e81ddcdca libpmemlog-devel-1.6.1-1.el8.x86_64.rpm ada2820ea6d421c33b3a0ca644bf3bda157467e2ca319d29f68a3567cb20f28b libpmemobj-1.6.1-1.el8.x86_64.rpm b416032faf71a26ee22012a6a4af0a6f219139dc35140e88a63c1ed54c90bbf7 libpmemobj-devel-1.6.1-1.el8.x86_64.rpm 45c5c07ab0b19824c36f7add9f3cc256a204184da541a850585a1582254a748d libpmempool-1.6.1-1.el8.x86_64.rpm baaddd2fa82996cb11985951f91409c99ca26b7f4a2d634d0be44dafe830a74d libpmempool-devel-1.6.1-1.el8.x86_64.rpm 5f7cdb35109a3a9f82170633093b9ed47479ac3203740096fc15069f645c646b librpmem-1.6.1-1.el8.x86_64.rpm 6d86d6901893a4d0a6e890ebfa528a2338bb53f74d5a50201bbb41197d48afc4 librpmem-devel-1.6.1-1.el8.x86_64.rpm 462852e411c339993af8ea83ab6e8c9784c100aa9457054148c9acbd361fad7c libvmem-1.6.1-1.el8.x86_64.rpm b2efd8c272562f2f2176edb821d32a9545f2da5e2781147d60cd2f1f42bbba04 libvmem-devel-1.6.1-1.el8.x86_64.rpm f236be66a4a07483f19f9d5541a9dcfa7e3d21e6767b465856e1d499cb5bc642 libvmmalloc-1.6.1-1.el8.x86_64.rpm 6717873d36ea17ccc0e0dd9d33d53c832813b48d36b8d09ff0126deb79f7b578 libvmmalloc-devel-1.6.1-1.el8.x86_64.rpm 3db9411351c74d3ff72af48de27fc594e26c29b8ebdba3e740ad1b4193d46bfd pmempool-1.6.1-1.el8.x86_64.rpm 161a8ed305488e6003e0e3d5d0b6f6668fcefebe5cc7113ee340eca83bd4fd96 pmreorder-1.6.1-1.el8.x86_64.rpm eafef0efebf3a85e93f7adce92f394839ddfd0d9652e534201da7c6a9a046030 rpmemd-1.6.1-1.el8.x86_64.rpm 7b19fda765ef96e67ab9a51598f1f3e5b4fc5737e4d02d44cc2c7327a143abc6 RLEA-2020:1618 pmdk-convert bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pmdk-convert. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pmdk-convert-1.7-1.el8.x86_64.rpm 20230e1a1da258f0ca2610927011ed1503d66c644ef86e537f393275835db261 RLBA-2020:1622 python-greenlet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-greenlet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-greenlet-0.4.13-4.el8.x86_64.rpm b420503c732ab66fa5273c9958e6fec08c6fc41d9fd8a73df9a944a418a89656 RLSA-2020:1624 Moderate: php:7.2 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981) Security Fix(es): * php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020) * php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639) * php: Invalid read in exif_process_SOFn() (CVE-2019-9640) * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: Buffer over-read in PHAR reading functions (CVE-2018-20783) * php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021) * php: memcpy with negative length via crafted DNS response (CVE-2019-9022) * php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023) * php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024) * php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034) * php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035) * php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php, php-pecl-apcu, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981) Security Fix(es): * php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020) * php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639) * php: Invalid read in exif_process_SOFn() (CVE-2019-9640) * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: Buffer over-read in PHAR reading functions (CVE-2018-20783) * php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021) * php: memcpy with negative length via crafted DNS response (CVE-2019-9022) * php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023) * php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024) * php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034) * php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035) * php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475 libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372 libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5 php-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm e8c89eb016473a87dee62f6608b3f052a01f3fdaac8a3bee8bf1bc3fb14e4a91 php-bcmath-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 68aeede7037745de7d9c4a87f4e95b412ad312eacd815f5135f0af710719fe2a php-cli-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 6d2cdcd5dfec65e866d823db778aaebe2b7961d70a07431087e870ea48cf7237 php-common-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm ff4d4ae4646cb95eb1504ef261bfc32509af509b4e5feff09e4340b57044452c php-dba-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm d33a92302c7879f27e807621b72305de719831de2e40ab27fa36e06e8be54440 php-dbg-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm d3e92a616a1626dd40720fadf951f03eeeb7bbd7e90d6027347edd771f8d0445 php-devel-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 366a440d32dc12d9b7ae610b0c0cae66f62f4ed79877112fadeb0197880d54b1 php-embedded-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm b24fe44153454b0a85ebeff5c454810544eaa702090cc5db737ae0de0c1ee852 php-enchant-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm c6d5229c771398c10a5b5f5ec3f92ce45b68f8fafd3d6df231a96a4235c3809a php-fpm-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 8217ad0c7d917edf411b295716a0cbddb1a20328708db91287d6f632355a2b54 php-gd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 1e689dca2b676adb347c55fddd778acdbca3aac326b16dd8e6c58a6d908bb1e8 php-gmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm be29f61e1366cd19956e8ef1741c74248ff21641df66d58e20a2bbc3328cb0e8 php-intl-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 6a839a9c155e561efc2b3d8e3d72353bc3f9a61d8a3c4a471ff68f12273ef502 php-json-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 5561451a9dfdb99c2af45d2011a208e3b0337c23591e85fafe8e273523554bc3 php-ldap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 0270a8e9b01f280a9fa939c41f0cca4c513bc4d481099d388b28ba0f4722823d php-mbstring-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 6e361ea39d2a5e9bf2424fbf4dcf105ef08391350932ae6bfab424a50a98d745 php-mysqlnd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm e848cb92481789dd32bd6e4a12b5ca45bd72dd958bb7251e51e75f96947baf4e php-odbc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 50301245d22ac3c3d1ebfb6f20b3791924dbe50b49c6854948b48b23734f019b php-opcache-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm e3c38b730366995ecf4164bdbcdd12547a284d65df7dae39652d4a9f33bee8aa php-pdo-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 28e87c9a557ba73e0cbc0d1fea7c673fbd02239fd94a3c10531a375f25e48ada php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482 php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm 7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68 php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm 52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b php-pgsql-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm febe0f6ea94f80ebf7ef18875ee5c60517089945b109b12ab471a228bb3a8b6b php-process-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm df61d9b4cac0b42f6e804fa37c1bd38b8f5d853561a52b0cd1065215ace16b1b php-recode-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 893ae8e57613b51870b3c9c72cbf6fd3ff19071a45b755c69b5e3ef460067f62 php-snmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm ce229765886ed0052080a929dab4c81e0d3a309e6bcecf0c21cd4238e93d9214 php-soap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 897a5df0e71a0d773ae24e1223b73b7c79a9387da99749e6c07290268c7f54dc php-xml-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm aff53a597cfc74f4c819d3106261135fe4300cf5c64e2d6f8f2e3d0a68b1ee1c php-xmlrpc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm 190fa61efe99be2f949fcb25f8d456893bf14d38976dfd7c5883efaa2e8ced48 RLBA-2020:1626 ltrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ltrace-0.7.91-28.el8.x86_64.rpm 328d16d21ea8d28ea824abf0efd162bc4dfd16dcf3191a989d0749ec22d829ec RLSA-2020:1631 Low: GStreamer, libmad, and SDL security, bug fix, and enhancement update The GStreamer library provides a streaming media framework based on graphs of media data filters. The libmad package is an MPEG audio decoder capable of 24-bit output. Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. Security Fix(es): * libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libmad, gstreamer1-plugins-ugly-free, gstreamer1-plugins-bad-free, SDL2, orc, gstreamer1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GStreamer library provides a streaming media framework based on graphs of media data filters. The libmad package is an MPEG audio decoder capable of 24-bit output. Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. Security Fix(es): * libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gstreamer1-1.16.1-2.el8.x86_64.rpm 74abf0a1fc61255b2dcd15e305266551beb9b2d111f0a52a5aef27c62c873450 gstreamer1-devel-1.16.1-2.el8.x86_64.rpm 73a77d1ce7274051e7cfb6237cbf4c4e4b6421902799183421370fc8f73f140b gstreamer1-plugins-bad-free-1.16.1-1.el8.x86_64.rpm 111298c70ce191ced925d6c74da4420df2352e57dad7f199c5df2fd788ab7143 gstreamer1-plugins-ugly-free-1.16.1-1.el8.x86_64.rpm 6844c81cb360ab071008ba774447848cbe2ff75033aedbdbec3a0e13474be7af libmad-0.15.1b-25.el8.x86_64.rpm 1134b11d9467844dc6cf81ddb59914c5b3c335b0fd9ae5d77e49b885d3bda446 orc-0.4.28-3.el8.x86_64.rpm 38d6384654084c9409e6b6e965278d3c023e7a3c0d4cc032fc1472499e4e4188 orc-compiler-0.4.28-3.el8.x86_64.rpm 5bb52ac79454dc2e2576d0f17d4bbd2d089db071a19c99ce1f3ea23989901dbe orc-devel-0.4.28-3.el8.x86_64.rpm b06be7958b80375c3aba49acf148d5ed42ad20ab035a4a9d7635ddd25167f78f RLBA-2020:1633 xorg X11 server and driver bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libepoxy, wayland, libxcb, mesa-libGLw, wayland-protocols, libXpm, xorg-x11-drv-libinput, pixman, xorg-x11-drv-wacom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxcb-1.13.1-1.el8.x86_64.rpm f879eab6ae5acfddf7c6aa6cb7192fec725940babca04b33388fb1f0b5aadb5b libxcb-devel-1.13.1-1.el8.x86_64.rpm 6228a598daace6500dd10a86572eaca31560c6e1003f87f8d831dc66bb2d5750 libXpm-3.5.12-8.el8.x86_64.rpm d5594de8b7df3e9c907be53eb619f027d1cc1b74cdc8c3b9215cecfaf96bfefe libXpm-devel-3.5.12-8.el8.x86_64.rpm 0bd3d99a95fd5b421cb25d618c0a5539e776a14de9bb71ddafb679c6273bff4c mesa-libGLw-8.0.0-18.el8.x86_64.rpm 4a62430944ac2e54cd3aaf28e1fd6b47341090643330a2794f9b5d1f7309b2a4 mesa-libGLw-devel-8.0.0-18.el8.x86_64.rpm d7bb96bda34dae57b388c1f479c1073696ef6b2a7577ae947df0829d16a647d4 xorg-x11-drv-libinput-0.29.0-1.el8.x86_64.rpm 5dd25511b396ccfe839c16c47bd213c736c4f1c1d53849a99860ba8a3ee483d0 xorg-x11-drv-wacom-0.38.0-1.el8.x86_64.rpm 05c0a87dcd9689fcb21f11141f298146f8931535095c9d33d8ad4156e82350ea xorg-x11-drv-wacom-serial-support-0.38.0-1.el8.x86_64.rpm a35a692b1d7acf6bbdcdde09020c793249d65ad0d5f7e6a6446ad388e4956661 RLSA-2020:1644 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540) * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335) * jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942) * jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943) * jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, jackson-annotations, jackson-databind, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540) * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335) * jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942) * jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943) * jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 RLSA-2020:1650 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921) * containers/image: Container images read entire image manifest into memory (CVE-2020-1702) * podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921) * containers/image: Container images read entire image manifest into memory (CVE-2020-1702) * podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLBA-2020:1661 xorg-x11-drv-qxl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-drv-qxl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xorg-x11-drv-qxl-0.1.5-11.el8.x86_64.rpm c9ab74b68da2c0a8021a878d52335943183eb7f0ce1b2d013c5ae7c46de513f8 xorg-x11-server-Xspice-0.1.5-11.el8.x86_64.rpm 6e37bd87969271a978c82782d84c47b3f79eeac1dbb942ebe1cd03ce4d47a6ac RLBA-2020:1666 gcc-toolset-9 bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-9.0-4.el8.x86_64.rpm 3fb04ea97ffd31864961c227504c19bb08e0962250d78a56643bcbdeae512d6c gcc-toolset-9-build-9.0-4.el8.x86_64.rpm 112a38a574d673354c64ad19318b927d6330e752518613d4a782c74a2a879b84 gcc-toolset-9-perftools-9.0-4.el8.x86_64.rpm 3b049cd421211ea3db048eb15cb19167c3eb621590fe05eddcbd23ab7de91f98 gcc-toolset-9-runtime-9.0-4.el8.x86_64.rpm 6f042a67a613e193878d9b3501c4c79295fee3e46cf6a1d4852c1a87495e485b gcc-toolset-9-toolchain-9.0-4.el8.x86_64.rpm 478abaa58914ce5a4e6c16b7d7d2b9877d7dc307a7aeb1461f7e0fd0ff264828 RLEA-2020:1675 new module: container-tools:2.0 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:2.0 module to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:2.0 module to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLSA-2020:1686 Low: libmspack security and bug fix update The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft. Security Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libmspack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft. Security Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libmspack-0.7-0.3.alpha.el8.4.x86_64.rpm ffe3213cb432e8c9066e152afd41d5ff306eb626c83ad417f8ff23e7e5f9cb0f RLBA-2020:1690 gtk-vnc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gtk-vnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gtk-vnc2-0.9.0-2.el8.x86_64.rpm 2bfff0a24ce4eb6d52ec696e96c58aaf68bf49b081c47993bc451ce8446c24c9 gvnc-0.9.0-2.el8.x86_64.rpm 15fed146b4d63617c6855bffd308d6dd19c47968c01e9fe4d7252715703b341a RLEA-2020:1692 php:7.3 enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for php-pear, php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5 php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm c488f0dba64ba85b4b9888f0ecef07cac2a26a600dee305c50c4eccbd22f018f php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7 RLEA-2020:1694 new module: python38:3.8 This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-more-itertools, pytest, python-psycopg2, python-urllib3, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python-asn1crypto, python-py, python-chardet, python-markupsafe, python-pluggy, Cython, python-psutil, python-wcwidth, babel, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 RLBA-2020:1695 luksmeta bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for luksmeta. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libluksmeta-devel-9-4.el8.x86_64.rpm 8de7884362e85eead893c80b480f0aacf04435ead879224f1f271e6784395e70 libluksmeta-9-4.el8.x86_64.rpm 3db29d50509fd273d410b113d96cee5cfc30660aa09b3e31414b92bf4557df8f luksmeta-9-4.el8.x86_64.rpm d75fee723d6411a531fca66be33b001c5d990f59d08fcadd80fb104c8c207466 RLBA-2020:1700 libbytesize bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbytesize. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libbytesize-1.4-3.el8.x86_64.rpm bf0c4717f287401f9e7ef99509de83cb521164ac666a9f787d5e9d6a6baf58ec python3-bytesize-1.4-3.el8.x86_64.rpm 669e9ddced50415ef55fe469d58a97e8fdd7cd582162a15135d1705a73bdaa7d RLEA-2020:1707 spice-streaming-agent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-streaming-agent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-streaming-agent-0.3-2.el8.x86_64.rpm b0510e805197699ce2ebfff6be3462cd1c6a6ed966ee376d896f0172f5f9ea9d RLSA-2020:1708 Moderate: liblouis security and bug fix update Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg). Security Fix(es): * liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684) * liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685) * liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577) * liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for liblouis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg). Security Fix(es): * liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684) * liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685) * liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577) * liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms liblouis-2.6.2-21.el8.x86_64.rpm 61df0b3c8c29746e62bdb76309ebd73857b125f47213671592f97a63bb5789f1 RLEA-2020:1709 new package: virt-p2v Virt-p2v is a tool for conversion of a physical server to a virtual guest. This enhancement update adds the virt-p2v package to Rocky Linux 8. (BZ#1704180) All users who require virt-p2v are advised to install this new package. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-p2v. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virt-p2v is a tool for conversion of a physical server to a virtual guest. This enhancement update adds the virt-p2v package to Rocky Linux 8. (BZ#1704180) All users who require virt-p2v are advised to install this new package. rocky-linux-8-x86-64-appstream-rpms virt-p2v-maker-1.42.0-5.el8.x86_64.rpm 2288be0afbe6ef9ca5e037cb6d4508c644dcd34ae82c6aa040519f4f2af90513 RLBA-2020:1713 gcc-toolset-9-binutils bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417) rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpm 4664b94c012a43fd9cbb22dbb2b5717b8f1c76453bdd654a0df1ce5c5a1ebe88 gcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpm c4fd1717fd48949497da91cc88989d24e81fe925bb57e995aac790154d865c41 RLBA-2020:1726 ipvsadm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipvsadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ipvsadm-1.31-1.el8.x86_64.rpm 791359c3e500082c6daa7610d495b285c8c4b174be527cd02b90d71e4b59a7b6 RLBA-2020:1737 gcc-toolset-9-strace bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-strace-5.1-6.el8.x86_64.rpm 1ddb53e90fbdfb19a7d0a556723e6394ecd1a16af69878e8637ba86e9e9b341b RLBA-2020:1741 python-reportlab bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-reportlab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-reportlab-3.4.0-8.el8.x86_64.rpm 89753b1b2534dbc2c44b2cbd5b5ca7c06a1bedafbca56087c63a2ded0d9c2acd RLBA-2020:1742 gcc-toolset-9-make bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-make-4.2.1-2.el8.x86_64.rpm a886becf7389c72de970fa8bb32647d4348c543ce91f55a8c6af16c21aacfe13 gcc-toolset-9-make-devel-4.2.1-2.el8.x86_64.rpm e0538a389200d2a4f4e1285e12d249d7e2918c94eba5b3bb5163ae3b4641a02c RLBA-2020:1743 librevenge bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librevenge. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms librevenge-0.0.4-12.el8.x86_64.rpm e02f71c18ad100ae01818134e706e2e75e6cfa5d4c14189f578205f8d6654593 librevenge-gdb-0.0.4-12.el8.x86_64.rpm cb084768cf9ad94234a0923a4b6954a47963231f54c4d1259264965b06d50573 RLBA-2020:1745 python-pycurl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pycurl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pycurl-7.43.0.2-4.el8.x86_64.rpm 64ea29c73cbbf33a54abfeebe18880ed90d2b313f5f186a47247ffe3dfe0946a RLBA-2020:1750 sblim-cmpi-base bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-cmpi-base. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-cmpi-base-1.6.4-14.el8.x86_64.rpm 4fdd9072c8d73b641504b5dbb352d17bc7afce04a11bf0a1233f5662ed08bfdb RLBA-2020:1754 gcc-toolset-9-annobin bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-annobin-9.08-4.el8.x86_64.rpm f82e9f47e52e802b14041b0a2abd8213e3941a33acc643fe94eb9a346f750d45 RLSA-2020:1926 Important: container-tools:1.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * conflicting requests: failed to install container-tools:1.0 (BZ#1813776) * podman run container error with avc denied (BZ#1816541) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, slirp4netns, oci-systemd-hook, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * conflicting requests: failed to install container-tools:1.0 (BZ#1813776) * podman run container error with avc denied (BZ#1816541) rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051 RLSA-2020:1931 Important: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLSA-2020:1932 Important: container-tools:rhel8 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLSA-2020:2041 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) * squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) * squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) * squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) * squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLBA-2020:2456 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1834346) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1834346) rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLBA-2020:2457 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1836978) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1836978) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLSA-2020:2774 Important: virt:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) * QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) * QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2020:3032 Moderate: mod_auth_openidc:2.3 security and bug fix update The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) * mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) * mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107) rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102 RLBA-2020:3036 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLSA-2020:3053 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-podman-api, udica, toolbox, runc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm 2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2 RLSA-2020:3623 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) * squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) * squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2020:3662 Moderate: php:7.3 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655) Security Fix(es): * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045) * php: Information disclosure in exif_read_data() (CVE-2019-11047) * php: Integer wraparounds when receiving multipart forms (CVE-2019-11048) * oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224) * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) * oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163) * oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203) * oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204) * pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454) * php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059) * php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060) * php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062) * php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063) * php: Information disclosure in exif_read_data() function (CVE-2020-7064) * php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) * php: Out of bounds read when parsing EXIF information (CVE-2019-11050) * oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246) * php: Information disclosure in function get_headers (CVE-2020-7066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655) Security Fix(es): * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045) * php: Information disclosure in exif_read_data() (CVE-2019-11047) * php: Integer wraparounds when receiving multipart forms (CVE-2019-11048) * oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224) * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) * oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163) * oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203) * oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204) * pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454) * php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059) * php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060) * php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062) * php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063) * php: Information disclosure in exif_read_data() function (CVE-2020-7064) * php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) * php: Out of bounds read when parsing EXIF information (CVE-2019-11050) * oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246) * php: Information disclosure in function get_headers (CVE-2020-7066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d php-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 81c845ff6e92154312d6dee84eb0a2420f555560c720df74c6ac28f91d6814a3 php-bcmath-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 3521b7280b6bb19c5c33fdb7bcc1d8900222cb720baad4f5aef0a64c24b5f501 php-cli-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66b575dd4de583eaa438e9fa29e1690622da46917506ff101a29d082d28666b2 php-common-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2b818cb38f29eb46323eb7f988e7eec6e57c54dee336cb9ad680624b4e5ae0c php-dba-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm eacf57de74bb58757840239513992e3e2c48da900db3fae2f4a6fcd9d4e2d520 php-dbg-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 6de3d1723a37e21f09751a1df454ce3db61151f6886e857cd8a016968cbfa887 php-devel-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm a2d8a6b55e603788e61635c41a78bb88fcf23cd638b5b4605e64a793ef1c2723 php-embedded-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm d4a5467b1bf5aaa6eb5977c4e4e8638edc9abdb65a7f0a436fd6d4d142d52ea2 php-enchant-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 8f10ea82c11d1836ec6878a5ec5e307422b5f86900e0f569b9c1700089604643 php-fpm-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm beb88ba847269ee001e886db7f4b23d750c1d0f1f1d3bd7c0d77a8a4c5149fa3 php-gd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 0bcaa3bb5600f7d6bfa85c7bdcf4fc34986413fdf7fab2a5f1dbe536893fbc61 php-gmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm a70d92c3cc81c1afd9df86741429fd58d948e19c4747c2dff43a55d3c1b64620 php-intl-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 16b3429667ecf09b1a359959940540167d31a12777564d7d9c318c5b90961b70 php-json-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e9b6597c148f59d8d6418aad929477baf26e0468f260c937281357b433f16c79 php-ldap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 178899d11efba895402fe773aafaf6510150f300aafb15294947b1d36d35a6c1 php-mbstring-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 999d14ab0851ef0a72da81beb3562166d8a02259f31562f91608eb413ce85a75 php-mysqlnd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 4806123ba0bbd0586a1148b4b791d8041af7caf7ca3e2d5e92001393b23edb58 php-odbc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f934922a6bfcee875fc543c9cb76ce02687b611c717cfae9d9834b97c5bc29d4 php-opcache-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 3b7570d6416f18238605c38113ab52847f2e9d4527b63f20bdbdddb6c54ff511 php-pdo-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm d1a63ef832f6108bdd1e8c746b1b03489f1dca39457ed2cf135016ba277c9c06 php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5 php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm c488f0dba64ba85b4b9888f0ecef07cac2a26a600dee305c50c4eccbd22f018f php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7 php-pgsql-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm b4a70ab74593d4a4e8bbcd147d6a9ef37f2ee73ea3d3fc2026cbb723a8410665 php-process-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f090d8f796e208d1da100151ad96fa24e609eca2a9b1ac728000d735ed5ae30f php-recode-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 7a9b599d8d3a1ed64ebb713be92c2f5648b73b29332460fefbe8a2f2fc76a24a php-snmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 3a288b202b968f5b0685f88e3794865db8a26fe7b94e7a8baf45420a4cede09a php-soap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 510d2dc16daea3a229e16d5ebfdcf5e3a5f9c52a722768e98d754e1be4392a8f php-xml-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 3f13bd0a62eee03261a23f6bcebe607dc20331acae2b7d5623c2cba3ba22b046 php-xmlrpc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm e1b10e75e43aea2c9b6c6bdeda8087c6b7921c25e0e96d17e2dfdfbbd2a38564 RLSA-2020:3732 Important: mysql:8.0 security update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.21). Security Fix(es): * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725) * mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619) * mysql: Server: Connection unspecified vulnerability (CVE-2019-3009) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632) * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620) * mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574) * mysql: Server: Logging unspecified vulnerability (CVE-2020-2770) * mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804) * mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921) * mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553) * mysql: Server: UDF unspecified vulnerability (CVE-2020-14576) * mysql: Server: JSON unspecified vulnerability (CVE-2020-14624) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651) * mysql: Server: Locking unspecified vulnerability (CVE-2020-14656) * mysql: Information Schema unspecified vulnerability (CVE-2019-2911) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.21). Security Fix(es): * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725) * mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619) * mysql: Server: Connection unspecified vulnerability (CVE-2019-3009) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632) * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620) * mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574) * mysql: Server: Logging unspecified vulnerability (CVE-2020-2770) * mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804) * mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921) * mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553) * mysql: Server: UDF unspecified vulnerability (CVE-2020-14576) * mysql: Server: JSON unspecified vulnerability (CVE-2020-14624) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651) * mysql: Server: Locking unspecified vulnerability (CVE-2020-14656) * mysql: Information Schema unspecified vulnerability (CVE-2019-2911) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mysql mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f RLSA-2020:4059 Important: virt:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2020:4435 abrt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-abrt, abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-abrt-1.2.6-6.el8.x86_64.rpm f6d3d376330002979b7be8c06e394a42b5848cf49e856c0a27c04f9dc30883bc libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpm 5e37019a5283ba0e43d7575bb7b92b89500f793ad5c4dbfcfaeb1872a7fc3030 libreport-anaconda-2.9.5-15.el8.rocky.6.3.x86_64.rpm 6194f8ba650bc7585a3e99cd6e7f827286456e62a6bf98ed46c46c35f9d08c77 libreport-cli-2.9.5-15.el8.rocky.6.3.x86_64.rpm 2fcf64301eaafa7fcf3a3c72cfb96f05615b56cfcea521a83561222b72e9db0e libreport-gtk-2.9.5-15.el8.rocky.6.3.x86_64.rpm 695990373066594c0627a7a762537e5de49d7be1926d8be0a55b461bb20140d3 libreport-newt-2.9.5-15.el8.rocky.6.3.x86_64.rpm 0e3e56dc4087d864dc4d67b86cd2b3bfb8b8b4d6673987717d463e1bb87d26e5 libreport-plugin-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm 227c155b52ec31ca24fa66639452937725607195a4253414a2a46b8a3edf7dd5 libreport-plugin-kerneloops-2.9.5-15.el8.rocky.6.3.x86_64.rpm 3e1fa31840233fa95fb27c9c057cb8f2946d81f8f5c9f332f0fc7e5e09fa1bd9 libreport-plugin-logger-2.9.5-15.el8.rocky.6.3.x86_64.rpm e6e49176296cc70d772e69e7b17ecf38a8be6d05a03ad52334b2c719701fb9a7 libreport-plugin-mailx-2.9.5-15.el8.rocky.6.3.x86_64.rpm 95ff8fc918313b921b34162c844e297774e9ef5e5ece711a4eff8ddd8426b608 libreport-plugin-reportuploader-2.9.5-15.el8.rocky.6.3.x86_64.rpm fb9fa978de3e7d265f6c48ffcec76e28d5c736870f398c83580e5660d44e3711 libreport-plugin-rhtsupport-2.9.5-15.el8.rocky.6.3.x86_64.rpm e05b4bb22fd320eeb356dca5d8c43a3ae011354f0f0e013bb534bbdae18dc170 libreport-plugin-ureport-2.9.5-15.el8.rocky.6.3.x86_64.rpm 28a9a4fe6ac7b2b65c8445bdf30c67d674c6af4fc9f7944492a4136cc8c38d02 libreport-rhel-2.9.5-15.el8.rocky.6.3.x86_64.rpm 76e60d9d32ef100959f7171a0e86253d7842d6c9fb2fea7e27535643aff7950f libreport-rhel-anaconda-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm 69e5e743a1180cc8a7002d3a8f68cc27e071dc87ed0d18e9ec954c340d43d750 libreport-rhel-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm c1de7ebf0c873e1247232573b8d8bb7c07e87fbab03e753c3af3826eab008e26 libreport-web-2.9.5-15.el8.rocky.6.3.x86_64.rpm e6aa4595fb879aa45e101f8626e3bd4e43d2513948b23b113e7df6e4ade703ab python3-libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpm 7567494607c825ed5eb4d4c02cda246483d90b5bde0f950cedd06d5d12ac5ceb RLBA-2020:4621 iperf3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iperf3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms iperf3-3.5-6.el8.x86_64.rpm b2bdb78d601c91f9a01bf9f229f02f0079bd92ca8bc37f615d720aba79fecb69 RLSA-2020:4628 Low: libreoffice security, bug fix, and enhancement update LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1). (BZ#1796893) Security Fix(es): * libreoffice: 'stealth mode' remote resource restrictions bypass (CVE-2020-12802) * libreoffice: forms allowed to be submitted to any URI could result in local file overwrite (CVE-2020-12803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libcmis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1). (BZ#1796893) Security Fix(es): * libreoffice: 'stealth mode' remote resource restrictions bypass (CVE-2020-12802) * libreoffice: forms allowed to be submitted to any URI could result in local file overwrite (CVE-2020-12803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libcmis-0.5.2-1.el8.x86_64.rpm 85fe680a824f5ec1a3e0dbeb6cd41abd45d672d462dc0fb1dd327095588a7307 RLSA-2020:4629 Moderate: libvpx security update The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libvpx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvpx-1.7.0-8.el8.x86_64.rpm e78ccbde28d9eeb97e5cb37df37ef5a5e55b3de69bf2f6f260570076a2caee1c RLBA-2020:4630 wget bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wget. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms wget-1.19.5-10.el8.x86_64.rpm cb1dbb79240c60648916fed72bc3368e5394de1013b4135b54a812a40a279cff RLBA-2020:4631 gom bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gom-0.4-1.el8.x86_64.rpm bb7d6fd74621945051cdfc8a40a93c74bb5a6ef9cf399977b82e20d786c92092 RLBA-2020:4633 swig:3.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for swig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__swig swig-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm 3a8d046a51dbf4a121fe67a46df74cd599c6f46a150a2eb1aa48c6c4ade3cd45 swig-gdb-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm e9b828ca9e799c3c02d911fbfb4f430621de393e4361a45ef8bf734889057a10 RLBA-2020:4640 radvd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for radvd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms radvd-2.17-15.el8.x86_64.rpm 7ab537f957b4dd6b3fac3462f1b10cf5905591851c87f4190d6709b982de3152 RLSA-2020:4641 Moderate: python38:3.8 security, bug fix, and enhancement update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416) Security Fix(es): * PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477) * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747) * python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492) * python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-psycopg2, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416) Security Fix(es): * PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477) * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747) * python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492) * python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 RLSA-2020:4647 Moderate: freerdp and vinagre security, bug fix, and enhancement update FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop. The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287) Security Fix(es): * freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) * freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) * freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) * freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) * freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) * freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) * freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) * freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) * freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) * freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) * freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) * freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) * freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) * freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) * freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) * freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) * freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) * freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) * freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) * freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) * freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) * freerdp: out-of-bounds read in irp functions (CVE-2020-11089) * freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) * freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) * freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vinagre. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop. The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287) Security Fix(es): * freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) * freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) * freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) * freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) * freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) * freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) * freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) * freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) * freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) * freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) * freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) * freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) * freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) * freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) * freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) * freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) * freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) * freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) * freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) * freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) * freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) * freerdp: out-of-bounds read in irp functions (CVE-2020-11089) * freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) * freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) * freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms vinagre-3.22.0-23.el8.x86_64.rpm b5c618c63d3360974aa20444687651e51c96bd2a84d47844ddc851391fd02d04 RLSA-2020:4649 Low: evolution security and bug fix update Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. OpenChange provides libraries to access Microsoft Exchange servers using native protocols. Security Fix(es): * evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for bogofilter, evolution-mapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. OpenChange provides libraries to access Microsoft Exchange servers using native protocols. Security Fix(es): * evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bogofilter-1.2.5-2.el8.x86_64.rpm 055fb5f5338f3747eb7f7826bf0508cddc02cc4f1f7a1c81b3b37e7f3696219d RLSA-2020:4654 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 RLBA-2020:4658 munge bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for munge. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms munge-0.5.13-2.el8.x86_64.rpm 0dd4fe5f637073ab3044226acb9c3a3a8b3d181bc94eb52e3def2535150d7966 munge-libs-0.5.13-2.el8.x86_64.rpm 26722a8ec5e88792ed5728241095a00692fdc93dc6f3165c048aae0983229c28 RLSA-2020:4659 Moderate: gd security update GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats. Security Fix(es): * gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977) * gd: NULL pointer dereference in gdImageClone (CVE-2018-14553) * gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats. Security Fix(es): * gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977) * gd: NULL pointer dereference in gdImageClone (CVE-2018-14553) * gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gd-2.2.5-7.el8.x86_64.rpm ace2c28939c77d3e0ed768fbcef2ad8414a6892b3eae03712ec12a92825fc45d gd-devel-2.2.5-7.el8.x86_64.rpm 1839caff25d169b3fc2b29782ecc02e90fe225938deec1b81e8cc3c7a792b1a7 RLEA-2020:4664 memcached bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memcached. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms memcached-1.5.22-2.el8.x86_64.rpm 80ba002a662fb3b041467abdc1520436e0dbbbcf42b160e81b1d5e24a5a82234 RLBA-2020:4665 lftp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lftp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lftp-4.8.4-2.el8.x86_64.rpm b777ff195179177c9703548dc35156c63f4c56509362bf834d551f3107ce3210 RLSA-2020:4676 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296) Security Fix(es): * libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339) * QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) * libvirt: Potential denial of service via active pool without target path (CVE-2020-10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296) Security Fix(es): * libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339) * QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) * libvirt: Potential denial of service via active pool without target path (CVE-2020-10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2020:4678 tog-pegasus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tog-pegasus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tog-pegasus-2.14.1-46.el8.x86_64.rpm 1bed42c08cc37ebc5e1d7c20ef135fa1904ab9939c5101324054e3147eb52c97 tog-pegasus-libs-2.14.1-46.el8.x86_64.rpm 0a14c7352b8954b767c4d33bbba870054489d9bc87317678e48f93d8bdd9c52e RLBA-2020:4679 pptp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pptp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pptp-1.10.0-4.el8.x86_64.rpm 403c469de3bd6f49b2b1f9c82fe72aa3f6dc887ab32184832f1e9db30ac7c25d RLBA-2020:4681 ncompress bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ncompress. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ncompress-4.2.4.4-13.el8.x86_64.rpm 2e7cd19238f419b4b9315b96484d11c41393d2cfd6a22c67b52516e5f4a979e5 RLSA-2020:4694 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-podman-api, libslirp, toolbox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f RLEA-2020:4700 createrepo_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for drpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms drpm-0.4.1-3.el8.x86_64.rpm 6dc369a31dfb6ca6aaf6b615aec3d52792d2411c276f8e392da041ab705fae87 RLBA-2020:4704 python36:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python36 python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d RLSA-2020:4709 Moderate: librsvg2 security update The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library. Security Fix(es): * librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for librsvg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library. Security Fix(es): * librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms librsvg2-2.42.7-4.el8.x86_64.rpm be783a46ee945a6822831dc658d7e8bc6bc89ef84dea1ae6b39ef767efeb5147 librsvg2-devel-2.42.7-4.el8.x86_64.rpm 124de649dc6bfedfbbdddea386e9c78653e0d147b2115ac2c0ec02b36a8028b1 librsvg2-tools-2.42.7-4.el8.x86_64.rpm eb0d175b2e1bb18dd7d8f9b0523238a68623abf4e05e4e022a63ee6442279d03 RLEA-2020:4711 HdrHistogram_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for HdrHistogram_c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms HdrHistogram_c-0.9.13-2.el8.x86_64.rpm 55353693dcaf1b676fec269cda6ad65641c27dafd2fda21228a820a45b00d14f RLSA-2020:4712 Moderate: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a RLSA-2020:4847 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * pki: Dogtag's python client does not validate certificates (CVE-2020-15720) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * pki: Dogtag's python client does not validate certificates (CVE-2020-15720) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 RLBA-2020:4715 chan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chan. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms chan-0.0.4-3.el8.x86_64.rpm effca9ba587bd1ece96428cc01c299d9d8212f97b71592babf23e1400de6e4ba RLBA-2020:4717 new module: php:7.4 This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLEA-2020:4724 perl-IO-Socket-SSL:2.066 and perl-libwww-perl:6.34 update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-Net-HTTP, perl-HTTP-Message, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-WWW-RobotRules, perl-HTTP-Date, perl-LWP-Protocol-https, perl-Net-SSLeay, perl-TimeDate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b RLBA-2020:4726 libmaxminddb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmaxminddb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libmaxminddb-1.2.0-10.el8.x86_64.rpm aeba7e5152314138adb423a1f7d1d58fcbc5dfd9214b3de2f6b35e42da4b9ca5 libmaxminddb-devel-1.2.0-10.el8.x86_64.rpm 5392fc9570da9dc7d4deefff17b11964da9b68d900e35b4321d9cf4638430b0d RLBA-2020:4738 fio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fio-3.19-3.el8.x86_64.rpm 9e3022392a68cb36d9b816ec9591b91a46bfd5229329c124284ccd8db026be0c RLEA-2020:4742 userspace graphics, xorg-x11, and mesa bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libXft, xorg-x11-xkb-utils, xorg-x11-xtrans-devel, xorg-x11-drv-intel, libvdpau, libxkbfile, libXxf86dga, libXau, libXrandr, xorg-x11-proto-devel, xorg-x11-util-macros, libXext, libXi, libXdmcp, libXmu, libXvMC, mesa-demos, xorg-x11-drv-ati. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms glx-utils-8.4.0-5.20181118git1830dcb.el8.x86_64.rpm 751056a3ca9f371de399e28f0269347b8b83253401cace95a5420c30714fbdb2 intel-gpu-tools-2.99.917-39.20200205.el8.x86_64.rpm ca18f49420bd77871652059de37c4ce2712c7972136796a6c4af5bc4c9b5e9ad libvdpau-1.4-2.el8.x86_64.rpm f45b5cf54aeb481ff4cf52b101736810c7aebedcc227019cafb14b7414bd8cc8 libXau-1.0.9-3.el8.x86_64.rpm 028141ae18fb41c9ee406307953e600eba388282b0d581c7132db5ff22ace362 libXau-devel-1.0.9-3.el8.x86_64.rpm 7a17dc2ed5eff71b97ec5036d404b3b3f6c3ee26c4a42d9cbcd5e62d10ea9da2 libXdmcp-1.1.3-1.el8.x86_64.rpm 0b69d5c1e3ceba8903038d00820e13e7a4dd63ce095e9b3f45af7fff0893311e libXext-1.3.4-1.el8.x86_64.rpm d4b037882da8eb6c588eee822f3227e7caf6ed2e9352ed490f0cd3577ed78470 libXext-devel-1.3.4-1.el8.x86_64.rpm 65c371a1efdad5cf9280b6e62fef1ef155991daea3f026cd5adc0025aff6aef9 libXft-2.3.3-1.el8.x86_64.rpm 2d4a1d4c0c9e61c70936873f0563ed2ac6b468549c3163bf73f91134ff2e9860 libXft-devel-2.3.3-1.el8.x86_64.rpm 5f165daab1a56d5339f5ed6d588e28dc48af44b27470f4f1a4fb06dc1c93d2e5 libXi-1.7.10-1.el8.x86_64.rpm 50085caa63b1a131251449903e9918d847702e5a9b64ed33bd2b72b1ff657343 libXi-devel-1.7.10-1.el8.x86_64.rpm 895888acfd024093b564da21b808c20c3ab93bcee12d604afefbe229f35d396c libxkbfile-1.1.0-1.el8.x86_64.rpm 34a3b0f4f7966fac35d7f912ff9415d8d4ff858c35f27405e3a4e8f3e55a0dc7 libXmu-1.1.3-1.el8.x86_64.rpm d6a17b0d20b9d510cde5ea0bfbb3434a7f3878dbf710246fc063ff49a3facd9f libXmu-devel-1.1.3-1.el8.x86_64.rpm efe847621d6d3d5a6cea7c0ee04ae377e29a0db2235daca5348c893b989bfdc7 libXrandr-1.5.2-1.el8.x86_64.rpm 6e162f68d0459598f596ee0698a504c795d6c992a807dec0e718efdc8a1e225e libXrandr-devel-1.5.2-1.el8.x86_64.rpm e080677e1c0a510493557023b483268b62aaa1788ecf4549d9f0702c0243c27b libXvMC-1.0.12-1.el8.x86_64.rpm a90a28f61c0b3b2b4d7f0ccde4a5910b40c0af50d97e32db8251ef8f4fc4a005 libXxf86dga-1.1.5-1.el8.x86_64.rpm ccfbba780589fce2c706637c19d968f718e57025ca847ca988bd6e08866bb71b libXxf86dga-devel-1.1.5-1.el8.x86_64.rpm d9e6d5d4907a21410438713ba87cb8cac1b0845870e85cca30e9bcb625fbbf00 xorg-x11-drv-ati-19.1.0-1.el8.x86_64.rpm f2044a3ef87c2233a795acfd4e453a204067ac7859154bb8cefa15260d64ea3f xorg-x11-drv-intel-2.99.917-39.20200205.el8.x86_64.rpm a753e4380e920df6184f68718e509ab792225037b3e7d17140413873d5481772 xorg-x11-xkb-utils-7.7-28.el8.x86_64.rpm 317f517f2b2624d859fa1ebd0c77f75d2f6707eaa0da526f9e27e815aec27b57 RLSA-2020:4743 Moderate: squid:4 security, bug fix, and enhancement update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467) Security Fix(es): * squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520) * squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521) * squid: Improper input validation in URI processor (CVE-2019-12523) * squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524) * squid: Heap overflow issue in URN processing (CVE-2019-12526) * squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) * squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529) * squid: Denial of service in cachemgr.cgi (CVE-2019-12854) * squid: Buffer overflow in URI processor (CVE-2019-18676) * squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677) * squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678) * squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679) * squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860) * squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) * squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) * squid: DoS in TLS handshake (CVE-2020-14058) * squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) * squid: Improper input validation could result in a DoS (CVE-2020-24606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467) Security Fix(es): * squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520) * squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521) * squid: Improper input validation in URI processor (CVE-2019-12523) * squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524) * squid: Heap overflow issue in URN processing (CVE-2019-12526) * squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) * squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529) * squid: Denial of service in cachemgr.cgi (CVE-2019-12854) * squid: Buffer overflow in URI processor (CVE-2019-18676) * squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677) * squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678) * squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679) * squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860) * squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) * squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) * squid: DoS in TLS handshake (CVE-2020-14058) * squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) * squid: Improper input validation could result in a DoS (CVE-2020-24606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2020:4751 Moderate: httpd:2.4 security, bug fix, and enhancement update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236) Security Fix(es): * httpd: memory corruption on early pushes (CVE-2019-10081) * httpd: read-after-free in h2 connection shutdown (CVE-2019-10082) * httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097) * httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) * httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196) * httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197) * httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092) * httpd: mod_rewrite potential open redirect (CVE-2019-10098) * httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236) Security Fix(es): * httpd: memory corruption on early pushes (CVE-2019-10081) * httpd: read-after-free in h2 connection shutdown (CVE-2019-10082) * httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097) * httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) * httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196) * httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197) * httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092) * httpd: mod_rewrite potential open redirect (CVE-2019-10098) * httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLBA-2020:4752 new packages: gcc-toolset-10-dwz GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-dwz-0.12-1.1.el8.x86_64.rpm a3fc3c8e50ede83b9dd42e816b7e3cb7c4b1bea76a7c27e6b9baa86b7de9aef4 RLBA-2020:4758 libosinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvirt-glib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvirt-gconfig-3.0.0-1.el8.x86_64.rpm d212dd8e8560f75d901e1e05a8b60dc221083d7c7ae4c6d38f690e611fe15dac libvirt-glib-3.0.0-1.el8.x86_64.rpm edbb5ddfe8604df94839c05863fbfec930c76b91cd04651d7841292f1c7be852 libvirt-gobject-3.0.0-1.el8.x86_64.rpm 54ce79c975115c186f7da62e5788ce09fff868e6e1e2de308071f9ee85c029c8 RLEA-2020:4759 new module: ruby:2.7 This enhancement update adds the ruby:2.7 module to Rocky Linux 8. (BZ#1817135) For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the ruby:2.7 module to Rocky Linux 8. (BZ#1817135) For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 RLBA-2020:4770 container-tools:2.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLBA-2020:4771 container-tools:1.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996 containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051 RLBA-2020:4773 libgit2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgit2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgit2-0.26.8-2.el8.x86_64.rpm 2fd89961bb66c0f0356457bb232d3aefdb8262b5280b3c0ed3fd6270e690b9c5 RLBA-2020:4776 new packages: gcc-toolset-10-make GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-make-4.2.1-1.el8.x86_64.rpm 108af38877fcfbe0a978849c72e88cb7dbb60680a1cd2936807fb34fec10d4ba gcc-toolset-10-make-devel-4.2.1-1.el8.x86_64.rpm 9e4b9b3d7878c6d9b9695660b55998da5d9c1719f04cff1a9e2c9c35e47d478d RLBA-2020:4777 new packages: gcc-toolset-10-ltrace GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-ltrace-0.7.91-1.el8.x86_64.rpm 671eb647a6e888e8832655ae9a3ffd566c15053bc6fba88ae9ff4b7b42ba9eb0 RLBA-2020:4779 ibus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus, ibus-hangul. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ibus-hangul-1.5.1-6.el8.x86_64.rpm 4917a3b7d03f8d640150d01cf98454973f9acaaf01d809c3dcf1e965ec7ed59b RLBA-2020:4792 omping bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for omping. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms omping-0.0.4-18.el8.x86_64.rpm 7c52cea22fe1414818800cf2e4b030ee2b22daac0d2cce173f57aff3f29893cf RLEA-2020:4803 perl:5.30 metadata for the Rocky Linux 8 module matrix (3/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 RLBA-2020:4824 ruby:2.5 bug fix update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 RLSA-2020:4827 Moderate: oniguruma security update Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix(es): * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for oniguruma. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix(es): * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms oniguruma-6.8.2-2.el8.x86_64.rpm b0e45f265d039cb2f8e12fd3c85ed1f95eaa44f37978c4a3faf169020907d6e7 RLBA-2020:4832 torque bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for torque. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms torque-libs-4.2.10-25.el8.x86_64.rpm d8ea26158c65c5e8a729e117ee07c15cbbf864caa1f267f2dbe7bb830f3914a9 RLBA-2020:4834 new packages: gcc-toolset-10-systemtap GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-9-gcc-9.2.1-2.3.el8.x86_64.rpm 9773ebdd8bc8be47124faad82a588ac87521b1ccba5968aee2cadd7f446a7f87 gcc-toolset-9-gcc-c++-9.2.1-2.3.el8.x86_64.rpm ea925505982b6aef4b57ce7221b18c7c0af4d6cbf79703dbe7f1d78bc68c1897 gcc-toolset-9-gcc-gdb-plugin-9.2.1-2.3.el8.x86_64.rpm 9fdeac6aa41b7aa1d96d66458c0635f416fb181b4913cb987ff94e15f78455b5 gcc-toolset-9-gcc-gfortran-9.2.1-2.3.el8.x86_64.rpm fbb05fc9585b6e6a98572c78955654f77c0fbc1bf70c644379ded2908f63b3ab gcc-toolset-9-libasan-devel-9.2.1-2.3.el8.x86_64.rpm b3a980f8f8533d2c850c6ea94e64fcfb0ea95478ab043b1847309916e306efe3 gcc-toolset-9-libatomic-devel-9.2.1-2.3.el8.x86_64.rpm a44828c99683dee995ff1dcf9e76dfb18c621e9a37e412eebaef846732a610bd gcc-toolset-9-libitm-devel-9.2.1-2.3.el8.x86_64.rpm 38f6ffa33a061227cdc266ab1c6e31c4e81465cabe7c167ac1b69ec641d443d2 gcc-toolset-9-liblsan-devel-9.2.1-2.3.el8.x86_64.rpm 5a93eec6b35977c58c875613b92ed09b42bc27cb2eb4904ea10940d44d62c2a5 gcc-toolset-9-libquadmath-devel-9.2.1-2.3.el8.x86_64.rpm bd26ee22d060d9ee6192c90c62f30dbc3da18d7fc0bf97867b0bdda1073eaa3c gcc-toolset-9-libstdc++-devel-9.2.1-2.3.el8.x86_64.rpm 570fbb1b45eab5c8de6c14aeeff538333e7371d623995835b217f9610f34d7c8 gcc-toolset-9-libstdc++-docs-9.2.1-2.3.el8.x86_64.rpm 1d38b3f8d8083cf36b97b69d488f9ac7ce837515bb65131f765f41e6eec0467d gcc-toolset-9-libtsan-devel-9.2.1-2.3.el8.x86_64.rpm 37ce964fb081c4109ae2dbc90a7965e1c56184fb7fdfec030c1ceae70f19515e gcc-toolset-9-libubsan-devel-9.2.1-2.3.el8.x86_64.rpm 2a65df9b0cbd1661ed2deed9c0b23fe54fba4830823ffde1f5458fad3f95dcab RLBA-2020:4859 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443) rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLBA-2020:5097 eclipse:rhel8 bug fix update Eclipse is an integrated development environment (IDE). The metadata for the eclipse:Rocky Linux8 module has been updated to remove the following unused profiles: c everything To check whether you have the obsolete profiles installed, run: # yum module list eclipse The installed profiles have the [i] indicator next to their names. To ensure the eclipse:Rocky Linux8 module contains the correct metadata, remove the unused profiles and reinstall the module with the java profile: # yum module remove -y eclipse # yum module reset -y eclipse # yum clean all # yum module -y install eclipse:Rocky Linux8/java To install the eclipse:Rocky Linux8 module from scratch, use the java profile: # yum module -y install eclipse:Rocky Linux8/java Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for eclipse-emf, eclipse-ecf, apache-commons-compress, hamcrest, opentest4j, xz-java, google-gson, glassfish-el, icu4j, xmlgraphics-commons, jsch, felix-scr, apiguardian, junit, glassfish-jsp, lucene, jetty, junit5, apache-commons-jxpath, eclipse, univocity-parsers, xml-commons-apis, felix-gogo-command, sat4j, batik, felix-gogo-shell, glassfish-annotation-api, jzlib, glassfish-jsp-api, objectweb-asm, felix-gogo-runtime, glassfish-servlet-api. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Eclipse is an integrated development environment (IDE). The metadata for the eclipse:Rocky Linux8 module has been updated to remove the following unused profiles: c everything To check whether you have the obsolete profiles installed, run: # yum module list eclipse The installed profiles have the [i] indicator next to their names. To ensure the eclipse:Rocky Linux8 module contains the correct metadata, remove the unused profiles and reinstall the module with the java profile: # yum module remove -y eclipse # yum module reset -y eclipse # yum clean all # yum module -y install eclipse:Rocky Linux8/java To install the eclipse:Rocky Linux8 module from scratch, use the java profile: # yum module -y install eclipse:Rocky Linux8/java rocky-linux-8-x86-64-appstream-rpms__eclipse eclipse-equinox-osgi-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm d2fc4ee364038cff7ca2fd9d5ee324b3c2917c8fe19f9cc2c8567cd2f22d68d0 eclipse-pde-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm e10fa2a6f9fa5bd832b102474a5e56e30a3f43d529b0c610afb1d4b7bb272091 eclipse-platform-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm bc48bd19edd1e7cb1f3ec77432a3488c3d0fc897a67b72901bbc18ededf5238e eclipse-swt-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm 31b6d7f61a6397a5649ab93a070546075d19c7184e8349b5d3925158645bcf0e RLSA-2020:5393 Important: libexif security update The libexif packages provide a library for extracting extra information from image files. Security Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libexif. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libexif packages provide a library for extracting extra information from image files. Security Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libexif-0.6.22-5.el8_3.x86_64.rpm e54c3df642c1d98430f783e10d314adeddf2ebab3fdf4a2da274af4a91f9980f RLBA-2020:5494 virt:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2020:5496 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898204) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-podman-api, libslirp, toolbox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898204) rocky-linux-8-x86-64-appstream-rpms__container-tools libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f RLBA-2020:5497 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898251) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898251) rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLBA-2020:5498 container-tools:1.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996 containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051 RLSA-2020:5500 Important: mariadb:10.3 security, bug fix, and enhancement update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086) Security Fix(es): * mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180) * mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938) * mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760) * mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) * mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765) * mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789) * mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009) * Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017) * Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021) * There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086) Security Fix(es): * mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180) * mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938) * mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760) * mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) * mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765) * mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789) * mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009) * Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017) * Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021) * There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077) rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLSA-2020:5503 Moderate: mariadb-connector-c security, bug fix, and enhancement update The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases. The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993) Security Fix(es): * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Code utilizing plugins can't be compiled properly (BZ#1899001) * Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005) * Replace hard-coded /usr with %{_prefix} (BZ#1899099) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mariadb-connector-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases. The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993) Security Fix(es): * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Code utilizing plugins can't be compiled properly (BZ#1899001) * Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005) * Replace hard-coded /usr with %{_prefix} (BZ#1899099) rocky-linux-8-x86-64-appstream-rpms mariadb-connector-c-3.1.11-2.el8_3.x86_64.rpm 7e41a8173ee09b353a8e2052e6802488223928a6d840b765406606930b400d3a mariadb-connector-c-devel-3.1.11-2.el8_3.x86_64.rpm 9a0ce0a6e724517550bd10188dc247491765bd5ecb774d0b160185951ea4186d RLSA-2020:5620 Important: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.5). Security Fix(es): * postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) * postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) * postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349) * postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350) * postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696) * postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.5). Security Fix(es): * postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) * postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) * postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349) * postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350) * postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696) * postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:0507 Important: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a RLSA-2021:0531 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for udica, toolbox, python-podman-api, libslirp, oci-seccomp-bpf-hook, slirp4netns, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLBA-2021:0542 virt:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * qemu-ga aborts after guest-shutdown command (BZ#1900578) * Report logical_name for disks without mounted file-system (BZ#1913818) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * qemu-ga aborts after guest-shutdown command (BZ#1900578) * Report logical_name for disks without mounted file-system (BZ#1913818) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2021:0546 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec is fragile in the presence of signals (BZ#1913294) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec is fragile in the presence of signals (BZ#1913294) rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLSA-2021:0611 Important: xterm security update The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. Security Fix(es): * xterm: crash when processing combining characters (CVE-2021-27135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for xterm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. Security Fix(es): * xterm: crash when processing combining characters (CVE-2021-27135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms xterm-331-1.el8_3.2.x86_64.rpm 8629d4e72f706d5517709ad3bda5acb21001ae8d719e4d50edd8e45677061939 xterm-resize-331-1.el8_3.2.x86_64.rpm 15a174cdbba3b93c9dc25350b13385951de4f8bfd22f0732527728a6489d1ab0 RLSA-2021:0705 Important: container-tools:1.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, podman, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996 containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm 6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm 2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846 crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm 2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4 oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm 25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0 oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5 podman-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.x86_64.rpm c2d84d68508ad6a5f13e002fde9bec2a1b8c4b11d90b1ba7a17f20ddaabba31f python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051 RLSA-2021:0706 Important: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLSA-2021:0711 Important: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2021:0735 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.24.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.24.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm 870dbeeaa5f7b37574e9275de98cdf81fe4768b2e22737876605f8fce22d1d4c nodejs-devel-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm c3f560c1c3539be8785136e74c3969d7292b4c337141423871baebd523d85d05 nodejs-full-i18n-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm 536c12bcc471e7a975674aa3218f437ff0a4809a85c370211d73636e743586a2 npm-6.14.11-1.10.24.0.1.module+el8.3.0+101+f84c7154.x86_64.rpm 485c30db6030bf7e9220026a983a18c9fc0f551ef4428a43a06bf7e12f40f28b RLSA-2021:1064 Moderate: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2021:1242 Important: mariadb:10.3 and mariadb-devel:10.3 security update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32). Security Fix(es): * mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for Judy, asio, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32). Security Fix(es): * mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLSA-2021:1744 Moderate: sane-backends security update Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers). Security Fix(es): * sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sane-backends. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers). Security Fix(es): * sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sane-backends-1.0.27-22.el8.x86_64.rpm 5e51281735365b78c5cbb2bbe580ee627ef9a0ae9ed491a174ac15ed7e1da50d sane-backends-daemon-1.0.27-22.el8.x86_64.rpm ceaf43c39768dac95eb46f0c8166d80385b70b64c8f6900324817b15a7aa0490 sane-backends-devel-1.0.27-22.el8.x86_64.rpm a1898f7f84202652fda3328dd7abd4d6911caf62e4ec05b986b7efaa5aa59d7c sane-backends-drivers-cameras-1.0.27-22.el8.x86_64.rpm 045035fcd28fbb83cdb665d99a12c262bcf93a7e87a5ab5d99e3bcc0f1bcf762 sane-backends-drivers-scanners-1.0.27-22.el8.x86_64.rpm ec81145a169e319c4f5c82274b1ea767ccb99c973dbcd485411b6440d7778381 sane-backends-libs-1.0.27-22.el8.x86_64.rpm c2b80bcdde2d92bd159c033a77ce66cc8d9f95806e9de209b0385687015152f0 RLBA-2021:1750 gcc-toolset-10 bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-10.1-0.el8.x86_64.rpm b41ee01dd7669723b7e624b20313163c16c5633aa7d28697fb3fa72db8b71591 gcc-toolset-10-build-10.1-0.el8.x86_64.rpm 75a25a624fe30073ba1da3f72beb62f9551eb7c38445413b12b60a277b5b5d4b gcc-toolset-10-perftools-10.1-0.el8.x86_64.rpm 4c6d56bfe9f684c0ce47de8a93043c9ec80f2a9b7d744437cb2b2483200e4d53 gcc-toolset-10-runtime-10.1-0.el8.x86_64.rpm 1c11a36181256ffb06b52d4113d396f293cfeae3868e24ea1de0aa32c0f4956d gcc-toolset-10-toolchain-10.1-0.el8.x86_64.rpm 3e9e18f10a85bdd93f24a817f8542eb818dd91aeb8123100575fa003acf19600 RLEA-2021:1755 new module: swig:4.0 The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces. This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for swig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces. This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__swig swig-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm 981d26677e3dda23830d9a31a22c7539f8ebf6475f390baa98cd3bac058bd1cb swig-gdb-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm 7a5380ac73c17d68a5dc97bb6f0994cc912e393577365c784590b0755da0fa9a RLBA-2021:1760 libmpc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libmpc-1.1.0-9.1.el8.x86_64.rpm 4fbf751702394211896af9f253ad2f38c80f603e007a7c9ed2b9c8e5d97f2f95 libmpc-devel-1.1.0-9.1.el8.x86_64.rpm 256386b3cbf600bf2f9652c6ad57f47d5a7eac2125f6839b8348782389e2166f RLSA-2021:1761 Moderate: python27:2.7 security and bug fix update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm 6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9 python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 RLSA-2021:1762 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637) * QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) * QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707) * QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916) * QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637) * QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) * QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707) * QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916) * QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2021:1765 brltty bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for brltty. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms brlapi-0.6.7-32.el8.x86_64.rpm e12574dee65b73eb727b9e01f250aa5dda6f37ae78942daf3a7b3093f577bc17 brltty-5.6-32.el8.x86_64.rpm 7a8d74532ca43c68bec2e24920147afd39fbf8f1cb4af2439607de08467a9d96 brlapi-java-0.6.7-32.el8.x86_64.rpm b6eb6ab93760a709036f0da60c7c2da0b04a2ebc688437f611675024f5e4d852 brltty-at-spi2-5.6-32.el8.x86_64.rpm 7fad2f8c334c754975b00ac6481305ca9cf9a1a80ebe8e12e7a2e32f920fa9be brltty-dracut-5.6-32.el8.x86_64.rpm d18672cc32943d29dce0be6c093f255aab4ba4b612dba80c8e7256d32cf0b7ee brltty-espeak-ng-5.6-32.el8.x86_64.rpm f8ef16ebeb5f499bb8ba362db96463d6fbc232a14188c3efae23ea6feaae2d78 brltty-xw-5.6-32.el8.x86_64.rpm 57b0c4f00d1a4a54b33808f910b57a29a3d00a6fd935e687a5830cd1249f5ba6 python3-brlapi-0.6.7-32.el8.x86_64.rpm 1f5637a51db2115ff4beaae2634252f34f975843dca3a4d92bf4b820694bb945 tcl-brlapi-0.6.7-32.el8.x86_64.rpm 25f5045a9611b5dadf55e0a53cdda928a83646f164b2959a691e3fcd5b7601e9 RLSA-2021:1775 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 RLEA-2021:1779 libreoffice bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liborcus, libnumbertext. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libnumbertext-1.0.6-2.el8.x86_64.rpm a297230b7871a750b88dd9575330532e0fc2838a6fd8e7d8029ba41b3fc6e939 liborcus-0.15.4-2.el8.x86_64.rpm 27d2c59c48323cd4c572039cef4f9b81e05942efccc961cd33181196a2d3125b RLSA-2021:1789 Moderate: gssdp and gupnp security update GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP. The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928) Security Fix(es): * hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gssdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP. The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928) Security Fix(es): * hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gssdp-1.0.5-1.el8.x86_64.rpm 1140c0c9c62164c69a64b232db2eaca5c7dd1108b68dff7132b272a03c5fc8e1 RLBA-2021:1790 ibus-libpinyin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-libpinyin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ibus-libpinyin-1.10.0-2.el8.x86_64.rpm e8de7254d89399e087915d093fef05c3d7cf5c65687022d163dca69a85aeee28 RLSA-2021:1796 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652) * podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652) * podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLBA-2021:1799 telnet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for telnet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms telnet-0.17-76.el8.x86_64.rpm 4bf95fac7aa4068028dc381f349f63c0c3778dc88197f1dd53e01ac40a6bd400 telnet-server-0.17-76.el8.x86_64.rpm f32edb8ceee19d8ba7b45a00c385f9f77c4270bf44afbd8dd286299cee31d95c RLBA-2021:1801 libgpod bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgpod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgpod-0.8.3-24.el8.x86_64.rpm 4fe6a1855a14fce2d8c15ecfa8f5fbf3bfa75c0e36bb9d520e78153e6b0deb20 RLBA-2021:1802 gnome-bluetooth bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-bluetooth. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-bluetooth-3.34.3-1.el8.x86_64.rpm 4405d99a81e84ec9f506c2d02a2c79c505575f721d5c97f8bf604112c4fea8f6 gnome-bluetooth-libs-3.34.3-1.el8.x86_64.rpm b61617cb2c800149a772cf9143bb5d8f50961534802606e8513c654dea7ac39c RLSA-2021:1804 Moderate: userspace graphics, xorg-x11, and mesa security, bug fix, and enhancement update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips. The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655) Security Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) * xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) * xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) * xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) * xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362) * libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363) * xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) * libX11: Heap overflow in the X input method client (CVE-2020-14344) * xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libwacom, xorg-x11-drivers, libX11, mesa, libinput, libdrm, libglvnd, xorg-x11-server, egl-wayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips. The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655) Security Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) * xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) * xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) * xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) * xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362) * libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363) * xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) * libX11: Heap overflow in the X input method client (CVE-2020-14344) * xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xorg-x11-drivers-7.7-30.el8.x86_64.rpm 4feb07c0b7dba12f36983fcf2eddfce96c747e61b92cb8833a148ca1ac4fadea RLBA-2021:1807 gcc-toolset-10-dyninst bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-dyninst-10.2.1-2.el8.x86_64.rpm 3628ca20014ba600e2deef311adf1f3ecaf8b169ea290d3c1755ad6781b2cc37 gcc-toolset-10-dyninst-devel-10.2.1-2.el8.x86_64.rpm 36ec6e021428699304c0fb462d494018b6d8d7da984f0f9e667fb4c32301f224 RLSA-2021:1809 Moderate: httpd:2.4 security, bug fix, and enhancement update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199) * httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984) * httpd: mod_http2 concurrent pool usage (CVE-2020-11993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199) * httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984) * httpd: mod_http2 concurrent pool usage (CVE-2020-11993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2021:1811 Moderate: libvncserver security update LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Security Fix(es): * libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247) * libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839) * libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397) * libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405) * libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libvncserver. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Security Fix(es): * libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247) * libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839) * libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397) * libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405) * libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvncserver-0.9.11-17.el8.x86_64.rpm 38ec5ff34fff0a426bd377186afed28a8370441f300af098d5959601147d09e5 RLEA-2021:1813 new module: subversion:1.14 Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a RLBA-2021:1821 spice-gtk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-gtk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-glib-0.38-6.el8.x86_64.rpm 8814c47eecaee1eb462199f94515b93833c611c26882e152ee257b84561fda60 spice-glib-devel-0.38-6.el8.x86_64.rpm b2a4d27b80d27dd2f8ab8f6d3d7de0a8878a0a2bb570e31d5aa635e91fcdad9e spice-gtk-0.38-6.el8.x86_64.rpm 7285e6a3292af38d0e24d515af5ec6e1976068c7ff14d5af58ac5f7df6568595 spice-gtk3-0.38-6.el8.x86_64.rpm 315f85dd0f0494fb42a94a3e50c518cdbd386dd5908f4b48a38931ab7a3986de spice-gtk3-devel-0.38-6.el8.x86_64.rpm 498331b3d6a778df41e04336354773e88f2ba3290e41831b2bd61d8b9c41ded8 spice-gtk3-vala-0.38-6.el8.x86_64.rpm fd440611163373050491b18223548fab12a21cfee52f2f7faba5b3e7fb09064e spice-gtk-tools-0.38-6.el8.x86_64.rpm 373e38bdff58b36b689e94de258778b07d44f14f84782355d57ec8caa4613cbd RLBA-2021:1822 perl-Time-HiRes bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Time-HiRes. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms perl-Time-HiRes-1.9758-2.el8.x86_64.rpm fae5102e437c83981a9c6cc1d957462bd4010e059ccd92d0c1542e6560ef1950 RLEA-2021:1831 gcc-toolset-10-strace bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-strace-5.7-2.el8.x86_64.rpm 43d2c8d98a0bc67d2b039967dd91195256aeec6f5f648b9f7e04d9ad4257ad03 RLEA-2021:1833 mod_security bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_security. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_security-2.9.2-9.el8.x86_64.rpm 0c307e12c65d00832938f7676bf9fc204db744eb8e48f310c4e68081de76dbd3 mod_security-mlogc-2.9.2-9.el8.x86_64.rpm 128c0e3b588c755cef6a9d74bdd9c11825e59a97461e23b94433ddab38d58c45 RLEA-2021:1834 nginx:1.18 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e RLBA-2021:1837 liblangtag bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liblangtag. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms liblangtag-0.6.2-8.el8.x86_64.rpm b2f6701fa925b087b454fb00b152cc3adad415d88a9fea28b0c6c401ace72688 RLBA-2021:1838 libcanberra bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcanberra. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libcanberra-0.30-18.el8.x86_64.rpm 4250c90196fa1fd761ad985adfe702647b4a990829e33cd2bce7ad81007b4323 libcanberra-devel-0.30-18.el8.x86_64.rpm a9ba387d2876731c26bc4ff6b1f0588a29e01026140c4acccaacc68a425386aa libcanberra-gtk2-0.30-18.el8.x86_64.rpm 9ec58605dea28c7136b0236c5b5424e4cad7aa447a3cb68d4f5564888602f555 libcanberra-gtk3-0.30-18.el8.x86_64.rpm 58d60f6bc91fced10e23f0a37df0111e13e2ec2a652a1a279add5a6e3efa1d35 RLBA-2021:1839 gcc-toolset-10-systemtap bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-systemtap-4.4-5.el8.x86_64.rpm e54a70603f27c83eeee3ee144153296da6bc730668054187f5ebdaff9e0debdb gcc-toolset-10-systemtap-client-4.4-5.el8.x86_64.rpm e664a7166e068b4d3b709249791c6b20b15051277c3083910b1502a01a12cf58 gcc-toolset-10-systemtap-devel-4.4-5.el8.x86_64.rpm d124fe2423d1228e188491c9bd7056694ebd565b0e51d1a7d0834d802ab5165f gcc-toolset-10-systemtap-initscript-4.4-5.el8.x86_64.rpm 729435248b1ada8434729f638aad21d44a20d8a87be08562135321b98fa6ad89 gcc-toolset-10-systemtap-runtime-4.4-5.el8.x86_64.rpm 33863b7b3220086746258bafcbfbf167083e8b8c3ad5ef3fc1adc01dde3be385 gcc-toolset-10-systemtap-sdt-devel-4.4-5.el8.x86_64.rpm 7ef4e54e7fa1203cedfee393041404380e0265875b7741aea76f9774327d19d9 gcc-toolset-10-systemtap-server-4.4-5.el8.x86_64.rpm ca4d199fda08c1e62e16fa7241b51d80bb7dddffad0cb5dd804650c8320dfc88 RLSA-2021:1842 Moderate: raptor2 security and bug fix update Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples. Security Fix(es): * raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926) * raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for raptor2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples. Security Fix(es): * raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926) * raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms raptor2-2.0.15-16.el8.x86_64.rpm 1a7d901ba0d259189d3b83ebcfa33ee04cae242c19cb181b4bb78eecb0dccebe RLBA-2021:1845 sblim-sfcb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-sfcb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-sfcb-1.4.9-17.el8.x86_64.rpm bec650953f943da05bbb7c5a90fe7178c22bc66e6db00e29ceba86089732a1b3 RLSA-2021:1846 Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2021:1848 dconf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dconf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dconf-0.28.0-4.el8.x86_64.rpm 7b50268254a1a308f2ee2dc13783603d8da3a3e4d9723cca8d541007241c59d3 RLEA-2021:1850 jbig2dec bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jbig2dec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jbig2dec-libs-0.16-1.el8.x86_64.rpm b203ea84fb770705d42348816339f0b0ddb3c560f7a841dfe05bdfb5fd6640ee RLBA-2021:1858 sendmail bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sendmail. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sendmail-8.15.2-34.el8.x86_64.rpm 156730e9c4db72ebfaa54b95a87e07bffd94526da024db5dc2f961cfeac0754c sendmail-milter-8.15.2-34.el8.x86_64.rpm f02eef48d7b4802656658b8f9819d4a5d67ae1e70d46d05edd9ba2e3923588ab RLEA-2021:1861 pyodbc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pyodbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pyodbc-4.0.30-2.el8.x86_64.rpm db4d19f991a354d7c95135bd0ebdbf85b54294a154c87ba75dc929d799ae1227 RLBA-2021:1863 icedtea-web bug fix and enhancement update migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for icedtea-web. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java rocky-linux-8-x86-64-appstream-rpms icedtea-web-1.8.4-4.el8.x86_64.rpm feaac8dd236c1cb26df3883f0a87cda23e6adf12a883130ccb4bd258038f34ec RLEA-2021:1869 new module: postgresql:13 PostgreSQL is an advanced object-relational database management system (DBMS). This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLBA-2021:1871 perl:5.30 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl perl-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm be39133cd5aa9bfd0ce8ff6128a31858f7907ce317762fd852affb340341cfaa perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm 69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6 perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm ed229dccbc0b92ac2a641e672a1b62281cb7887ad180cf0eb7bf70a72d8190e8 perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 70b3d3861ab9c1695c9bd398d4bd822fed4f52f843ccb34d987b1c72fb6f6190 perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm 49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16 perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm 847b4fb0ddf80554f9db4f306d9b404f77ff15198af23e1afe2abf866e91117f perl-devel-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 585f8362cf74ed848f3445bed0952f343ac30d51ae393244d5eed738adcadc7e perl-Devel-Peek-1.28-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 067cf2dc67c1e9c5a402034ec3b340e886228a66c99ae15b785109c57ff94161 perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 1da6e17c67943d6d69e57ebd15f72bfa43b6015870fdd338c76b117b2be9f67f perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm 11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm 457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91 perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm 4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3 perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 7acf6021827fa52dc9a1fcebcb239d23d9096de93e0a6132f0fe4fd541f3f1f2 perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 4189d9a4acaa4add86f0991f50f74e444b59afb872b205e444480c428e247eaf perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 5e8ac50accc1d9281fedfb67c5f38066ac8d9e1237e1d7cc7fbef1e973fb89fb perl-Errno-1.30-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 6638a5f0666fb87c5a1b13ca99bd76fdcc01f29f8709d206655e62ea694afcd9 perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.x86_64.rpm c8ba40590e844230d1f154071d9e092cb479fa4993a8352a0d9c7b3ed9764e01 perl-interpreter-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 02d644ab73c948161e823d1c6944f52564dc8d06ecd73bba0b9957295350387d perl-IO-1.40-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 1b5f6a564f11bdb4ceeef49e03cc7b9e8ba622b99a3f74bbda31653a1bbdb1ec perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524 perl-libs-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 6a2d197b52df3e9e8d372ddb5735269efeda9c3915a22818b5877593cd957617 perl-macros-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm a00992fdb69978b36a93933ab608b73c31c23ad22477d71e2f6a6cd50f576ab6 perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217 perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3 perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm 658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 19c9476b75c247420525ff36ad321453c46d0262305cad01bfd0eea652a70093 perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpm b60d7dc5e566fbe0b9282e1f90b628d86d87f6e7c091290737cddea24d9bdc1b perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpm b7f894a292d6278b60fb5754d1ed5ad9d199c8f84d140f47dbeb260d6a3eaa35 perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm 693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359 perl-tests-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 3b5e10bdb757229457125f796ffa71dfbaf8635a4ad4cc218b91fce7a0ecfe3f perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 2e5b2999050f52a5be6078a7024fa2d8696471958b37582c6ae57f869b22b247 perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm e95a1149d05da0bdfc99db4a561b0ffee93dd2d670951b8bf9e9f0bcd867473c perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpm c32bff30e752a3efa107b8a0d0a6758e720770d895c642fbd8434f86f54ef46e perl-Time-Piece-1.33-452.module+el8.6.0+878+f93dfff7.x86_64.rpm 0983e9e7fb85c4ce71777a0205c985ed57df8a543f13cb4ed349f9fd8fdb62c1 perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 329b8a55fd6c40d52610e15f55037edc8395d682ed5ceca6611930c6ec0c80fb perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpm 641de0fcef19c0f7ab506f797d92584ac6c17d3f1335d5fa6fb0d515c8220612 perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm 96805b92a1012403138db9d46d761fcafc05517684b5ff73a5ccfbf75edb0d59 RLBA-2021:1878 squid:4 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2021:1879 Moderate: python38:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python38, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, python-ply, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 RLBA-2021:1880 mod_fcgid bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_fcgid. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_fcgid-2.3.9-17.el8.x86_64.rpm 96b06bcbf7c919d7860e97fdee65d347132301964163b676678f0edd3b06dd96 RLEA-2021:1889 libfprint bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fprintd, libfprint. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fprintd-1.90.9-2.el8.x86_64.rpm 6491c1b1a2cf6143b8fa443bef28504be7be0503f6e3c9dc8a55ca79065c2c5d fprintd-pam-1.90.9-2.el8.x86_64.rpm 1efdd9068c4be78be4a38ad0f81d2f7a7655b4275a3cc9b7bd63fdda1451ef21 libfprint-1.90.7-1.el8.x86_64.rpm 028164883c21054399e9240cfc0367a4ec61ff4b86801066ee110951b78afc06 RLBA-2021:1892 source-highlight bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for source-highlight. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms source-highlight-3.1.8-17.el8.x86_64.rpm 0e196806afe493edb18aa1a760819f175f69d698f5c748bab3f5c9dd9984e20b RLEA-2021:1893 new module: mariadb:10.5 MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLBA-2021:1895 libgovirt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgovirt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgovirt-0.3.7-4.el8.x86_64.rpm 545a6b1e83548cbcc04f46b3109ade9651b99c4c1cb7f0061c42e716d370aebc RLBA-2021:1899 gcc-toolset-10-gdb bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-gdb-9.2-4.el8.x86_64.rpm 72a19b8ae9245f67865cd410b7d5f357756735b86ea8b2287eeee52dd737b561 gcc-toolset-10-gdb-gdbserver-9.2-4.el8.x86_64.rpm c9cba6cf5dc0e84a17356ec5200c135b2d03ef5a5b68288b3de0fbc2e1a39087 RLEA-2021:1900 memkind bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memkind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms memkind-1.10.1-1.el8.x86_64.rpm 6e14104dcc6708e2351d57b77f26893e44c23e35b33cdf05078fe46c42524d9d RLBA-2021:1902 uuid bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for uuid. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms uuid-1.6.2-43.el8.x86_64.rpm f1e86f91c8e650975437970e0c91d0bf5c398eee60b6e0905400d65823ae17e8 RLBA-2021:1903 pulseaudio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pulseaudio, twolame. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms twolame-libs-0.3.13-12.el8.x86_64.rpm 029e7f5810df21c2da415b3c5a0a0732f5cdf2c185f82ae756706775913bd2c8 RLEA-2021:1906 libyang bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libyang. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libyang-1.0.184-1.el8.x86_64.rpm a18b82afa4780f61864a7cd2bd28a7bc870964039c91ee5a429fae5626178eae RLBA-2021:1911 container-tools:2.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLBA-2021:1912 ilmbase bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ilmbase. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ilmbase-2.2.0-13.el8.x86_64.rpm 4d46f7970d6415e15081a9f22f3d9afebc7467b373d8bbcd1d9704c236a3cc00 RLBA-2021:1913 SDL and gstreamer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for SDL, gstreamer1-plugins-base, gstreamer1-plugins-good. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gstreamer1-plugins-base-1.16.1-2.el8.x86_64.rpm 080de6123569b64faac1939ca663245bf7099e20974ca0c59ad7aa92ba870bae gstreamer1-plugins-base-devel-1.16.1-2.el8.x86_64.rpm fb49590c7cca49cf399a894fe5093e9e4077164cf97b706451498e6217814b31 SDL-1.2.15-39.el8.x86_64.rpm 9ed4e04c21f25fae0421f47c9334a5d58b123708004650b7817a3f5a6c8124c9 SDL-devel-1.2.15-39.el8.x86_64.rpm 39b8c51c2ad75b19a80ff692a5c73a3717f47748cd82caf03a0a4b3a74f37bbb RLBA-2021:1914 libsmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libsmi-0.4.8-23.el8.x86_64.rpm 48ede3425a13595c69ab1ec38b0ab3acb192b4da13173886b1b2b933f6c782bf RLBA-2021:1915 gpm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gpm-1.20.7-17.el8.x86_64.rpm 9576114888fa8c265da2bedc5de8789e3d5edc597d4ef6963354c72a46ef9839 gpm-devel-1.20.7-17.el8.x86_64.rpm da9cdd5ac686e1edbca85896c9507ef04eb92e9d9c57b43e6eec4541fb4de34d gpm-libs-1.20.7-17.el8.x86_64.rpm 9a1109ffb7ae23caa6a6776f2d5fe0b11b452a3779c9edc157c9dbaebd2a7987 RLBA-2021:1917 tang bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tang. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tang-7-6.el8.x86_64.rpm ee9ae1dc56ca1d5b38b35add16d02f318dacf13c6957f8b02f1124b55e2049b0 RLEA-2021:1919 new module: python39:3.9 Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d RLSA-2021:1924 Low: spice security update The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es): * spice: Client initiated renegotiation denial of service (CVE-2021-20201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for spice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es): * spice: Client initiated renegotiation denial of service (CVE-2021-20201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-server-0.14.3-4.el8.x86_64.rpm 0b42ed068415f6f6755f7d7efbfdcb6f7f15d59d1a9a837df2d6bc5b1552be38 RLBA-2021:1930 python36:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python36 python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm fe5acf5b333e19f8028820c4fdc9736984d0e79466cc28d1605dbc766f3942a0 python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm 1d3f8a8f08584719452bea07bd3790bd3a282b39842f25f5bd9f40acffe1e97c python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm 284c71458cac84d2f339a1438ec01395f82d9f54935d0479274f5bb3882f913f python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d RLBA-2021:1933 mod_auth_openidc:2.3 bug fix update The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_openidc, cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102 RLBA-2021:1936 scap-workbench bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scap-workbench. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms scap-workbench-1.2.0-8.el8.x86_64.rpm dbc084d9736353c535f44d800926704fbcd69953e841cf010a525332b1386e74 RLBA-2021:1937 protobuf-c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for protobuf-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms protobuf-c-1.3.0-6.el8.x86_64.rpm f3a99aed36ada0451b36b9682ef6b6d07f790d4cc157bf13e8d3c04856b7c489 protobuf-c-compiler-1.3.0-6.el8.x86_64.rpm 08916c494c2a4b29608e6ebe1d70f8960df4065c1ba0d80c4c45f3fcbec61348 protobuf-c-devel-1.3.0-6.el8.x86_64.rpm 4c57f3d2a16b8aab617e5e52087b065eb3955c14b1acf36e7aebe8d24e9d0b9f RLBA-2021:1939 libosinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libosinfo, osinfo-db, osinfo-db-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms osinfo-db-tools-1.9.0-1.el8.x86_64.rpm adc8c8996f88803b72ac5fc2325714318a2b2f03a22c77f4cc8d4e7797609e0f RLBA-2021:1943 crash-trace-command bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash-trace-command. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms crash-trace-command-2.0-18.el8.x86_64.rpm 9998511793ac0e78c4972e891317b0bab2a10d4dd5c7a65a0a991726490e3c07 RLBA-2021:1951 new module: container-tools:3.0 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLEA-2021:1955 jmc:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jmc, ee4j-parent, jaf, HdrHistogram, lz4-java, owasp-java-encoder, directory-maven-plugin, jmc-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__jmc lz4-java-1.7.1-14.module+el8.4.0+394+13a3c723.x86_64.rpm 9bb5f1fde802c20380728f69ca4c08d6279caa11f65a801c7347095d5687c31c RLSA-2021:1979 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2021:1983 Important: idm:DL1 security update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__idm opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:2259 Important: nginx:1.18 security update nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e RLSA-2021:2290 Important: nginx:1.16 security update nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20 nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904 nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462 RLSA-2021:2291 Important: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLSA-2021:2360 Important: postgresql:9.6 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (9.6.22) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (9.6.22) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgresql-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 0b1c99a3e81edc34c35bcce7ac55f6db1876fd0fe74d04258e3f9703810165b9 postgresql-contrib-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm e524c0629c6d38353c7da4ba6bfeaed2c82a39a5e1024fb9425c578d60e4c93c postgresql-docs-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 88df40af56e602aad0cd0ccff1891e214c7f252b061d1adcf8e75033d3daacee postgresql-plperl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 0109c22adfb0829ee7967550f1500a5101504890e82ff63ceec7ada1a8d0d0d6 postgresql-plpython3-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 020f1729ea269e28a16781d3666fcc0d6b0a4bbb9ac725ae84300cc7b049ec12 postgresql-pltcl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 8de17b6cb46b1d1a3aa5bc6842728e4e57da3a23175d3a8596a0cfc48c55a7db postgresql-server-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm c76ddbe828fec9fe1a71bb618dc2a6b705e01782c6845081fe78ae45debb4aa8 postgresql-server-devel-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 323b8b1c3f0f5b6790ce6e710859aefeda899a2195b72086eea50bc32e300c5d postgresql-static-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 120a9aaf53b223981e347dc1fd215de958a1b5279fc78c061093d07d5afb5cdf postgresql-test-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 11897a3ba65c0e88aa99c4502c19f94bc91db7124f5d60388d31ac996ebf9719 postgresql-test-rpm-macros-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm 25ac98b62c359b013fba2af6bf95ce9ef44d1ee87611b2a92af9a526e2ceacff RLSA-2021:2363 Important: gupnp security update GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. Security Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for gupnp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. Security Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms gupnp-1.0.6-2.el8_4.x86_64.rpm 99156c05f5915a79b954b5a4e6d5d38b65d7c455f9a66af27e036a35635570cc RLSA-2021:2370 Important: container-tools:3.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLSA-2021:2371 Important: container-tools:rhel8 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3af0efabcac69789ce47fab592ecc29899095fcc2be8f8a6201db544376bc188 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLSA-2021:2372 Important: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.7) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) * postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.7) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) * postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:2375 Important: postgresql:13 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.3). Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.3). Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:2583 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm 74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 RLSA-2021:2584 Moderate: ruby:2.7 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999) Security Fix(es): * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999) Security Fix(es): * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000) rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 RLSA-2021:2587 Moderate: ruby:2.5 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626) Security Fix(es): * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626) Security Fix(es): * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 RLSA-2021:2588 Moderate: ruby:2.6 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627) Security Fix(es): * rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881) * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627) Security Fix(es): * rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881) * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968) rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm 2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df RLBA-2021:2592 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984) rocky-linux-8-x86-64-appstream-rpms__idm opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:3020 Important: ruby:2.7 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 RLSA-2021:3061 Moderate: virt:rhel and virt-devel:rhel security and bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754) * hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416) * qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301) * Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754) * hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416) * qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301) * Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2021:3070 container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLSA-2021:3075 Low: libuv security update libuv is a multi-platform support library with a focus on asynchronous I/O. Security Fix(es): * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libuv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libuv is a multi-platform support library with a focus on asynchronous I/O. Security Fix(es): * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libuv-1.41.1-1.el8_4.x86_64.rpm 1a1e44d7537433919bdf760fe9a2bb545720b7d054706e5c3871cca3b40f0f31 RLBA-2021:3083 gcc-toolset-10-valgrind bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix(es): * incorrect pkgconfig virtual provides in devel packages (BZ#1968378) For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix(es): * incorrect pkgconfig virtual provides in devel packages (BZ#1968378) For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpm eaee7045eb86911441e2ca185719dac4846cf6761b34b1cd4503e66276f0b650 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm 4b0fc0732a44b410281e4ebb01b853a5ae5b49173e876bfba3064ea2a42410d3 RLSA-2021:3590 Moderate: mysql:8.0 security, bug fix, and enhancement update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693) Security Fix(es): * mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424) * mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804) * mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444) * mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042) * mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422) * mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860) * mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402) * mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852) * mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399) * mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870) * mysql: Server: Logging unspecified vulnerability (CVE-2020-14873) * mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385) * mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011) * mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038) * mysql: Server: Options unspecified vulnerability (CVE-2021-2146) * mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232) * mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208) * mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308) * mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307) * mysql: Server: Federated unspecified vulnerability (CVE-2021-2354) * mysql: Server: GIS unspecified vulnerability (CVE-2021-2417) * mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Segfault and possible DoS with a crafted query (BZ#1996699) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693) Security Fix(es): * mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424) * mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804) * mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444) * mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042) * mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422) * mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860) * mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402) * mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852) * mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399) * mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870) * mysql: Server: Logging unspecified vulnerability (CVE-2020-14873) * mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385) * mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011) * mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038) * mysql: Server: Options unspecified vulnerability (CVE-2021-2146) * mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232) * mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208) * mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308) * mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307) * mysql: Server: Federated unspecified vulnerability (CVE-2021-2354) * mysql: Server: GIS unspecified vulnerability (CVE-2021-2417) * mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Segfault and possible DoS with a crafted query (BZ#1996699) rocky-linux-8-x86-64-appstream-rpms__mysql mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f RLBA-2021:3593 gcc-toolset-10-elfutils bug fix update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix: * The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix: * The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013) rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm f64e85941a97279c482bbd079fbd153255a348556053cf6e40b7b1abea70c7bf gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm fbf71de210a57662e2215e22fe634b8822b0533020a47c1f6615e0e50b9c2e66 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm 47103bfcc834e8d9585ea457e023013726ea8fd98bfb6cc9ab1003ac9df38925 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm 20d78a08fcad187ce1fe69bdb260016abe2cfc43d6fe882099adfc1c11cb4b55 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm b27fdaf713c099c491534f785cc4418944976ced9ace65c6a1b4cfdc64441000 gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm 06e63e0c75d6871db6259dca49854a356e43dfc658de0edfb41b193111939565 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm 769e4bb8af44477862465592d22f364ae865f1f7cd86bf005b0a2e304ce20765 RLBA-2021:3661 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLSA-2021:3816 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2021:3918 Important: redis:5 security update Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for redis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__redis redis-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm 07ed98eddf06d6cf89b3b44f3d2437fb863fb94b8366cb76e071ee3949d87eab redis-devel-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm 88dc345660dcc3b1735cf173bdbee0cab0259caa738f353d60ebd210ce021a88 RLSA-2021:3945 Important: redis:6 security update Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for redis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__redis redis-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm 4eef6a7e2f37e49feb209a59bf02823274ca392247433e04dc4d20f43a1990cd redis-devel-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm 23152bf30dc357235e82eeaf7c6e53ea18f2e50f7bc3b9eaa1d38f99fa160a90 RLBA-2021:4093 container-tools:3.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245) * 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264) * [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245) * 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264) * [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLBA-2021:4094 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Dirsrv memory leak (BZ#2003607) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Dirsrv memory leak (BZ#2003607) rocky-linux-8-x86-64-appstream-rpms__idm opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:4150 Moderate: python36:3.6 security and bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python36 python36-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm cc13e57ac650df29ee9ed66c0dac505cfbde741608604acfd60ff5ed455b3687 python36-debug-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm 43b88c0a96a9906b7aded4fbfd2d2bf4de6b1753dd6e0e84faec8106a66cab1c python36-devel-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm a9a046234a026579a675db98b8dc5a2dc0d354897b6f749a2264f097eb6a42a6 python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm fe5acf5b333e19f8028820c4fdc9736984d0e79466cc28d1605dbc766f3942a0 python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm 1d3f8a8f08584719452bea07bd3790bd3a282b39842f25f5bd9f40acffe1e97c python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm 284c71458cac84d2f339a1438ec01395f82d9f54935d0479274f5bb3882f913f python3-scipy-1.0.0-21.module+el8.5.0+671+195e4563.x86_64.rpm 496d5d8cfad3f4edb2251e0515c299893db4792d67cab28efc43d45d251b8f79 python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d RLSA-2021:4151 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm 6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9 python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 RLSA-2021:4154 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) * containers/storage: DoS via malicious image (CVE-2021-20291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) * containers/storage: DoS via malicious image (CVE-2021-20291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLSA-2021:4160 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information disclosure via pydoc (CVE-2021-3426) * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information disclosure via pydoc (CVE-2021-3426) * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm 49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12 python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d RLBA-2021:4163 mariadb-connector-odbc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mariadb-connector-odbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mariadb-connector-odbc-3.1.12-1.el8.x86_64.rpm 77f9ed66d4c10737a40f1dfe9d25177eae63e27d168d41e92b823d15840d636a RLBA-2021:4167 socat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for socat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms socat-1.7.4.1-1.el8.x86_64.rpm 12653938d941afafbaa7fedd576fea5ad9a69124b5003aef196b8b5d26154747 RLBA-2021:4170 libreoffice-voikko bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libreoffice-voikko. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libreoffice-voikko-5.0-6.el8.x86_64.rpm 68c67ec0e50e488c398f5470f9528c4851f615beb1549f1aaaa5d09ea61b1dba RLSA-2021:4179 Low: file-roller security update File Roller is an application for creating and viewing archives files, such as tar or zip files. Security Fix(es): * file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for file-roller. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list File Roller is an application for creating and viewing archives files, such as tar or zip files. Security Fix(es): * file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms file-roller-3.28.1-4.el8.x86_64.rpm 774249365a784f0f1ddec77ece69c5f945aea411d0fb82fe80f35b95e0f5ca61 RLBA-2021:4180 evolution, evolution-data-server, evolution-ews bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution, evolution-ews, evolution-mapi, evolution-data-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evolution-3.28.5-18.el8.x86_64.rpm 52099aaa38d080cab8e5ad7d2752560f444e7f9eebb0c9d2a7e04e0ee4125e1a evolution-bogofilter-3.28.5-18.el8.x86_64.rpm cc6330c94c49457a8d2f56b3cb453baa7f287c820d88772368121fe3652ffdcc evolution-pst-3.28.5-18.el8.x86_64.rpm 3a8b77dd43293eaeccf413117992e0695e74c9aa6ff31edf4bc5253effdc9f98 evolution-spamassassin-3.28.5-18.el8.x86_64.rpm a493ffbbaa757d8dcff030bfc959f5d9ee6c4fc92caf48dcb0385e4144f8d858 RLSA-2021:4191 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595) * libvirt: Insecure sVirt label generation (CVE-2021-3631) * libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595) * libvirt: Insecure sVirt label generation (CVE-2021-3631) * libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLBA-2021:4193 rsyslog and its related dependencies bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsyslog, libfastjson, librelp, liblognorm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms librelp-1.9.0-1.el8.x86_64.rpm c6fc1c283dfd3d98e337bc9e4dfa643c53657c0fec5515713ba75fdac61842f8 libfastjson-0.99.9-1.el8.x86_64.rpm 427188c6f09a570c668cee4e22ab62832788c6f6c6a99d07126466308e04f13a liblognorm-2.0.5-2.el8.x86_64.rpm bc00a8717bbea75b192e417e9cbf3525f9ccd6dd328de5f49f883dabf8c686a7 liblognorm-doc-2.0.5-2.el8.x86_64.rpm 25face4c27d1c40f02b3738653637a107a64b7360f5c91d3d84e69172da02e2a RLBA-2021:4195 powertop bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for powertop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms powertop-2.14-1.el8.x86_64.rpm 729ffc74c690fbbff0b6e3f9ceee824079f3e70fe5d5f29a079eb606332821e5 RLBA-2021:4196 libgweather bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgweather. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgweather-3.28.2-4.el8.x86_64.rpm 4c69a5c6bd5a4e3cfacce7a740228f49cf1ae41c28511ade87c1f12b9eb032f9 libgweather-devel-3.28.2-4.el8.x86_64.rpm 04206eb4ee259438d53647ee5b8281a4f5330fac03f12ba6952a23613587f61c RLBA-2021:4212 mailman bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mailman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mailman mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3 RLSA-2021:4213 Moderate: php:7.4 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110) Security Fix(es): * php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069) * php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071) * php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068) * php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070) * php: NULL pointer dereference in SoapClient (CVE-2021-21702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110) Security Fix(es): * php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069) * php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071) * php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068) * php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070) * php: NULL pointer dereference in SoapClient (CVE-2021-21702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLBA-2021:4216 xorg-x11-font-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-font-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xorg-x11-font-utils-7.5-41.el8.x86_64.rpm afd2b72c9233ef3489cdc0c47125bd19ccd8f93cf4ff0bd2f60213d3e6c22e53 RLBA-2021:4217 stratis-cli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stratis-cli, stratisd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms stratisd-2.4.2-2.el8.x86_64.rpm 512ed0de3294b1af949e2af690f45b72ad1a8f2e19472b1dac715058d308a8b6 stratisd-dracut-2.4.2-2.el8.x86_64.rpm ead1ebd70d475ea2caf5ce0c19f03d66ad818ee36fc044fb137c1ce759b7162e RLBA-2021:4218 udftools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udftools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms udftools-2.3-2.el8.x86_64.rpm 98bdda0c742d835d9875a0b6da1453a13ae1b63c1ab35bce343898029bca5c4b RLBA-2021:4219 libinput and libevdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libevdev, libinput. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libevdev-1.10.0-1.el8.x86_64.rpm 5a7495b56a09a76c54ad5fce64f6adbeda62d1cc6bd0accce4c9386ac9bff4fb RLBA-2021:4220 xapian-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xapian-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xapian-core-1.4.18-3.el8.x86_64.rpm 53e29be7231b6ebf376f7c89e6d654597c4931af8dd219787cb9ac630da69d3b xapian-core-libs-1.4.18-3.el8.x86_64.rpm 31cb47e61ca8961dde64cd276b4e991594462e0ac63e3054263f617fd04fd3d0 RLSA-2021:4221 Moderate: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm 2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLSA-2021:4222 Moderate: container-tools:3.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLBA-2021:4224 libwacom bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libwacom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libwacom-1.6-3.el8.x86_64.rpm 289ee5b010e498d615a969b48e600668c2351bd34b2e2908b24fc57d827494a9 RLBA-2021:4228 rshim bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rshim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rshim-2.0.5-2.el8.x86_64.rpm 97e027fb20b53d88f4943792d036df6a87be61e8c2e5360c617b349bb115ba83 RLEA-2021:4229 google-noto-emoji-fonts and pango bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for google-noto-emoji-fonts, pango. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pango-1.42.4-8.el8.x86_64.rpm 481dc7c787260e8d261cd4f7d7499105def3a3a64835e4f7f4ed6ab0ddf92723 pango-devel-1.42.4-8.el8.x86_64.rpm 2782d37b80b2e47d284ec7395f60a3bcbb77edf63f1f4ead25ad1b2dccd464c4 RLBA-2021:4230 ipa bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:4231 Moderate: libwebp security update The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009) * libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010) * libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012) * libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013) * libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) * libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330) * libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331) * libwebp: excessive memory allocation when reading a file (CVE-2020-36332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libwebp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009) * libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010) * libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012) * libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013) * libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) * libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330) * libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331) * libwebp: excessive memory allocation when reading a file (CVE-2020-36332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libwebp-1.0.0-5.el8.x86_64.rpm f3a9a91ed62713359b0255f51c68185ac36426fbe542469c22fcf709df97bfad libwebp-devel-1.0.0-5.el8.x86_64.rpm 274e1428df907f6f75a7093330bb69359132f90e1398978b3cc5b282db668d23 RLEA-2021:4234 mesa and related packages bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-server-Xwayland, libepoxy, wayland, wayland-protocols, libdrm, xorg-x11-server, egl-wayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libepoxy-1.5.8-1.el8.x86_64.rpm fa45b6c15f3a168ecb19032e0e2321541e1ac5bc8775d28491889b32696332bd libepoxy-devel-1.5.8-1.el8.x86_64.rpm f3df3fb27f03617cca795772e3d8450ec6347161fcae7af29676f18b7b60ac73 libwayland-client-1.19.0-1.el8.x86_64.rpm f8be8d0b50f23d997f7643d9dba4d149a1b29f26c61ce6bb85f8b136cb2265d7 libwayland-cursor-1.19.0-1.el8.x86_64.rpm 2d9e5c9557e076c1730c407955d4959668bf72c1b33f257ba240a221e19daea9 libwayland-egl-1.19.0-1.el8.x86_64.rpm 22c6e952f8edce3aaf3dd0caaf3c2544b4cae56a0f0bc11c47ae9263c935cd6f libwayland-server-1.19.0-1.el8.x86_64.rpm 81752663a48a83b6251f80cbbc8f49e19032cbdb2452a83647034f2a372e259b wayland-devel-1.19.0-1.el8.x86_64.rpm 7641020d95b21798a2bea97e7cd1676d4637229d58dd129a7d9be11d4133d4a5 RLSA-2021:4235 Moderate: jasper security update JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Security Fix(es): * jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828) * jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272) * jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926) * jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jasper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Security Fix(es): * jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828) * jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272) * jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926) * jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jasper-libs-2.0.14-5.el8.x86_64.rpm 5830d55c1e5a8b07c706d339f3deb917c7d0a4364160859ccbd59044315ca93c RLEA-2021:4239 pki-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 RLEA-2021:4242 new packages: gcc-toolset-11-dwz GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-dwz-0.14-2.el8.x86_64.rpm 414ba44d288436081a409b4e578b86c1f284347262b45f47cc0fe4c07af80bf9 RLBA-2021:4244 dwz bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dwz-0.12-10.el8.x86_64.rpm d4682e21463097454b01d788a980f13c2377cdc5f757d6a446c30ed1061ba00c RLEA-2021:4246 cmake bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cmake. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cmake-3.20.2-4.el8.x86_64.rpm 9d21c01f081a4b8f553192a92fe4d5fcf48530fe318383c12d8b2b78114b81e5 cmake-filesystem-3.20.2-4.el8.x86_64.rpm d7d94d53b80ea0fca0c7c6af95e71260daf4fb15240928d201d8c0aa6f1455eb cmake-gui-3.20.2-4.el8.x86_64.rpm e67e49c592112e86feb8459cd94ed0c5e31428a9bf87bd0fe7413863c330bf08 RLSA-2021:4256 Moderate: graphviz security update Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains. Security Fix(es): * graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for graphviz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains. Security Fix(es): * graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms graphviz-2.40.1-43.el8.x86_64.rpm 2be0fa27c439694487dacbb62531a62dd1d0fd76b5c145c5f9fc810708b73287 RLSA-2021:4257 Moderate: httpd:2.4 security, bug fix, and enhancement update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690) * httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690) * httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLBA-2021:4259 new packages: gcc-toolset-11-dyninst GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-dyninst-11.0.0-2.el8.x86_64.rpm 52aa51970a45cb360d40b51fc6950ac1d378f03f7e441f3302847fb4a0416b23 gcc-toolset-11-dyninst-devel-11.0.0-2.el8.x86_64.rpm 892e60f0d4b29630fa5239a1c9d88c344c4cbd697bae563cf5a06bb9347d14cc RLBA-2021:4263 new packages: gcc-toolset-11-valgrind GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-valgrind-3.17.0-6.el8.x86_64.rpm 22e3c8bb50f033855ffbb6f0a0cd5584ad40c22096494a26e73921a9f311e957 gcc-toolset-11-valgrind-devel-3.17.0-6.el8.x86_64.rpm 4fa4a361e3a93cd0f3167f9c3c324001858ab8647df00d1654dd80b89b52f132 RLBA-2021:4274 new packages: gcc-toolset-11-ltrace GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-ltrace-0.7.91-1.el8.x86_64.rpm 440eb2bf1e4b352c859409c520a72ec4afa00268b06a568a952766dc1ed61470 RLEA-2021:4275 postgresql:12 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLEA-2021:4276 postgresql:13 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLBA-2021:4279 new packages: gcc-toolset-11-make GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-make-4.3-2.el8.x86_64.rpm 580e8e84640ba2dccd1fbc460b3c2581c1d6ccfd130a29e427590785dbc244bd gcc-toolset-11-make-devel-4.3-2.el8.x86_64.rpm 44e8f297fa2de647b81fdb7e54560792707abe9c3c3721ee9d4a7b93a804acc2 RLEA-2021:4282 new module: ruby:3.0 This enhancement update adds the ruby:3.0 module to Rocky Linux 8. (BZ#1938942) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the ruby:3.0 module to Rocky Linux 8. (BZ#1938942) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 RLBA-2021:4285 libvoikko bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvoikko. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libvoikko-4.1.1-3.el8.x86_64.rpm 5c7ee590aa167c204857ef2e994e26be9c8ac3b74a0a5907dbb266fdddedc00f voikko-tools-4.1.1-3.el8.x86_64.rpm b0f7a35b787c63187c9175d9435a7773bf9d1911543fa6e3769191347017f150 RLEA-2021:4286 lpsolve bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lpsolve. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lpsolve-5.5.2.0-21.el8.x86_64.rpm e476606c04389d6be46b60f23064e4f60ebf06df3686442956f9a3c078911d45 RLSA-2021:4288 Moderate: libjpeg-turbo security and bug fix update The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libjpeg-turbo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libjpeg-turbo-1.5.3-12.el8.x86_64.rpm 71a9f44edce13938e9fb1557ec88d9d923fe2ea547fdb3cb0926489d04e93c01 libjpeg-turbo-devel-1.5.3-12.el8.x86_64.rpm 777786c85899f62d57f0cb029424e4b6cd928de19aea0cd7ecf369a7353b245a libjpeg-turbo-utils-1.5.3-12.el8.x86_64.rpm 8f7e075b1ddbff3238735af3cb79ed0883dd1a8b7c2a35afb473d4507d707a4e turbojpeg-1.5.3-12.el8.x86_64.rpm 0a042fe31a447a3204ffa910a05cec647e16d7952f7f19d32a8e24aa2680bd2e RLEA-2021:4289 sblim-gather bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-gather. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-gather-2.2.9-24.el8.x86_64.rpm fc460831084b0f087a10aa0011b5c7ee044622bcb040a401a4e0e8cb77e508d5 RLSA-2021:4292 Moderate: squid:4 security, bug fix, and enhancement update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384) Security Fix(es): * squid: denial of service in URN processing (CVE-2021-28651) * squid: denial of service issue in Cache Manager (CVE-2021-28652) * squid: denial of service in HTTP response processing (CVE-2021-28662) * squid: improper input validation in HTTP Range header (CVE-2021-31806) * squid: incorrect memory management in HTTP Range header (CVE-2021-31807) * squid: integer overflow in HTTP Range header (CVE-2021-31808) * squid: denial of service in HTTP response processing (CVE-2021-33620) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384) Security Fix(es): * squid: denial of service in URN processing (CVE-2021-28651) * squid: denial of service issue in Cache Manager (CVE-2021-28652) * squid: denial of service in HTTP response processing (CVE-2021-28662) * squid: improper input validation in HTTP Range header (CVE-2021-31806) * squid: incorrect memory management in HTTP Range header (CVE-2021-31807) * squid: integer overflow in HTTP Range header (CVE-2021-31808) * squid: denial of service in HTTP response processing (CVE-2021-33620) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLBA-2021:4298 pyparted bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pyparted. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pyparted-3.11.7-4.el8.x86_64.rpm 78e4ef6771cb8ef1d187a15434b7063d4e95f83fc84a924085dd879494670473 RLBA-2021:4307 ipmitool bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipmitool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ipmievd-1.8.18-18.el8.x86_64.rpm 6f60b773a641fd698637567c687565d7c0f61c8012b102beebdfc19733677a58 ipmitool-1.8.18-18.el8.x86_64.rpm 4499de1e8f15fb44c99a77be0b38f895522b39f21a0c2ea503338f7055984bde RLBA-2021:4311 varnish:6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for varnish, varnish-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__varnish varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm b9e50c31d639d02ea7ac7dfd44542da1eb99e9e500ff67d94cd101de8939fb2c varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm a8db537b818eb564f557f5c29fcbae4d49c524380c6dfbd3d863dcafcea915d4 varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm 67d172546cc350ba9674f91c3a1cd72149280cddff3ad7851ead00923b1378f6 varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm 9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e RLBA-2021:4313 python-ldap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-ldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-ldap-3.3.1-2.el8.x86_64.rpm 721a8e6a717b034e306d1b21ffb2d3c6d9f175bd27c818e3a25d3ea416e410a1 RLSA-2021:4316 Low: zziplib security update The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for zziplib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms zziplib-0.13.68-9.el8.x86_64.rpm b14f7c6ee1108658863a2c7254d5c2e1829fa9ee54c13ad089854f7d42e14c2d zziplib-utils-0.13.68-9.el8.x86_64.rpm fe43deb8bc190c8a2a423b7a5621122b253abe8459dbe4d78d767c3b1cc04a81 RLBA-2021:4318 apr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms apr-1.6.3-12.el8.x86_64.rpm 23636f805dc36996a57264a872409dd6c1ef9150dfa02dca7b2fa0a6016ce46b apr-devel-1.6.3-12.el8.x86_64.rpm 3e1190a514704461ab4528e39d1abb2da8be8e23327c822791750a4ba864cc5b RLSA-2021:4324 Moderate: python-psutil security update psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python. Security Fix(es): * python-psutil: double free because of refcount mishandling (CVE-2019-18874) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-psutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python. Security Fix(es): * python-psutil: double free because of refcount mishandling (CVE-2019-18874) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-psutil-5.4.3-11.el8.x86_64.rpm 93541c8c1475fbd127831e367cbf33db3c0881499f84ff19b057d1d64af12c6c RLSA-2021:4326 Moderate: libX11 security update The libX11 packages contain the core X11 protocol client library. Security Fix(es): * libX11: missing request length checks (CVE-2021-31535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libX11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libX11 packages contain the core X11 protocol client library. Security Fix(es): * libX11: missing request length checks (CVE-2021-31535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libX11-1.6.8-5.el8.x86_64.rpm 66600448091b07b90d26aad07eef05f65693d5ede2d1272c7d5b75a07b2deaa2 libX11-devel-1.6.8-5.el8.x86_64.rpm 2e1561f3442cfafcae05e05640156a198cfaa3509df21a931f9ae945b51f7040 libX11-xcb-1.6.8-5.el8.x86_64.rpm 8aba2186142e2053bb7e06f871ba1fd5b71e4822ef2e6d8f8d7dcabe250e5302 RLBA-2021:4327 perl-GSSAPI bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-GSSAPI. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms perl-GSSAPI-0.28-25.el8.x86_64.rpm 4c8d266e4446421ac55fdf9fa865f8c3603a67d45473f93926c2543d8c2f1cf8 RLBA-2021:4328 scrub bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scrub. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms scrub-2.5.2-16.el8.x86_64.rpm 55f4085d7fae3b814497e5a3a380c91667e4e124099432e36032927d3fa643a0 RLBA-2021:4329 jmc:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jmc, ee4j-parent, jaf, HdrHistogram, lz4-java, owasp-java-encoder, directory-maven-plugin, jmc-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__jmc jmc-8.0.1-4.module+el8.5.0+676+5f023c1e.x86_64.rpm bd544cc77d0049e0a4f0781b8b45f79d1fdfe7ff83a95ec4c03b980892140c98 lz4-java-1.7.1-14.module+el8.4.0+394+13a3c723.x86_64.rpm 9bb5f1fde802c20380728f69ca4c08d6279caa11f65a801c7347095d5687c31c RLEA-2021:4335 tesseract bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tesseract. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tesseract-4.1.1-2.el8.x86_64.rpm 7e804dcc73b5431686744c78849dd6abe1906a3a2d947143cd04cc22e11bcec1 RLBA-2021:4337 numpy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-numpy-1.14.3-10.el8.x86_64.rpm 88426273e627094ce60d92e2f38d7d8e7a24d64f5e09ba5cd30ddc7aa4d03d0f python3-numpy-f2py-1.14.3-10.el8.x86_64.rpm 26f0c3b1f51b2806a59e14b7f03c97a80d3420c80b3aeabb5ccc94f2520bc2d5 RLBA-2021:4338 python-coverage bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-coverage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms platform-python-coverage-4.5.1-9.el8.x86_64.rpm 2440743216f1852078cab6ac55e74643d943ba61b58f1df96677ac6c68ae328c python3-coverage-4.5.1-9.el8.x86_64.rpm 508eb87fcf60df12f9b13ffa9bbf3c5159e90478a343d519e47aef4858818529 RLSA-2021:4339 Moderate: grilo security update Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements. Security Fix(es): * grilo: missing TLS certificate verification (CVE-2021-39365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grilo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements. Security Fix(es): * grilo: missing TLS certificate verification (CVE-2021-39365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms grilo-0.3.6-3.el8.x86_64.rpm 406faa8be9d8e3cecbdb5d88224218bc8064a1ba7c0232000e18e516e394825d RLEA-2021:4345 pcm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pcm-202107-5.el8.x86_64.rpm 92ae3ce4eda9c08e467fbdd8c8f41056ca9e78500a631407a8028f726648b02d RLBA-2021:4348 brasero bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for brasero. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms brasero-3.12.2-5.el8.x86_64.rpm b44d64dd22fb33e76e2e1d190be29a9ae36a78fcf4089ea35f5ba60b3376f9b2 brasero-libs-3.12.2-5.el8.x86_64.rpm 932ab06fe910ca25148f898c4fdfe8cb862a0101f13407012498b2231552dae9 brasero-nautilus-3.12.2-5.el8.x86_64.rpm b4cfeaf97a50976c95f4a3f7de0c394acd5b20598d9dc38c25227cf97044d9fa RLSA-2021:4162 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-psutil: Double free because of refcount mishandling (CVE-2019-18874) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python: Information disclosure via pydoc (CVE-2021-3426) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-psutil: Double free because of refcount mishandling (CVE-2019-18874) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python: Information disclosure via pydoc (CVE-2021-3426) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029 python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm 2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm 74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 RLBA-2021:4533 ibus bug fix update The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems. Bug fix: * Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems. Bug fix: * Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064) rocky-linux-8-x86-64-appstream-rpms ibus-1.5.19-14.el8_5.x86_64.rpm d640b203a5d7f39666096bd8f6431de2754458602329d3ad9e0cdda2149127a3 ibus-gtk2-1.5.19-14.el8_5.x86_64.rpm 17fb91d21b32c0eafce99b60fc54f24908f5296dbf505f5d865cf0c8478f4d2b ibus-gtk3-1.5.19-14.el8_5.x86_64.rpm d6616deb0b59c7ffb51448f8970150cc2569882c1a796770734a1f54a4209a22 ibus-libs-1.5.19-14.el8_5.x86_64.rpm 55ec665058ffe34aebd18ce73c6f723a7653a852f4e5f6bf8290a3d1e0048e5d ibus-wayland-1.5.19-14.el8_5.x86_64.rpm bd1554851ebce67c9961e0d1dfa0a847f8aad00fb24993ef8ba0dc384b5a206a RLSA-2021:4537 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2021:4585 Moderate: gcc-toolset-10-gcc security update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gcc-toolset-10-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-gcc-10.3.1-1.2.el8_5.x86_64.rpm 7540704c3174809261e03b7d7097217feb9f86a4c86140a4652566bcede4fbc3 gcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.x86_64.rpm f3a6e586abf184a36ae0cebb2e25a7c3fb30b9a7cf66107c7c81939bbee76bc3 gcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.x86_64.rpm f0f5e192cad7b410e5b12dde407b68fd42cbcb92aee3c4701ecf2eb07db7afd6 gcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.x86_64.rpm 225c5cd4667683d1b04d3a8ddcfc294ec0d4c5c0a16c4f56c4dd2da8b1ed0c8a gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.x86_64.rpm 78c0a8ba02a1769d00a7fd8467d37b102c6735e83db543ebcc5ff0ac5b89a6be gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.x86_64.rpm b4134855699223e24c2653af1eb983a60ba445c1bd565bf84fc6931f46b5b926 gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5.x86_64.rpm 47ff618b2d2a9c2a984c9cc41f39ac203fd42d0f2c9c4ff1d2e1453dde3369f6 gcc-toolset-10-liblsan-devel-10.3.1-1.2.el8_5.x86_64.rpm bfea9c7e7c421f7bf3dfe32906e4dfffcbc40a1533e3c1ca769e74fcf6031dc6 gcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5.x86_64.rpm 167bf467d120ca7d903ae0b7d452291073cdeb99ac106ca5286ffe60390d797f gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.x86_64.rpm 2f60776c2c62359175409514403a7159949660820ed10c89c6936b47e319a852 gcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.x86_64.rpm 4986f05abecf7adafb7d3a7eaf2f895bf4832416ea56a008e5dfb231d0f0ca04 gcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.x86_64.rpm eb951d4a541f5c80632df6ca914cc7f1dcc30b494559f7f1f4e73f52aea5daf2 gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.x86_64.rpm d4b17d92538129104ce44e190628d899cc1298da157c28ae4304f99ddd1bda94 RLBA-2021:4604 httpd:2.4 bug fix update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856) rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2021:4826 Important: mailman:2.1 security update Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) * mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mailman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) * mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mailman mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3 RLSA-2021:4916 Important: mailman:2.1 security update Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mailman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__mailman mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3 RLSA-2021:5142 Moderate: idm:DL1 security update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__idm opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2021:5235 Moderate: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.9). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.9). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:5236 Moderate: postgresql:13 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.5). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.5). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2021:5238 Low: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930) * QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930) * QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2022:0258 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2022:0323 Important: nginx:1.20 security update nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030) Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030) Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 8b9098490e0ed579ef134c2c7e9e47fae539d6d5242e50d33138965f578345cc nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 22ac42d3d46d47b8a58587447b601e7609f0f66c75346558c7075201e24c1b47 nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm d906cd3b87784901f32f1ad92120afc85c8b21d9dec7f08c1a0f5ce95a217256 nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 38f76d35fd980728308e94451574909e04fc39cecdbcdb9e0db195cfa2101bbc nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 7e8970264c09a96068a63b604e536a5e9c36636d45352158be17327f1fa8a3f7 nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 7d251e53fa3837429092951a3d2fb89c1439ac9798ae72a0f7ee86dc2548c75f RLBA-2022:0348 container-tools:3.0 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 RLEA-2022:0352 container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb RLBA-2022:0361 virt:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2022:0418 Important: varnish:6 security update Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for varnish, varnish-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__varnish varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm b9e50c31d639d02ea7ac7dfd44542da1eb99e9e500ff67d94cd101de8939fb2c varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm a8db537b818eb564f557f5c29fcbae4d49c524380c6dfbd3d863dcafcea915d4 varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm 67d172546cc350ba9674f91c3a1cd72149280cddff3ad7851ead00923b1378f6 varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm 9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e RLSA-2022:0441 Important: aide security update Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for aide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aide-0.16-14.el8_5.1.x86_64.rpm cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa RLSA-2022:0543 Important: ruby:2.6 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm 2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df RLSA-2022:0545 Important: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 RLSA-2022:0643 Important: python-pillow security update The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms python3-pillow-5.1.1-18.el8_5.x86_64.rpm c3b196ec79ed44cbba9c193e5da4687349ed47692644581fa5028742c74ff5fc RLSA-2022:0672 Moderate: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 RLSA-2022:0886 Moderate: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2022:0891 Moderate: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2022:1049 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2022:1556 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514) * MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532) * Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533) * Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514) * MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532) * Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533) * Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550) rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLSA-2022:1557 Moderate: mariadb:10.5 security, bug fix, and enhancement update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515) * mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524) * Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515) * mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524) * Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542) rocky-linux-8-x86-64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 RLBA-2022:1561 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Error replacing a replica with CentOS Stream 9 (BZ#2062404) * reinstalling samba client causes winbindd coredump (BZ#2065719) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Error replacing a replica with CentOS Stream 9 (BZ#2062404) * reinstalling samba client causes winbindd coredump (BZ#2065719) rocky-linux-8-x86-64-appstream-rpms__idm opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2022:1563 virt:rhel and virt-devel:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239) rocky-linux-8-x86-64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 RLSA-2022:1565 Moderate: container-tools:3.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 RLSA-2022:1566 Moderate: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm f05e3a5804bc41a2cbe15e7dd640a8b1f466adb07480ac7090f9e125f180d54a buildah-tests-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm 75c858735e75051b96c44ac94a357625b3459f31c4714ced8fe9b7be74b2e235 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm 8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm 64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645 criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm 36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6 podman-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm 2bb6b433aeffad66524fee9505a40bbe68e2caccb3210657ed8c8da6fee1e276 podman-remote-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm bc4b311ff224a47fcbdbb1e270c032aafc2705b1312e96b5dc45b2b45aacc364 podman-tests-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm f77b5368ea0054f95286a0d27bcd7867bb9e793de93550f8a956403c02c79ea7 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm 8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm 2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm 8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm 5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4 RLBA-2022:1761 gcc-toolset-11-gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-libasan-devel-11.2.1-9.1.el8.x86_64.rpm 8c531bddbe5c1e180d660086855220b674d590560b3fe16bdcf5bec6c03565cd gcc-toolset-11-liblsan-devel-11.2.1-9.1.el8.x86_64.rpm 7ea82f68a26c5141760207388077e010f4588b4f9b70355062d551a7a960a902 gcc-toolset-11-libquadmath-devel-11.2.1-9.1.el8.x86_64.rpm d55d5364205ac1921cf4aa34f0366fcdbb1af4df4a24cea8bf6ae24776568dcb gcc-toolset-11-gcc-11.2.1-9.1.el8.x86_64.rpm 55b7a4d78981bdaa96e1714d261c6d0cc5765d33b99601e6dd1910af466ece5e gcc-toolset-11-gcc-c++-11.2.1-9.1.el8.x86_64.rpm dab6a4db71182b486a96d0fdd8d00d9f8fb79950de4dd7e3a9fb2a5c550e6c31 gcc-toolset-11-gcc-gdb-plugin-11.2.1-9.1.el8.x86_64.rpm bbadb1f377705308377525bda83d4670fbfef3aa9349ff8247a73c6858c11cbf gcc-toolset-11-gcc-gfortran-11.2.1-9.1.el8.x86_64.rpm 50bbacaef62a786cf61e2953a9dd545b43196bd4fe5f85578be6ca2a46ca27a2 gcc-toolset-11-gcc-plugin-devel-11.2.1-9.1.el8.x86_64.rpm e85a7a32d6fa3bc19b04bb8794efc10deacc41a2e1ecef5d0f46727886b5a743 gcc-toolset-11-libatomic-devel-11.2.1-9.1.el8.x86_64.rpm 0e931bbc87d9727198466655485c6d3a7245ed4b1d17e6d4fb554645c33791c1 gcc-toolset-11-libgccjit-11.2.1-9.1.el8.x86_64.rpm e13a692af85fafbdd5b6c998a780a99c43ee8d4818b8fa6bc354f25be6d1820f gcc-toolset-11-libgccjit-devel-11.2.1-9.1.el8.x86_64.rpm 5832a93871a5901f23a9fdb1238e06a5f92d0ba2a065076755af6432aaef904e gcc-toolset-11-libgccjit-docs-11.2.1-9.1.el8.x86_64.rpm a55a1e9b527968edae0d9c1837fbd0d8150d2647ee2a43a9e8937628d0665f2d gcc-toolset-11-libitm-devel-11.2.1-9.1.el8.x86_64.rpm de730760d63d865954eb6d526717a8d5ca5242905dafaf1cd8b5710e88eb2c1d gcc-toolset-11-libstdc++-devel-11.2.1-9.1.el8.x86_64.rpm dacb6447df8255683e9f59207e25eb1d3d0a623d338bf643d30f43827399545d gcc-toolset-11-libstdc++-docs-11.2.1-9.1.el8.x86_64.rpm 14683e54880445a43df79bb23fc77e5d4b8d5c99c05da399f82a6348f25eb46d gcc-toolset-11-libtsan-devel-11.2.1-9.1.el8.x86_64.rpm b66e5ba1f658b4496922a4bc5d5860fc05195a1c8e04d8fff7fcf9640d6125fd gcc-toolset-11-libubsan-devel-11.2.1-9.1.el8.x86_64.rpm 5b4d8b23fb0a11f41583725ee2c7b3bcbde1eecd19108e38628e2d1b7bf731b0 libasan6-11.2.1-9.1.el8.x86_64.rpm 4d7f7522004e9f9ade90c1bda34985df154802745e64820e8b5ff0fca25b18d7 RLSA-2022:1764 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860) Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860) Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpm 7867930af945070f981bdaa8645a2cbabe1c20d36c2afd88a03cec102bfef2cd python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029 python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm 2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm 74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 RLBA-2022:1770 evince bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evince. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evince-libs-3.28.4-16.el8.x86_64.rpm fb8c9b16a783e917de4cbedd8f687777b790874348c8a818c26e43b9946b1026 evince-3.28.4-16.el8.x86_64.rpm 4b89edf257c0c87227a5dcea0e42852933bc381cabd0b85117f819cc47abd048 evince-browser-plugin-3.28.4-16.el8.x86_64.rpm d772b8a7820f4606899ae37f2ea1ca79d3a8e6f66c8a18801470b572616a22e0 evince-nautilus-3.28.4-16.el8.x86_64.rpm 4de0dd97df1d0379eeac86c9fd9731bd67b67b0f9c295a9f37d8a2c1f6d2badc RLBA-2022:1789 certmonger bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for certmonger. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms certmonger-0.79.13-5.el8.x86_64.rpm 9a594693b16cc0399de587c611d818d10c15fc5321b99c3bec7bc8c725360f3d RLBA-2022:1790 libpinyin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpinyin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpinyin-2.2.0-2.el8.x86_64.rpm f7cc05cac86c98616dc9f56207505c2e980f7bd0feba15a5007056e7f8c65478 libpinyin-data-2.2.0-2.el8.x86_64.rpm e4d105f0edecc9ef1b34463a0ad865cc4ec4a2be853820cfd277f0f1452eeaa4 libzhuyin-2.2.0-2.el8.x86_64.rpm 3bc4c86c897dac5e0aa555966bd9abccf88cb3e8aed5f3d1a9306b47604e1545 RLBA-2022:1794 libmemcached bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmemcached. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libmemcached-1.0.18-17.el8.x86_64.rpm b01aa0dec0396ea605e5e144b56b26ac5ab6c5f512fe8c26af4e95cc2fe74fd1 libmemcached-libs-1.0.18-17.el8.x86_64.rpm 79f88c46d4fc83d343996e1959c868674ff4542061026f0278702808ee4d4aa9 RLBA-2022:1800 accountsservice bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for accountsservice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms accountsservice-0.6.55-4.el8.x86_64.rpm 111ac52115876ea83896c95c7fc1d4885ef7916bfccc1c67cc9ae5c3ac1f2aad accountsservice-libs-0.6.55-4.el8.x86_64.rpm caf042716f9d89983e8d36a58f3d48ed8d0d30e02871e160fdff59e59b17084e RLSA-2022:1801 Moderate: gfbgraph security update GLib/GObject wrapper for the Facebook Graph API that integrates with GNOME Online Accounts. The following packages have been upgraded to a later upstream version: gfbgraph (0.2.4). (BZ#1997941) Security Fix(es): * gfbgraph: missing TLS certificate verification (CVE-2021-39358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gfbgraph. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib/GObject wrapper for the Facebook Graph API that integrates with GNOME Online Accounts. The following packages have been upgraded to a later upstream version: gfbgraph (0.2.4). (BZ#1997941) Security Fix(es): * gfbgraph: missing TLS certificate verification (CVE-2021-39358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gfbgraph-0.2.4-1.el8.x86_64.rpm a87c20bff6e5d12e128387db8895f77c29aecac5b482e7231f2b406409156147 RLBA-2022:1818 libnotify bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnotify. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libnotify-0.7.7-6.el8.x86_64.rpm b77107b01be0756468f03b12b034843555134ff13043edfc9e0e4ff1a048cd99 libnotify-devel-0.7.7-6.el8.x86_64.rpm 0a3e2b1920bcf1cc6cb537d4365d32e4e11d85b7a484eff139d61156db594de5 RLBA-2022:1822 ibus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ibus-1.5.19-14.el8_5.x86_64.rpm d640b203a5d7f39666096bd8f6431de2754458602329d3ad9e0cdda2149127a3 ibus-gtk2-1.5.19-14.el8_5.x86_64.rpm 17fb91d21b32c0eafce99b60fc54f24908f5296dbf505f5d865cf0c8478f4d2b ibus-gtk3-1.5.19-14.el8_5.x86_64.rpm d6616deb0b59c7ffb51448f8970150cc2569882c1a796770734a1f54a4209a22 ibus-libs-1.5.19-14.el8_5.x86_64.rpm 55ec665058ffe34aebd18ce73c6f723a7653a852f4e5f6bf8290a3d1e0048e5d ibus-wayland-1.5.19-14.el8_5.x86_64.rpm bd1554851ebce67c9961e0d1dfa0a847f8aad00fb24993ef8ba0dc384b5a206a RLSA-2022:1823 Moderate: mod_auth_openidc:2.3 security update The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786) * mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791) * mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792) * mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mod_auth_openidc, cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786) * mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791) * mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792) * mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102 RLBA-2022:1827 librdkafka bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librdkafka. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms librdkafka-0.11.4-3.el8.x86_64.rpm a4b09561b1efb5a87696b0604671810e62aeca4dcd470ec07b9f0e4c0f677b19 RLBA-2022:1829 virt-viewer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-viewer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms virt-viewer-9.0-12.el8.x86_64.rpm c8ab81e91ad618ba06c071cd61b6445eff11083e644705ae4cbaf2c0738ff7d5 RLBA-2022:1834 pesign bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pesign. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pesign-0.112-26.el8.x86_64.rpm 60dc0388fc7f3541b208ef7084efa30bf0aae086a5874efaf751cab420bd4b8e RLBA-2022:1838 nss-pam-ldapd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nss-pam-ldapd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nss-pam-ldapd-0.9.9-5.el8.x86_64.rpm 1c7a0729e994b202a859ea9c573239de2e6f62ff4a20c907d5e7f626e8b3d313 RLSA-2022:1842 Moderate: exiv2 security, bug fix, and enhancement update Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422) Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for exiv2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422) Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms exiv2-0.27.5-2.el8.x86_64.rpm cfc76de579f2e1df9d8f0a31087465508607573be2a4b0955dae956b542ce538 exiv2-libs-0.27.5-2.el8.x86_64.rpm 6b50be335ac80aa78e50ecd8a69564ea80b5a0cee93e48b74f5061c7d4e390c6 RLBA-2022:1855 mesa and related packages bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdrm, libglvnd, mesa. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libglvnd-glx-1.3.4-1.el8.x86_64.rpm b01e2356538e6d15e2eb5b21902e6ed0b400186bac257c2d13a2b5cc9d2ad4c6 libglvnd-1.3.4-1.el8.x86_64.rpm f1163ceb211495b2a91499a2141c16733e43d7c66693e32d22fd820149258df0 libglvnd-core-devel-1.3.4-1.el8.x86_64.rpm 42500c9215dd43b4e96fc7e43647dfa84b9da8733ae83dadbbe261bac9861c63 libglvnd-devel-1.3.4-1.el8.x86_64.rpm b4ca66f315566cde4f6937b8c22f44326ec74e330807658fd83b0b1aa47ba5af libglvnd-egl-1.3.4-1.el8.x86_64.rpm 2ef9230943c2926f32bf154b8e658fffcc0d688581c7336501b28b959f21bab6 libglvnd-gles-1.3.4-1.el8.x86_64.rpm 233c89561015a077d8233167b5ae05346ae76c8bc01a8b60cbd21a24c0c44f40 libglvnd-opengl-1.3.4-1.el8.x86_64.rpm 09abf13b00e3ed08ee9c785a6387b55ae1104c93e9d27797d6ace76080bbc4e1 RLBA-2022:1868 freeradius:3.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeradius. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__freeradius freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 1e8b3b99d9fc3b5342025649b5896806e159286d54e6904a98791df010bef14f freeradius-devel-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 70f19035db8bc4a89bc155e860276414d9458861c130acf2c11c13f86b3b91c1 freeradius-doc-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm f3c8b43ec991aa6dc7edc64348c8a23e8bff4adba392b62707d9b44199ba430e freeradius-krb5-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 27b16326b6c4650e7e0c33027b2fadb02f4a10311f13afc38eab9d5d7cf5b556 freeradius-ldap-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 2ad0a32f55c4eddd09aac0c5185a7e88ef5fe062df601c07925b50ef93a367ec freeradius-mysql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm a9af343bd4e84800c15760b58c83f2a161756dd1df1b8fe5fa825b02e2ea9089 freeradius-perl-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 8485e5f25b08399e5bd292fb848281c058edfbe9b4b8e5f569cd8f12e8e0ac09 freeradius-postgresql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 02fd34ed5aac035cf2bbe5e520c79be88ff0432b89b7dcdb60fb611c807c1680 freeradius-rest-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm 4c341c6244c5fa2d45b62da76cd4dc23c6cbe3b32d0f42722486960f3d767f33 freeradius-sqlite-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm c6a11c1d56dd96e69867d49c91a1bd1ed95d429ebca2e5a63b9f7487a6a4aeb6 freeradius-unixODBC-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm d1c7b7b0d12278c9ac2aa57a4e9a5fa87c49e2840458cf10542f3b0416c3e198 freeradius-utils-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm d72976b00fbf0c97038a8951eea8444e2dd9cdc9e583bd873ec87dfd7cab6977 python3-freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm e3ef89fceddc589a575ade624e50f9da072396c0b860ef217d5b166b1ebbb45b RLBA-2022:1871 corosync bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for corosync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms corosynclib-3.1.5-2.el8.x86_64.rpm 7849214cea901afad69a3246b2548cf903ba9714faeb24bdbec52342fe78ac48 RLBA-2022:1872 gcc-toolset-10-binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-binutils-2.35-11.el8.x86_64.rpm 23f870f3c02d15a65fcdbd64c5090f526ca6ddb157ac297e2c914d0d1bc25231 gcc-toolset-10-binutils-devel-2.35-11.el8.x86_64.rpm 5c4e4cb0067ea909a4a0fa13385cc9978afffdc01f2a7c5c55ba42bf5ccc7262 RLBA-2022:1873 gcc-toolset-11-binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-binutils-2.36.1-2.el8.x86_64.rpm e4de3c87cb5ed806dbe98810514d659919aa53d371e56ade88f03f412a25cbbb gcc-toolset-11-binutils-devel-2.36.1-2.el8.x86_64.rpm 3e2ac4ad76bdbe5c9c1f39fd49ee626211d9e58282b188ee2464f9b75324986f RLSA-2022:1891 Low: libpq security update The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. Security Fix(es): * postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libpq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. Security Fix(es): * postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpq-13.5-1.el8.x86_64.rpm 871c6b4ca25f1c2d48340cf813ea64a4f100249f6b5826bc2a9b1d1d375831fe libpq-devel-13.5-1.el8.x86_64.rpm 59f455a4b0422a4618ca16c3e22854c86fd67e80e1c79a0887d678e909e2c677 RLBA-2022:1895 libecpg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libecpg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libecpg-13.5-3.el8.x86_64.rpm a4e29a1002f40223c0380a1fd3a6257f4a9f76b97cd17641afe19a564f219a93 libpgtypes-13.5-3.el8.x86_64.rpm 2fdebefb15fc6e9104d0008a93f0e914a853c7a4806e4132395b21cda066d823 RLBA-2022:1899 spamassassin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spamassassin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spamassassin-3.4.6-1.el8.x86_64.rpm 9e5317a0af1ce3815d80fbb4604e16d7ecb8bd9deeff0167ad037ac5ac004e46 RLBA-2022:1905 gcc-toolset-11-gdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-gdb-10.2-5.el8.x86_64.rpm 507fd1b65448322eb4f7be5b9bc505287e1c57ef187a4547c687f517e70e8968 gcc-toolset-11-gdb-gdbserver-10.2-5.el8.x86_64.rpm 4672600d290a3509945c9330e81420f0ad327bd98da8cb23f68d12fd53c83274 RLBA-2022:1922 mdevctl bug fix and enhancement update The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdevctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel. rocky-linux-8-x86-64-appstream-rpms mdevctl-1.1.0-2.el8.x86_64.rpm c9b7910936d7fabc88c66452df359e90494a2d3ebc7f0ba8bb07ecc66c7cd9a5 RLBA-2022:1927 mozilla-filesystem bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mozilla-filesystem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mozilla-filesystem-1.9-19.el8.x86_64.rpm dd82ce2bc279b2c69a478f85b58431ffa2c4b152f9a2751c6553b8ac3532fc05 RLSA-2022:1935 Moderate: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Local privilege escalation via PHP-FPM (CVE-2021-21703) * php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Local privilege escalation via PHP-FPM (CVE-2021-21703) * php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLBA-2022:1937 gcc-toolset-11 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-11.1-1.el8.x86_64.rpm e09d7949c64eebf62003d85a59868b567fbde7b2237bcceaa14a3149b303d2d5 gcc-toolset-11-build-11.1-1.el8.x86_64.rpm 1025dd8704d707157905fed44971dc96e2893698b993b94db993ee2ec971b761 gcc-toolset-11-perftools-11.1-1.el8.x86_64.rpm d32231d4a47739e03ce4fc39394d26413e5844554c7e93b37c5c8eb434826c61 gcc-toolset-11-runtime-11.1-1.el8.x86_64.rpm d57f1b8ca87240cd4dbd58f549e85673c39be4ae19c5890ac297c2235c96f9d8 gcc-toolset-11-toolchain-11.1-1.el8.x86_64.rpm 20b579e339bc9e8eecaaa22cf1e75b1beb722b0cdecfb97587642614409e3647 RLSA-2022:1939 Moderate: squid:4 security and bug fix update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm 7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a RLSA-2022:1964 Moderate: fetchmail security update Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client. Security Fix(es): * fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386) * fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fetchmail. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client. Security Fix(es): * fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386) * fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fetchmail-6.4.24-1.el8.x86_64.rpm 684c206b13c58381b25384d7b4b66507cc796811c738a4356b5b91904f4e9210 RLBA-2022:1965 plymouth bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for plymouth. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms plymouth-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 00b086a9069c7f5eb967de8f56e31c1560bb0e49d5c28cbc95b7f921d713f0a8 plymouth-core-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 76ae32a05325b0c1bb3907f4a90cc8f8468fd8c81815eac54d5fe9242c1d10dd plymouth-graphics-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm bb4826aa5ede058a2253013b199fd6531e53e96786b40e33b8057617c9ca24d9 plymouth-plugin-fade-throbber-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm ba76ac771f037ca36c4619df4be0b37c46cf4cee9bf512ec6d07d6bce6a4b102 plymouth-plugin-label-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 181eddf9e8a7b96fa5d7150a703f7d603d7ddd43ce1736943c17c2400c29c114 plymouth-plugin-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 82b113585a40bd7677a0ee48df618096dc991987ab52a49b72809714134bfb4a plymouth-plugin-space-flares-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 2ffb9c0ebf8bfe32100d18ebbbbc106f5cf96d7b69f36a341c63ca1bcc578d22 plymouth-plugin-throbgress-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm d0fbc8b21f3a8fdb6c2504d276f47eab45e99dcaa2fbd3bdb528cdd9019c1762 plymouth-plugin-two-step-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 4d7d08bdf934fc99bde6c8ccbad38fe8daa2447c52b5868a002c7c8420757aa2 plymouth-scripts-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 2477fb861b4aa2cf66a64457d3785549ae4c72f6da4dde2ac6c13763c84ce2ba plymouth-system-theme-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm d8dc8eb03f4b4a505124e7eada3974a8b912e5b14840738854575203e175691f plymouth-theme-charge-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm b47cc533faf9caee9a6c824572f08774b47281973a986d5f9f59e61aee973a1e plymouth-theme-fade-in-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm b7e8e98d969700edd6ecea353ccb9f5cc1ed4d16535bf0bc31185f84ad1bc49c plymouth-theme-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm b51b3692c1c547df089297070953537cacb7eecf0ff4134698e3201183c6d184 plymouth-theme-solar-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm a0db572c9a96cd00d6e678bebfacff850925ecc06928601bdd395e536e7c3694 plymouth-theme-spinfinity-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm 6c5560e1521809493b6baab6ae08adc77b574538721dc2f9601a3676c554604d plymouth-theme-spinner-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm ac40b96199a4f11778bbeb3bb774babad457275d85feffb3931d4768d234b5de RLSA-2022:1759 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355) Security Fix(es): * QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748) * ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285) * ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286) * ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287) * ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289) * ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266) * ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267) * ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268) * ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269) * ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251) * ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252) * ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253) * ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254) * ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255) * ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256) * ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257) * ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258) * ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259) * ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260) * ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261) * ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262) * ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263) * libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485) * hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) * nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716) * libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975) * QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145) * QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158) * QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355) Security Fix(es): * QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748) * ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285) * ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286) * ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287) * ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289) * ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266) * ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267) * ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268) * ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269) * ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251) * ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252) * ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253) * ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254) * ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255) * ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256) * ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257) * ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258) * ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259) * ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260) * ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261) * ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262) * ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263) * libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485) * hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) * nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716) * libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975) * QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145) * QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158) * QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d RLSA-2022:1762 Important: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 RLSA-2022:1763 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm 49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12 python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d RLEA-2022:1767 nginx:1.20 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__nginx nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 8b9098490e0ed579ef134c2c7e9e47fae539d6d5242e50d33138965f578345cc nginx-mod-devel-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 1bef73d9ec96e3ea6dbc20bea0dab1a592f5fc5afc14aafe4179ac9ddc81dc79 nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 22ac42d3d46d47b8a58587447b601e7609f0f66c75346558c7075201e24c1b47 nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm d906cd3b87784901f32f1ad92120afc85c8b21d9dec7f08c1a0f5ce95a217256 nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 38f76d35fd980728308e94451574909e04fc39cecdbcdb9e0db195cfa2101bbc nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 7e8970264c09a96068a63b604e536a5e9c36636d45352158be17327f1fa8a3f7 nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm 7d251e53fa3837429092951a3d2fb89c1439ac9798ae72a0f7ee86dc2548c75f RLBA-2022:1769 libgit2-glib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgit2-glib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgit2-glib-0.26.4-3.el8.x86_64.rpm d1edcdc02b09b6d0bbea2ea82193f142fcd5a46d65f23b033c9a73ecfad6006d RLBA-2022:1779 usbguard bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usbguard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms usbguard-1.0.0-8.el8.x86_64.rpm d0744bfbb307d7373e66581992f59b65d2bc6eeab255998e4381db97daf9b32e usbguard-dbus-1.0.0-8.el8.x86_64.rpm 70124d46923db66036b4cc4124524754b889bd02fe7d1ce90a767ca7ba245126 usbguard-notifier-1.0.0-8.el8.x86_64.rpm c4fb2066028324a13f65fb5413819cc016084822aa6d808b81da0a1829face57 usbguard-tools-1.0.0-8.el8.x86_64.rpm 1968b7e0ed6e8504071df5dacfb780cfaa42667009563a9256ab2ca245b09742 RLBA-2022:1788 jq bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jq-1.6-3.el8.x86_64.rpm 2195fdec718ee82c3274825465f936cd3b2457323da254f681e77f9883e0e5ef RLSA-2022:1793 Moderate: container-tools:3.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 RLSA-2022:1797 Moderate: compat-exiv2-026 security update Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for compat-exiv2-026. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms compat-exiv2-026-0.26-7.el8.x86_64.rpm 78164a9e0f93342ed57af835a136e2d845c635b614a5c9464778a78d4cfcab43 RLBA-2022:1802 gcc-toolset-11-elfutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-elfutils-0.185-5.el8.x86_64.rpm 945d9ae78b45022525fa7d11189f3745e1b7d071d13ca2923f9ebfdff7b0c979 gcc-toolset-11-elfutils-debuginfod-client-0.185-5.el8.x86_64.rpm 70192dfdca07e1c592b29582ce1be8c30ff08b0f302551f8a3ffe7dbcdf2993a gcc-toolset-11-elfutils-debuginfod-client-devel-0.185-5.el8.x86_64.rpm ca7b65fcf980bc7d5e81a50ca4b99f380458289c580093cc7afff2b339763e8c gcc-toolset-11-elfutils-devel-0.185-5.el8.x86_64.rpm beba053cc78152742b044218e4c2e5cc23de10ded7746bfda094d93694392c92 gcc-toolset-11-elfutils-libelf-0.185-5.el8.x86_64.rpm 49a8d44581c79eaaa4677a61a41e43542085da9aceca8544d0d882294f151ec0 gcc-toolset-11-elfutils-libelf-devel-0.185-5.el8.x86_64.rpm edbde0836414eeb7484506c342e1ba1b991aa3e0edc3b1796718aa9d8a1a4d86 gcc-toolset-11-elfutils-libs-0.185-5.el8.x86_64.rpm 796dd175cba886d5a8de41243bf75e1dbf212801fcdd4a64361f6f5e4bd344c4 RLBA-2022:1803 fence-virt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fence-virt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fence-virt-1.0.0-2.el8.x86_64.rpm 76c7d89484468bf87ddaebe27482659d8034dff50f29182fbda8edcf2ba2ecf1 fence-virtd-1.0.0-2.el8.x86_64.rpm f4aa67de39a9ce7c6fa45fdd7f8210c8f3b93cefc300a1600aee9ddd61cc4182 fence-virtd-cpg-1.0.0-2.el8.x86_64.rpm 3b3dfc81f909a2e420d6cb5c0362e467634306b3933cd9c659571aa34fd9c231 fence-virtd-libvirt-1.0.0-2.el8.x86_64.rpm 5c5678b035ddd27c35cc0fb2fc3c1ffb7a47d39e34e96ce51cec9d09980efe64 fence-virtd-multicast-1.0.0-2.el8.x86_64.rpm 66e6ba450474fb77e5a22d22de79c20ce3207bf768db31776ad7667519e17378 fence-virtd-serial-1.0.0-2.el8.x86_64.rpm 8edc8ef1d257d76b4bdc3694b7077724c21a7138fa92252294dcf6ca70fc31ba fence-virtd-tcp-1.0.0-2.el8.x86_64.rpm c67ee2384ba6ca843e8d988552f624c92ca4e2050e54ee64208082c35b736546 RLBA-2022:1809 tcsh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tcsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tcsh-6.20.00-15.el8.x86_64.rpm c23f4421eb59f2a1f06c6956a2972b13f3341529d1557d5e2ef2d204ef4cf5e5 RLBA-2022:1811 ypserv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ypserv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ypserv-4.1-1.el8.x86_64.rpm 077ca96ec9ba1f447a80706d068c4f84284b4a8f982961f0e229f316d64a31c1 RLBA-2022:1816 new module: container-tools:4.0 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 RLSA-2022:1820 Low: udisks2 security and bug fix update The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for udisks2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libudisks2-2.9.0-9.el8.x86_64.rpm 13a2d984b5d4a21f35ab57ddd95914c27ccc916993620b4dab9bbd697ee2911a udisks2-2.9.0-9.el8.x86_64.rpm 5d4821126edacaebbe000dd9896ebb8dc63993f6f5da7e689e9968f946738a22 udisks2-iscsi-2.9.0-9.el8.x86_64.rpm 56eaaef8707e7c62a15fb4ce052a398cca4de48677e8ef3b7b9d10e96184cce2 udisks2-lsm-2.9.0-9.el8.x86_64.rpm 375eeb6adab3d131e8d96cbc816da721444799bcbf8f60c6b45d7b0f23016578 udisks2-lvm2-2.9.0-9.el8.x86_64.rpm b9ad578c257ddfc2788078ef33be243cde33c0a9f6793529b334c2ebaa860412 RLSA-2022:1821 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python: ftplib should not use the host from the PASV response (CVE-2021-4189) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python: ftplib should not use the host from the PASV response (CVE-2021-4189) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm 6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.x86_64.rpm 1257203382679fe9daa7dee565a99b8ffdbcefd743bda938d3facb7c15e9a571 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9 python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 RLBA-2022:1824 gcc-toolset-11-annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-annobin-annocheck-10.23-1.el8.x86_64.rpm ddf7846e76fa48303cdd2029f4206cef963671e30f1e375d4dd02d8441df3243 gcc-toolset-11-annobin-plugin-gcc-10.23-1.el8.x86_64.rpm 07d28a08396431cbb871eae01a77fb6b37528d86320a1aa7b8ae3589e113e3c3 RLBA-2022:1826 sshpass bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sshpass. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sshpass-1.09-4.el8.x86_64.rpm 52ad1cf18599607e0a1a6010acd13d3f6ebb97f89523896db7b5758a207e41e5 RLBA-2022:1831 postgresql:12 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLBA-2022:1832 postgresql:13 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLBA-2022:1833 inkscape:0.92.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-scour, inkscape. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__inkscape inkscape-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm 99fbc2bc4c7cb4c339ab096f89359ea28bbc9324b584a62cd23d89c2fc7fcd51 inkscape-docs-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm 903c394461f3f339c0c1881d384ad702f33e682dc2bd7b118641dae07702bb75 inkscape-view-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm e021d3d754d7b16da3852a2d0ee69b05cf3e06d5354f8fb6050c72a7c2af475b RLBA-2022:1840 gcc-toolset-10-annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-10-annobin-9.29-2.el8.3.x86_64.rpm 78d18254087a9645cd5c3ab866058af10025caf2192a6fc77e1aa94ff1af9a8e RLBA-2022:1852 fido-device-onboard bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fido-device-onboard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fdo-admin-cli-0.4.5-1.el8.x86_64.rpm 0b4d42006f2771bf69064e0f5c0760ccb4a501707ebdb8109b690623f9c13287 fdo-client-0.4.5-1.el8.x86_64.rpm 771890a1d457afd6b520fc64f6eb22395791ff9aa648741ebd4639e1ae5ce237 fdo-init-0.4.5-1.el8.x86_64.rpm f3a2ca65e4946f41048b2e57277e8101b597e61a0ea22ac7ee891bc08eac6189 fdo-manufacturing-server-0.4.5-1.el8.x86_64.rpm 79ec5f43b0adceefe49d81473ff9e1a67e83cc84bfc4c6d5caa392246535336f fdo-owner-cli-0.4.5-1.el8.x86_64.rpm 3975e1444499f5da7d4c92f7b5a76b75a0aa4e0f5a7c000ef2f9bdc9fef63553 fdo-owner-onboarding-server-0.4.5-1.el8.x86_64.rpm 5064445c720560843ac32fa04dbfca0bb4adfeb36a8117d1cf90b7a292aaae01 fdo-rendezvous-server-0.4.5-1.el8.x86_64.rpm 45d55ff49176c1387639103a20d31fdb1d7acc3b0aa682c733ebbf520e6d5dbc RLSA-2022:1861 Moderate: maven:3.5 security update Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__maven jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpm 86a01e3eab084e992222cf94a07c1591b41cf818904e7472d549b3d9f4fd2efa RLBA-2022:1878 git bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for git. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms git-daemon-2.31.1-2.el8.x86_64.rpm 1172b644c3b23ffeae9a503dca48a343f697f371a77479522ce92c5a63ba4d87 git-2.31.1-2.el8.x86_64.rpm 0539d1de6615e832592ac547a7ccc3a7a7cd8a134d4ba4fbc7be791a0c61ed6e git-core-2.31.1-2.el8.x86_64.rpm 17b04d086666e514b8f7bc9c81a0e3c97d924b8ad1c5171dfaa12e12286f7701 git-credential-libsecret-2.31.1-2.el8.x86_64.rpm 8867bbe1b88d44b70ae0ca8059b138885627b416874044732797a0288eafd500 git-subtree-2.31.1-2.el8.x86_64.rpm 69b10ce2ae22f6ce41c4bb3b1d379d21f46685b42440c9c540351653e78174f2 RLEA-2022:1884 idm:client and idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2022:1889 texlive bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for texlive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms texlive-20180414-25.el8.x86_64.rpm fca0165b3f00ccbee923dff753995b6b6ceedf08fb38d88f524ef4da2d4112e9 texlive-bibtex-20180414-25.el8.x86_64.rpm f64cbef8d54f64fed525e64ba5211cb613417aa9111b22f1efa7d5fda84e1085 texlive-dvipdfmx-20180414-25.el8.x86_64.rpm e0e256a8933512a4538f08a24c98eb7cecde65159d6557cbfdc20c5d7d64d2cc texlive-dvipng-20180414-25.el8.x86_64.rpm ba9da0905b5eb35c2132251e289b4a678b4fe64cf63a20334cce10b4377e03f1 texlive-dvips-20180414-25.el8.x86_64.rpm ae5ef7c07d69ca9468b9277d2920ab38a1ca9a7a16944a6cb61fff708010229c texlive-dvisvgm-20180414-25.el8.x86_64.rpm bd712ec77ae18d3ba1e1e5acadd71c603c5f0859d96ff46524f287578406628a texlive-fontware-20180414-25.el8.x86_64.rpm 3ec4004806a8b3d3af8f4d98e282998837882393dae947be60e49d863a0fc479 texlive-gsftopk-20180414-25.el8.x86_64.rpm 0774bd23840df0f8b8741c7aa4ad47fae98db9ef4ee089a6e4bf60022f261862 texlive-kpathsea-20180414-25.el8.x86_64.rpm 76516edd4f5c824824220b8b1da6741ad6ea0942d2716bfc7e88080cb2d5dbbd texlive-lib-20180414-25.el8.x86_64.rpm 2522f9d127bdbf59caf4ba91384c3e0320e943b9fa208c9cd5c24d48a0dc7fab texlive-luatex-20180414-25.el8.x86_64.rpm 86575844bd8ce4a907bc232527ceb5db896ff9038c8e85e5f83d0b2c16014387 texlive-makeindex-20180414-25.el8.x86_64.rpm f9778abcdc837430ccb9061d9852f09ee58759c56c0a57231dde5dc73ba98e8e texlive-metafont-20180414-25.el8.x86_64.rpm 97c7ab08597695d91071bb5985161fb06df6ce46e97ced54da5240706cf19e75 texlive-metapost-20180414-25.el8.x86_64.rpm 5cae1b2f3337ad06119dbc9343ab651ecf9e0daea063633b8fb4ba22516511d3 texlive-mfware-20180414-25.el8.x86_64.rpm d0c5b0857db638d86cf7ba0ef35b997f1519cff0eea56791caaa66b57f29a90a texlive-pdftex-20180414-25.el8.x86_64.rpm a46d20c3a65f36dfc65761712b979997bcc89891b775fbca457f969101c23503 texlive-tex-20180414-25.el8.x86_64.rpm 7f7d031f477f4a95aa1a88b4f88ca0d06026ec6a3920afef1c5e6f063df0b8f1 texlive-tex4ht-20180414-25.el8.x86_64.rpm 3fc0fddcbf11aa8933f47502decef9800ae973cc7673fd23b7084fdd450cc020 texlive-xdvi-20180414-25.el8.x86_64.rpm 6e413c15fc26329f8eafeeeed53cb6b0d4f4a9e6629210c7d4f66c6adf9d2905 texlive-xetex-20180414-25.el8.x86_64.rpm 80cc7e19c1c545758bd2879b21c8fe0f4f96555481ba1c8d265ec064bc0a2bfd RLBA-2022:1892 sysstat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysstat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sysstat-11.7.3-7.el8.x86_64.rpm 18ebf39527982354ecd4e9f241cb0ca214e9c626ff13d63897a0ea0b2ad595d7 RLBA-2022:1897 gcc-toolset-11-systemtap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-systemtap-4.5-6.el8.x86_64.rpm 44a368e9fc0ad89c1cab208712d6edd8b070b3dd41e9ca9a059e8a6028334499 gcc-toolset-11-systemtap-client-4.5-6.el8.x86_64.rpm 2a2aae7b383978ea9e1854f2ab4f842f2d2476dc07a580c70411b51f7afbcab9 gcc-toolset-11-systemtap-devel-4.5-6.el8.x86_64.rpm 1e2851383fbd0b0a3aaf1ce1c36ed3c4a89b5ed4289207308b5224bbc94c8b22 gcc-toolset-11-systemtap-initscript-4.5-6.el8.x86_64.rpm 21b8c938af2bbdc4d410e32fd36feb852293565b1e22069a62562cc385b627c0 gcc-toolset-11-systemtap-runtime-4.5-6.el8.x86_64.rpm 63f6d86581cf4d3949da19fd4033ae6df34a327a1e116bac053c8c09847f0a78 gcc-toolset-11-systemtap-sdt-devel-4.5-6.el8.x86_64.rpm 3933f9ea0548a4cd585056f115026c3aed083178106b846ea77475121e94ea3c gcc-toolset-11-systemtap-server-4.5-6.el8.x86_64.rpm e6a168197e3cda466086095cb04a170d69b909d9f19c813dde906c9f48f3c51c RLEA-2022:1904 new module: php:8.0 This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 RLBA-2022:1909 spice-vdagent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-vdagent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spice-vdagent-0.20.0-4.el8.x86_64.rpm b3605bc678dc36fdc5ced1b865e1fa1437222171da80645ff01e2d9cb88205ea RLBA-2022:1914 libosinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libosinfo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libosinfo-1.9.0-3.el8.x86_64.rpm f5860ea3eae997c4028830f13a0d0f78333d9ad5a20953ed3455586af8c2b197 RLSA-2022:1915 Moderate: httpd:2.4 security and bug fix update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193) * httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160) * httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224) * httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193) * httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160) * httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224) * httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm 4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLBA-2022:1918 webrtc-audio-processing bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for webrtc-audio-processing. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms webrtc-audio-processing-0.3-10.el8.x86_64.rpm 2842620f64a4b5acf00d61cb3ae4d86a42605d5e9084b7bbdbcb125cf3b2d594 RLBA-2022:1923 gnome-session bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-session. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-session-3.28.1-14.el8.x86_64.rpm f581f6dc06c1c8738281641dacd0d9f0e19f1d534da0d2faaada8f5cc892e39b gnome-session-kiosk-session-3.28.1-14.el8.x86_64.rpm b818bf62e55ce8a88a3ada3af7f3c33a5fe47848814cc0651137b9727edad179 gnome-session-wayland-session-3.28.1-14.el8.x86_64.rpm dea48ea5a779795ba234e782bde1bda745f23e91d796e38c950c7d575c617e32 gnome-session-xsession-3.28.1-14.el8.x86_64.rpm 92930d1b2a3373ee484493ba6f32dd8323c3a5ae3d237a4a2a58cadccb5eea85 RLEA-2022:1926 libreswan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libreswan. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libreswan-4.5-1.el8.x86_64.rpm 28ccbf755030a96bbc1a660229ee3796060f067345edd60000b459afb72bba24 RLBA-2022:1929 gcc-toolset-11-strace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-11-strace-5.13-7.el8.x86_64.rpm 8340fd0cefab9e5f9104cbba5427b8a30afc390ea304d84589004a961a5273ae RLSA-2022:1932 Moderate: python-lxml security update lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-lxml. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-lxml-4.2.3-4.el8.x86_64.rpm 10e104ac88f0773f495df99f033e9fc933362a6371329d9c392d96d43c766b5b RLSA-2022:1934 Moderate: mod_auth_mellon security update The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server. Security Fix(es): * mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mod_auth_mellon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server. Security Fix(es): * mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpm 4e2af6902d8948be02387c6a9ce5db3423f38ce4f60913a06e463b6ce72e7b87 mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpm 7b1ffed1c79ced0755d2f174d7e67f5d933ad0cc601c2c11f0010cadb54fdc3a RLBA-2022:1936 vsftpd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vsftpd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms vsftpd-3.0.3-35.el8.x86_64.rpm a1e5698fa330881ab4899757f583b2712629ee295d2eda043d1bb37fee955838 RLBA-2022:1938 hostapd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hostapd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms hostapd-2.10-1.el8.x86_64.rpm b9ac29f6c6ff5e0efe5bf53898c16c3d104f59445268e4f10f39b2efec8322e5 RLBA-2022:1940 egl-wayland bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for egl-wayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms egl-wayland-1.1.9-3.el8.x86_64.rpm 5863f1d68d29762f4265851a4583037e8ff0d6cd00962e7dfbc96c9d941e3c0e RLEA-2022:1943 pmdk:1_fileformat_v6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pmdk, libpmemobj-cpp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pmdk daxio-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 963751bfb649f95591c1808f358a112d41536259e0323cf9f86d2e69a8c05db4 libpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 19f3938519fdd148bd78ef3ec13c2e1b604a901b5fe1f82d99cb6673aff0a0be libpmemblk-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 465a9e4c0f257f572f3bd0379bb9d6cad2692a87617268e36f47ce9960fb9e3c libpmemblk-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm b7a4ff7a843998c42d1a2a8d531ca2ec845b9d6fd6e0149d63d352c0db731b59 libpmemblk-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm eb818cfc5f415610acbfe575931a53b9b26335b6b8f948da35b6593a94cabfef libpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm d269a75f3c76f836a86ac7ddaeb69b1371e6aa82706c34718968b3675f5a6e41 libpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 68ca3f7c0c3379900aedc8162d5ebf8322d73c61c7463f5643ab498329376731 libpmemlog-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 2095a586118d758554389b640f9429064c1c17f895833837765197c32f57fd3b libpmemlog-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm e5e45f30eeac5359ee8c456839d01f3cd536af8530e8ac6a131cb7748c009bb2 libpmemlog-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm d18d39c058d5c8a4c1cc15bc82c845a50c967ca59d9f8ce5e0ead104fa77ec8a libpmemobj-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 764fa3f5c3ac2e3773ff03d951d1c61ce679d612aa330bf946916c4fb802282a libpmemobj-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm a7f4fc10d017785d12c618eca0227a703b11e7e2d89f3f4c8fc16188afa26bd0 libpmemobj-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm b9883c286082e87a4f9d48953ad92d5d074158a71a1d4699be165d044b6fb600 libpmemobj++-devel-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpm 534a08c1946cafdceb3afd81823bc2fc23c78f7cbe75be848ae4c480a1b44993 libpmemobj++-doc-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpm d39e51c9f69e29b7119cc33b7c9a0096cf56f79af085c9e582ddb96354b44184 libpmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 173613ad2dc1a6366d24019f1dcf276ab1810942f7fdf3220b68cc33866e9e3f libpmempool-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 70be05cc99ef64babf20fa1fcc0980ea20d28339ef02a93e78af182121dd4897 libpmempool-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 32bbfdf69bc4823362c256cdf4b395326d1239ca05bbaeb5c40de0729c6b8c4e librpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 089e2693ebe7733f5effa2d7420443ff28ab4829cbcb872a5b92315b238d04a8 librpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm cc4326c2ab389c18c9756da388baf4aa335e2924fc3ac88fa941f02c76271d16 librpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 7660ae7f67e41540e0421fbfc959f65821e588e8348e1039a183fbc3f80eeb20 pmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 894f1afb6e937152a6980a230fae9210cd06c9d91e1a38eb23c89d9a498f3165 pmreorder-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 2fec02e2edf426bd5479c35d56b3e17b339d9173390e6e3be1b5576640102160 rpmemd-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm 22a93397c519e9e66e037bb007698dbc706a4a25aa6cb7ed79dfd18e2e6bdf99 RLBA-2022:1944 netpbm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for netpbm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms netpbm-10.82.00-7.el8.x86_64.rpm 8720cb93f3bd6269e53e9f53aee095bd9c658891536e3a4c27e64eeee41b1322 netpbm-progs-10.82.00-7.el8.x86_64.rpm a19db72d87f18fa35ed3217c757ef60b46df7d80449c61645ed6ed8bef2a9d96 RLBA-2022:1949 python-pillow update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pillow-5.1.1-18.el8_5.x86_64.rpm c3b196ec79ed44cbba9c193e5da4687349ed47692644581fa5028742c74ff5fc RLEA-2022:1957 perl:5.32 metadata for the Rocky Linux 8 module matrix (4/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm 5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5 RLBA-2022:1959 scl-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scl-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms scl-utils-2.0.2-15.el8.x86_64.rpm f4811fcdee1d82ecef667fcb852ee1d16d2c7113b01f106e09d0657e12dd4f34 scl-utils-build-2.0.2-15.el8.x86_64.rpm ac75a2dc62e0263cea333b700d9129a14875da4e5bc77bea3a1107d6ebfee9e7 RLBA-2022:1960 gegl04 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gegl04. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gegl04-0.4.4-7.el8.x86_64.rpm 48ae7950b7af2b4fa21076f8f1d60551a931a3a27d0260736501d8d46b0b5cfa RLSA-2022:1961 Moderate: cairo and pixman security and bug fix update Cairo is a 2D graphics library designed to provide high-quality display and print output. Pixman is a pixel manipulation library for the X Window System and Cairo. Security Fix(es): * cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pixman, cairo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cairo is a 2D graphics library designed to provide high-quality display and print output. Pixman is a pixel manipulation library for the X Window System and Cairo. Security Fix(es): * cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cairo-1.15.12-6.el8.x86_64.rpm 7fd42a923afbaebcff03073c443235685e4094ef7eab8ca48c8043d198b92673 cairo-devel-1.15.12-6.el8.x86_64.rpm 438d6899db8d75f02ae86797acdf9e157a38814214b60a8c8a43a2174100fec1 cairo-gobject-1.15.12-6.el8.x86_64.rpm 6828a209878746c228c9902843e0519407eb9cb8a3d204346a68833e9321ce8a cairo-gobject-devel-1.15.12-6.el8.x86_64.rpm 9fa96b78a8a7f6114db6763d6f1f83d3a435ea0b2175914e79ec4fb70ae55414 pixman-0.38.4-2.el8.x86_64.rpm fba43060573303c7e5d8bf3f65997ab720d2935be48a2910b778ee8e84f5fcc0 pixman-devel-0.38.4-2.el8.x86_64.rpm 07460cc1404bd085931f245340cebd640b41c1fe8596e9683a1167745a18bfc5 RLSA-2022:1968 Moderate: libsndfile security update libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libsndfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libsndfile-1.0.28-12.el8.x86_64.rpm 5e58b32e9b028c3abd837883fbe4ba64dafdd491153e5bcf9c347029a44e3be6 RLBA-2022:1969 dpdk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dpdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dpdk-21.11-1.el8.x86_64.rpm e9f76a1c2e6181c3b851cf29ac60c18b6fbecca07a5708e86d2634bc847f5d94 dpdk-devel-21.11-1.el8.x86_64.rpm d4bc8c11993f1481b73bc15807a1cddcec1ab21c93d13697aaf4a4121d8c166a dpdk-tools-21.11-1.el8.x86_64.rpm ad3014357acdc36548f17ef3005719bb4f7dba1d64b2acdf7a3543c142ee7630 RLBA-2022:2141 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * Udica crashes when processing inspect file without capabilities (BZ#2077472) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * Udica crashes when processing inspect file without capabilities (BZ#2077472) rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 RLSA-2022:2143 Important: container-tools:3.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 RLBA-2022:2144 container-tools:4.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Udica crashes when processing inspect file without capabilities (BZ#2077474) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Udica crashes when processing inspect file without capabilities (BZ#2077474) rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 RLSA-2022:2200 Important: .NET 5.0 security, bug fix, and enhancement update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17. Security Fix(es): * dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267) * dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117) * dotnet: parsing HTML causes Denial of Service (CVE-2022-29145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet5.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17. Security Fix(es): * dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267) * dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117) * dotnet: parsing HTML causes Denial of Service (CVE-2022-29145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm 25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5 dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7 dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm 7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm 4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85 dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420 dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325 dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm 2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969 RLSA-2022:2234 Important: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm dc6f52adf8b10fd6b240c72b5ea1d62e0bbbe3d5bcc47380339117fc1953eb3f subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 802bbeaf38639b1e42096fab308cf1bf8efe3df3a1b3c3720b7a5ac3939b7265 subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm e5c5a44c338f73bb0445575d27aef6a4b1a7d1ae1f7246b7bce10b6fe5782f47 subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 152d3eccdd9928c4d97f5a47117cbd0d224ae5b7c9886e3cb0414f645ad85d82 subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 1837382796e426c99566575486d20468e5e08d54a9feec23a37f37664c105dd1 subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm c019433f83ba3f54fb215c6f1a57e182c582f2f7b5aba6659278fb65bf8216cd subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm a181eeabc6eb2ac08c26cea039b8776703ecd01ee9af67eeddeef97c3765418d RLSA-2022:4798 Important: maven:3.5 security update The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__maven jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpm 86a01e3eab084e992222cf94a07c1591b41cf818904e7472d549b3d9f4fd2efa RLSA-2022:4805 Important: postgresql:10 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (10.21). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (10.21). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgresql-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm a6556d962b8a4f21a234401b79b04dfaa0d5b61827325a20c8ea65f8067db498 postgresql-contrib-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm f279a2e053d7188bae25db22cd9a791bd25f458a03d74cb0628dcaa85c4db232 postgresql-docs-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 87df4cba162d789d39a9523d06ee5feb42b3c481362ca95e556b445e6e29f15e postgresql-plperl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm cfa2703ebbe6afb8a1c428bacc45d8f2f18f153acda6fb288bc2b80bf1df5777 postgresql-plpython3-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm ddb003a769bcc194ab0b637b07ccbc91da7c739cd73fedf9ce4b73c41fc0b611 postgresql-pltcl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm d9a82d23a49cd4b229471121e55d4ff5433b91f06bda8638ba6f8354bcd366e7 postgresql-server-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm bcadbd1180ecfa672f9200bc1ff29e259e40b3b4a1fdf1a049a5fba65f51a631 postgresql-server-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 4e8fb48abd7db1afa17213b156d0e7bb3564cca215f8ae476e45b3d8114a32fb postgresql-static-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 39857f6bcea51fd8cb8377b16ee7b095b2cc7b8b9100c16cde17f540facd1f26 postgresql-test-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 3037b8880b67dd06af7e2984029602733a3143700865544c0615bedd5cc22333 postgresql-test-rpm-macros-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 8dda3e9fef1d774bae73bf59cbf3b1c564dfe692ca7fc7cb60f0a13b7a1b6403 postgresql-upgrade-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm b72c8a51074d3e368fb33e0b20e256a73799d7cb689c40c43a6afcdcadf476a2 postgresql-upgrade-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm 745351bb1da0240458daa4c71cc28bbf516c3b1067e5b344afb80c1553952c42 RLSA-2022:4807 Important: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.11). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.11). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc RLSA-2022:4855 Important: postgresql:13 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.7). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.7). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm 731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919 pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc postgresql-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 5f8b0f083a1c9317df2506cef87ffce359943e65029a35861574bee6915195f7 postgresql-contrib-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm bdb8007dd69d049f90a135191cec910719dbcccb2f71cda1f1ecb4cd646acbc6 postgresql-docs-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 4e69a20363fb0f37eb5d284f8d396a644c8a05b9f0f11586da2e5a95bcdf5232 postgresql-plperl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm e42432f9031923fedfe56d3931c1ad2bd0d6803b95e7514bc922f4f3a8a9e676 postgresql-plpython3-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 4e9e7590fdf7f3e7754a306ab37cc6353c94662a025f95f2121148a9e816806e postgresql-pltcl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 93599fd463b0958889f0a13fa32d36c2541db19d0d1e894fbb8f9bf792a801a1 postgresql-server-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 491ee6cb770d191dff89adb471c3b64810e6ba80e36989a0783ec2a4717f16d5 postgresql-server-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm fb598803af7755dec0375e23b391345d57d70616fac19f6afd6bc6e70bea42a8 postgresql-static-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm ea3065316ff5a9e71a63d1d3c8f3b2fec8096d24492e157c537e2a3d28f4bcb4 postgresql-test-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 730791c8791203248f3a1f0de1f71f9d4c3af466c3cd115bbcc538b33617c8f4 postgresql-upgrade-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm 0c989ec06bfbb47761b85d6631d13fa3150be693ec2c8e34536e7b2acf9b9a75 postgresql-upgrade-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm fc5a01ddfaf607fdf9268ab430711210612faaa36589eb71c23e6b62950c1b2b RLSA-2022:4941 Important: subversion:1.14 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 731bbe79595f494e581798261d3910616e1bcdbae2ef7f981b215453cf5af705 python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm b9453a4cc7f514c6b5d4fc9635d55f1cf4c75dc38cb5f774719646b8d4e57001 subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 117b77bc021f04f14594b64923ba7fc5d339150c0c18bcaac03c2830da8dc238 subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 2089246938eb318f05ba38eeeb5cbba0cf766f9b1d2add194ed624c6123087f5 subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 7a0b71de12a9a00fa90c466b489c01106b0efb79cb41ff2eba7559ae09236461 subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm e08caf8753168202fcb5ed6b9c38e8bb3897bfa19054afb1746cd7ea65d6fd4b subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 2f746f1042536d1ba89f58dfb7530418fc05f4c86af692b53a40239cb12a83a2 subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm af4c11a20b867799fde5ed6bf4dfb553c6904e4e9c46a1824273bb52354920a0 RLEA-2022:5139 nodejs:12 bug fix and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es) and Enhancement(s): * nodejs:12/nodejs: rebase to last upstream release (BZ#2084651) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es) and Enhancement(s): * nodejs:12/nodejs: rebase to last upstream release (BZ#2084651) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm 40c2bd9fc581b3e1911cff31c4448efb063ee0501c11a65ac2d28f1382c54edd nodejs-devel-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm 0dbea4843e50404baf084e6e5e5e92f5b880df36cd1f7fa26a530601ddb6ff96 nodejs-full-i18n-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm dcb7739c0ed9048c9568bfb84a0d3411b019eef17458a5129d54b71ca7e69587 npm-6.14.16-1.12.22.12.1.module+el8.6.0+982+9fdca2d4.x86_64.rpm 144156798b2195a01a827128f54a3e69a1162fbf8a6a56255c8fe4f115ecf1d2 RLSA-2022:5163 Low: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy NULL pointer dereference (CVE-2020-13950) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy NULL pointer dereference (CVE-2020-13950) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__httpd mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm 4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLBA-2022:5325 postgresql-odbc bug fix and enhancement update The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity). Bug Fix(es) and Enhancement(s): * postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postgresql-odbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity). Bug Fix(es) and Enhancement(s): * postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179) rocky-linux-8-x86-64-appstream-rpms postgresql-odbc-10.03.0000-3.el8_6.x86_64.rpm f32a46807101023fc6d8f5287a3bf75409ee0a2ed2e0107399dbf2f0247fd6ec postgresql-odbc-tests-10.03.0000-3.el8_6.x86_64.rpm 42395c2c9708007d6b9e4a81d12e39675d5001010f672d60bcb2c7a116f2684e RLSA-2022:5326 Low: compat-openssl10 security update OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries. Security Fix(es): * compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for compat-openssl10. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries. Security Fix(es): * compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms compat-openssl10-1.0.2o-4.el8_6.x86_64.rpm 598a90725474db12773498e0622b9370467f94e418f0fbbeed19788c425cff30 RLBA-2022:5329 cheese bug fix and enhancement update Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects. Bug Fix(es) and Enhancement(s): * [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cheese. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects. Bug Fix(es) and Enhancement(s): * [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028) rocky-linux-8-x86-64-appstream-rpms cheese-3.28.0-4.el8_6.x86_64.rpm 1cd8f7b5f5f9888477b2bcefcb93b5be066a6590b2c641568c3f6181b6285412 cheese-libs-3.28.0-4.el8_6.x86_64.rpm dd228cd48876d9151169a9ea0a1a7038423436c278231b7f41c1acc0fd374499 RLSA-2022:5331 Moderate: libinput security update libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libinput. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libinput-1.16.3-3.el8_6.x86_64.rpm 5448d678b4816353fcde30f677f369b1ac64b98b4f38f70bb834a02c47a65a3f libinput-utils-1.16.3-3.el8_6.x86_64.rpm d8bca0d5137448050cde5c77f9b5ab2ce245d586df2c2d05b7eb74710f9cf7a2 RLSA-2022:5338 Moderate: ruby:2.6 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374) Security Fix(es): * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374) Security Fix(es): * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby ruby-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm 487b8c46d410303fb33e9b4e4e4ca513c93dd6c1e32fff807b4264b4d58096a4 ruby-devel-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm 87986e65d2b0c62bd3a83a510c2d0449c400d26115a2ceac1032d7d47e4fba94 rubygem-bigdecimal-1.4.1-109.module+el8.6.0+988+8031c193.x86_64.rpm 10b9574c4f8bca0abe496a931b0aa5dd387139008278ad0a5da143a5682b57d2 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-io-console-0.4.7-109.module+el8.6.0+988+8031c193.x86_64.rpm f7c851c71db19724876afe804f48dc7a658bd9614199e0bf7db956cbd0b55210 rubygem-json-2.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm 5287ad497584609c9389f3b61868ce2e0d6352585cf05a9225349665664832c1 rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm 2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a rubygem-openssl-2.1.2-109.module+el8.6.0+988+8031c193.x86_64.rpm 130c794fe5120151946cab09649d7a4741893b0bcf07050479ebe6b2e76fc189 rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df rubygem-psych-3.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm 36de3362ddb04310b4ea3913105ac2819751c9e4eb68e5ac0056416f32ed78e4 ruby-libs-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm 69cf057803c2bfec15ce1a6c6916bd5dc1323dc64de13345603d5c061df8a1ef RLSA-2022:5467 Important: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLSA-2022:5468 Important: php:8.0 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 RLSA-2022:5526 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: DoS when processing gopher server responses (CVE-2021-46784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: DoS when processing gopher server responses (CVE-2021-46784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm 7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a RLSA-2022:5779 Moderate: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby ruby-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm 2dadb763214aaa0e2d5a932d0b2be42279f97080c8a066588d9f8a4438284ba9 ruby-devel-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm 63ad7a877a816b1ee0942047dbcbd71f9b52a383c9c7b5085700a830aea59c97 rubygem-bigdecimal-1.3.4-110.module+el8.6.0+992+fc951c18.x86_64.rpm fbdd558fceda95c75edc0fb5bb1d7ddf9e063c30d5bbdc1f6e2e41182ee85924 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-io-console-0.4.6-110.module+el8.6.0+992+fc951c18.x86_64.rpm 721026e35dc187724f15d31f30af92dfcf50f54eb6e1bd189642fa138bf073db rubygem-json-2.1.0-110.module+el8.6.0+992+fc951c18.x86_64.rpm c2c099d75145af293c83fa67f3467ed5c4473f5704c0db36b61b139d90a9981a rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm 22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15 rubygem-openssl-2.1.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm cf100363a6bc1926d83ac74ce8a36935a4bfe376e0fb27a1d65f24add669b9ca rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-psych-3.0.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm 6c5c3b67723e03a280fde12f40f093877a67a8938e46f1f33ee3267006e5a57f ruby-libs-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm 1bca30a5e33cc4d59446068b15c4a6938c44057312cdb0b531f6c100309d523f RLSA-2022:5821 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206) * QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207) * QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353) * QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103) * Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242) * Remove upstream-only devices from the qemu-kvm binary (BZ#2077928) * When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030) * Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415) Enhancement(s): * Allow memory prealloc from multiple threads (BZ#2075569) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206) * QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207) * QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353) * QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103) * Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242) * Remove upstream-only devices from the qemu-kvm binary (BZ#2077928) * When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030) * Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415) Enhancement(s): * Allow memory prealloc from multiple threads (BZ#2075569) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d RLBA-2022:5824 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594) * Work on container-tools for Rocky Linux8.7.0 (BZ#2087742) * Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968) * podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352) * ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049) * catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143) * symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627) * Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594) * Work on container-tools for Rocky Linux8.7.0 (BZ#2087742) * Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968) * podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352) * ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049) * catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143) * symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627) * Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295) rocky-linux-8-x86-64-appstream-rpms__container-tools aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 8fb2669180d717578f5407e383babf56b298d037148cf7d9c0bd7f819a707601 containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm a0a9eb3a59768b77fa3790a555c1fb3f3b221258a5703418c0cd05b65245b4c9 crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 5053642b22732a14803ee43bcb11874bb3771e7bc9a4ddac6f46ffdd3543a154 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 RLSA-2022:5826 Moderate: mariadb:10.5 security, bug fix, and enhancement update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: crash at my_decimal::operator= (CVE-2022-27380) * mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Don't use less parallelism if not necessary (BZ#2096934) * Links in galera package description are bad (BZ#2096935) * [Tracker] Rebase to Galera 26.4.11 (BZ#2096936) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: crash at my_decimal::operator= (CVE-2022-27380) * mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Don't use less parallelism if not necessary (BZ#2096934) * Links in galera package description are bad (BZ#2096935) * [Tracker] Rebase to Galera 26.4.11 (BZ#2096936) rocky-linux-8-x86-64-appstream-rpms__mariadb galera-26.4.11-1.module+el8.6.0+995+5ac2a483.x86_64.rpm 6c1369187a1133e19dec341e7099ea8bf32bc734100484c6741278676af0e239 Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 mariadb-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 47eb162bd890e447dd3d4a0fb8ec38beeb0a1781fa625e38a13f0d45b9b816cb mariadb-backup-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 520a147d559446a5bc70a2c80a2b68d22152d14832d174a9173c497ffd1569a5 mariadb-common-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm f017c78532673f9532d2d7838729fc79d2abd947f2fbbd4b975426a2bc8c341f mariadb-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 556af926669474ea364941ba9011038a164ae7deba794a86d56700e37ae043a7 mariadb-embedded-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 88e2d30bef155c2ecee7a54fb42b172720fa505c53a671e011156277c224f9e0 mariadb-embedded-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm c33d67dca5240eabd8d936108e70067cbb8256d9c1cc16e698592ee0e2477b97 mariadb-errmsg-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 47efc58763cfa51e38884334ba62d8229f0d0665b478e3931782504aa5f3bc68 mariadb-gssapi-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 9cfc25a45a1ddd76a297284051b1c1190de192e49320a82af5e97ca7db0e211f mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm cb1e34b23abf93b073d095feaf75dbdda7b39bb843df2695eda6a10c94402df8 mariadb-pam-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 6f8686a5ea55e7ae295cb251db7970900c8bfceb3bf4c9eae7594d74d20f5cdf mariadb-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm b4aa22b0c0013875dc2bcb7102839c2bd62e6339028c069f8d8a51257d6024f0 mariadb-server-galera-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 98432d1dd9dac2557f64f2b412cec759d9e8d984fbfce194525a6efcb88babbf mariadb-server-utils-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 7a6fb0550f77340846dc5043895c5f0943607aa3da61662222adbf5b14d8a25a mariadb-test-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm 00f705e37e4b2ee57e7bb0e4ee164bf02c0284c2037aafb112f075fdd34439b8 RLSA-2022:6158 Moderate: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLEA-2022:6440 nss and nspr bug fix and enhancement update Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062) * Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097900) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641) * allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642) * Need to be able to run self-tests at will programmatically (BZ#2099759) * NSS segfaults still in client auth path. (BZ#2105007) * ipsec --initnss timeouts probably due to entropy. (BZ#2121486) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nspr, nss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062) * Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097900) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641) * allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642) * Need to be able to run self-tests at will programmatically (BZ#2099759) * NSS segfaults still in client auth path. (BZ#2105007) * ipsec --initnss timeouts probably due to entropy. (BZ#2121486) rocky-linux-8-x86-64-appstream-rpms nss-3.79.0-10.el8_6.x86_64.rpm 684862bc5ffd7c2f1fb4e3d80f02a05807655af5f218eb8a71f0ae541f1f38d0 nspr-devel-4.34.0-3.el8_6.x86_64.rpm e5bfe96520798c594dbdd7506e57c5298e213e3a061559880feb30badacb0118 nspr-4.34.0-3.el8_6.x86_64.rpm 1543f75ee941cc74ec0e291eeb19eb2ecfa34491efa46059d78874418e9aae9e nss-devel-3.79.0-10.el8_6.x86_64.rpm ab6571733b23403211aa240ed384de6657911e94144ce724b3625f9e2eafe5cd nss-softokn-3.79.0-10.el8_6.x86_64.rpm 8f4702dc979720438b3ca338b5215f0ec7b017443c3a2229aa71f84ce6cfe734 nss-softokn-devel-3.79.0-10.el8_6.x86_64.rpm 312d074dd3bfe576a38f02743248b050e86211e4d82dd5e0c5a7e73a6cab28a9 nss-softokn-freebl-3.79.0-10.el8_6.x86_64.rpm 93e78d2bfa30aaa30402f15bb1a29c067a6bc628353eca60453d33fff73527fa nss-softokn-freebl-devel-3.79.0-10.el8_6.x86_64.rpm 4dcb1e4c0c555438b8b104b27e868ab458ee12bbd29f886d362eb9fecc56e4a5 nss-sysinit-3.79.0-10.el8_6.x86_64.rpm f81f9bedbc71db1b05c23f436b16a20bb898e02f4afbb4ae30142becfda270a3 nss-tools-3.79.0-10.el8_6.x86_64.rpm de6441d276507c10bb16f1cd2d3bd0cefffecfe0afb883037da27967a9f02c78 nss-util-3.79.0-10.el8_6.x86_64.rpm 4ed196ef6fa5a607f63430ec3e0822565f8a9dc8206ed99142b405eeba898adc nss-util-devel-3.79.0-10.el8_6.x86_64.rpm 87c06a950c7c6e78c9eec58822d246a793e52615e9db229244efc53b66eeeb3e RLSA-2022:6443 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: server crash at my_decimal::operator= (CVE-2022-27380) * mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083) * mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085) * mariadb: server crash in Item_args::walk_args (CVE-2022-32087) * mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: server crash at my_decimal::operator= (CVE-2022-27380) * mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083) * mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085) * mariadb: server crash in Item_args::walk_args (CVE-2022-32087) * mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075) rocky-linux-8-x86-64-appstream-rpms__mariadb galera-25.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 2be577e24b7e4146b38502688892f31ba8155f3d438f5a92f5a85f0fa7851036 Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm 865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765 mariadb-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 197703483ce3f21c79732f53810f03df7c0c66092e2b3f6ebac1f8162fe5dd28 mariadb-backup-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 2d03c5141c3070e4bd6ec2a8f4700628b1748db93fe5672f80b8ab153eb0658b mariadb-common-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 8b149e91c59d3b25245dd670c5b194725e74926ccc3a20291d5266593075463a mariadb-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm f0db442d7effcc5c6cbfa80aa872c9c5be209461ff14eac63656d37c62428034 mariadb-embedded-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 69a13127d202418e1d44b7a86a3e2e6aba855ef254f5cfae2fb0f1cf37ef3832 mariadb-embedded-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm b607add53a12bab242b8c6d4e202ba0f4cd913e1b9c9910e9d3bac353d992dee mariadb-errmsg-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm add7dbf8fffba3d45af1ac1b1dbdc871c8816cfa0ce05643b7d4e2d9bb6d50b0 mariadb-gssapi-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm e21b0e182700d9b999634937b53ae7528d72c2b4f02b16e8b37c466110ac81a4 mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 6ad4255e0c08e2a3bc03e37fc3edbf0fe41a06ce6bc93c6938c3426ad9c246f9 mariadb-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm fd385abfac5bd7e60ed92808d09ab95f7a04533852a81faec7cb79d938c9d941 mariadb-server-galera-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm ae9a8c3f42acda894da8c5db9e83658028e99fa19473522291c49ee085bfd4e1 mariadb-server-utils-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 2f9999145d8b2fd0ce3150e61c6bebc0055b8c0c56e7165907fcc43a926b7a10 mariadb-test-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm 58886712c7b405e6e25f6f5f3aec2f63464bfce745b87ebf3a893fd0886267d5 RLBA-2022:6446 virt:rhel and virt-devel:rhel bug fix and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568) * swtpm_localca: Test for available issuercert before creating CA (BZ#2109987) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568) * swtpm_localca: Test for available issuercert before creating CA (BZ#2109987) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d RLSA-2022:6447 Moderate: ruby:2.7 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__ruby ruby-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm f2f45642bf7f06a97f1837a99723bdf345f8cf0d42a86ba4c2abebf283e5359a ruby-devel-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm d7f1677bef739a83801cb34b8cb531783273bffa871791c486245c24c80d4d69 rubygem-bigdecimal-2.0.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm 27064fe03f90f11b184ddd4d4f1d6ce9d8e51646562bd5e3a90c85d2df102dd8 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-io-console-0.5.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm 2522f826d07e50f4573151caee2cba099b4a72ebc045ec4d268c1b25bbb64c66 rubygem-json-2.3.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm 4500a55dd4c62c954660301397d40e6f25634754290fa760657345fc6e212961 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-openssl-2.1.3-138.module+el8.6.0+1001+b5678180.x86_64.rpm 5427c2eed2ff85bb70f1c49c40faba028ec65a893e3aac7fa9debd97a5b7dee6 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 rubygem-psych-3.1.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm 30f5559c86ab32c6316a499f02118c9ecb437389a2040c323891fc60761c85fd ruby-libs-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm ca8a92b98fb7f6fe89556d2c3e76e9e146118a0b9bcd622d6a938d3feb34ba5d RLSA-2022:6450 Moderate: ruby:3.0 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Double free in Regexp compilation (CVE-2022-28738) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Double free in Regexp compilation (CVE-2022-28738) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981) rocky-linux-8-x86-64-appstream-rpms__ruby ruby-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm f15e2cb62f5089241b7c0d15d302850e6d62b29fd2baf95e4969d68291fe69a4 ruby-devel-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 471d39a317b19900d1aa0894ba19e3334bfffb9e35b77d317559b050cd2b54b8 rubygem-bigdecimal-3.0.0-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 304acf98fe6a7d8169d60426eb8c2474115406be0db98efc8873779344064cf0 rubygem-io-console-0.5.7-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 65acd752a8d7657a82e2b000ac67ca306118effa7180d5930ef2e1919738b0d6 rubygem-json-2.5.1-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 3cbd6958d0bdb8827db2c5a50b0d46611c87a04cd05c2c18e804e86a3682d87b rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210 rubygem-psych-3.3.2-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm bec3c333cbe8353699a14dc66883da2acca1cc0ce0237b7251e126593d51668d ruby-libs-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm 9f405c6e54de0216ab746e5621b5eb0bad162e0a4403672cbdf2630e8a2c39e5 RLEA-2022:6453 container-tools:3.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120558) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120558) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 RLEA-2022:6454 container-tools:4.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120561) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120561) rocky-linux-8-x86-64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 RLEA-2022:6456 gnome-settings-daemon bug fix and enhancement update The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964) rocky-linux-8-x86-64-appstream-rpms gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm 12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94 RLSA-2022:6540 Moderate: webkit2gtk3 security update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7). Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7). Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el8_6.x86_64.rpm 6f9d418c7ea1f1201d9fce9c29a452dd5ff1e50186607bac1d8d5c36e9d0b081 webkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm f264c4563e2b6ed207ecba5bad82bc211e855fcabe1756b92db6001872f5118c webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm 857df66bf8107734cf442e7e59feab3e0d62c626e8738c46f676b57c99fa221a webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpm 022a74acac9929975cd817c2e8820af36362c80ba18c35525aa3143c238e2845 RLSA-2022:6542 Moderate: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) * Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) * Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) * Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) * Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 RLSA-2022:6775 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm 7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a RLSA-2022:6911 Moderate: .NET 6.0 security and bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm 6e650cfac34c121a272d9c483ca5059026ec06f0d34d4bcae5d31b3e4f777725 aspnetcore-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm 70e339246f8d0c94ab2a07b9f993079005f3c20b862576c20a1a6772764c0cd5 dotnet-apphost-pack-6.0-6.0.10-1.el8_6.x86_64.rpm 0a657dbccaa3525914806ebdea52bcdaca2a936399b214dd30eecc378e94b2e9 dotnet-hostfxr-6.0-6.0.10-1.el8_6.x86_64.rpm 6982ed81d032f7ab444f935f35adff3f6d50b3d4f01c1139cd066e4fa3f57dbf dotnet-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm 2df8853bf9d61bb52c0ada2a5eeddbf56ff1e69c8952d150d32702468268fb58 dotnet-sdk-6.0-6.0.110-1.el8_6.x86_64.rpm 583e8250ae7739698fcaf5c6b46c9f7ab5c02ce69bbd9c7c19ba1c8bfd938b09 dotnet-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm 0551f8c631a8895d3b971c3437f3723e4b2d5e3a67bdfb2f29304721a587a4c9 dotnet-templates-6.0-6.0.110-1.el8_6.x86_64.rpm 386c99913b24868fb58baba273ba69eda871b35805173bd4dc874b4076803d5a RLSA-2022:6912 Moderate: .NET Core 3.1 security and bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet3.1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm b036a76fc87c4c0ebefdd5a48b039c099e59e631a937a3dbb25f7332e7eab6f2 aspnetcore-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpm 284b6c759438ba789f5b0dc9e68990cd9a483be7c21b3135af56a3937e7ae5ff dotnet-apphost-pack-3.1-3.1.30-1.el8_6.x86_64.rpm efe82ef762462f11c2e04d4aa5938f4940c02a20a22e781b7d9b292781b6ace3 dotnet-hostfxr-3.1-3.1.30-1.el8_6.x86_64.rpm 0a3e9d8b334a8ca057be0a61d2f495c0b0d6b880e64cc95a52518d8f2e258d32 dotnet-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm eafd53eb66c10643f865ea529e46fca0c1a8375558efa5bc9a0f04d132658aca dotnet-sdk-3.1-3.1.424-1.el8_6.x86_64.rpm df33cdd9170652a91cb911118d2b44af28c5421bd1fd156eabfdbe796b2adf96 dotnet-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpm 6919d822bdd894fbd11352a528676772e043a81e957b956028e587586980d836 dotnet-templates-3.1-3.1.424-1.el8_6.x86_64.rpm 520fc0ea3849a0b1111c494897dfb53b2f9f48cf0e03242e82758ac941bdb3d8 RLSA-2022:6964 Important: nodejs:16 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs 16. Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs 16. Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm 440c4c7f7e759eeddb3269e62891497e5de3a79e0eafdc6edaae51f3b618d252 nodejs-devel-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm 57ecbfc42d4054167b5b62fb2cf50eb11a77b09e97f6920fdc61a0b06fdb9434 nodejs-full-i18n-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm 251fc16560f4fb5ef3ad009b28df12aeed5328b04733a5b52b9e1e31feaddbe4 npm-8.15.0-1.16.17.1.1.module+el8.6.0+1046+80feca58.x86_64.rpm 3d401a2f8fe06114ada7bba63cc62a443d33a2462d6c6e96a6335539b821aa53 RLSA-2022:7006 Moderate: java-1.8.0-openjdk security update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm 745a98184ac9a5515249b7cd168a5790d2b07407b3eca941cbb9bf9400d2f689 java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm 10be3aa175d2b7be220ed364679366f5b90ce479d11d65443fabba8fb5e23aa9 java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm a64f5fe29ba875659ccd0a3d6af6f3a1f5e87b0c4e5e93cbabe16cf8ed68ae68 java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm 6facf44a3ef195fb6c7f66ffce323acf6eccf4f331d5b9059e0c03865fdcd5ac java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm 01819f766f0cfdf6b035db3ead2f50c9539d65fb760d89728a34771c4b44a31a java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpm f0b9eb21a54ba79a63a963b57f7a2372954a3c88686a340713fa88332ab3ce4a RLSA-2022:7000 Moderate: java-17-openjdk security and bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503) rocky-linux-8-x86-64-appstream-rpms java-17-openjdk-17.0.5.0.8-2.el8_6.x86_64.rpm 838a430c12dc052feeab8968cead619fec7d76bb97abf592f861d0292706b130 java-17-openjdk-demo-17.0.5.0.8-2.el8_6.x86_64.rpm 0ad8e5c322536ec6dbc5798c48da6f97f0cb7ae2734f26350555b6aee748fd32 java-17-openjdk-devel-17.0.5.0.8-2.el8_6.x86_64.rpm 0197ddb74fb8a530c5972e9768ca5163284b1343ea3bd89baa46b62c13e8ef8d java-17-openjdk-headless-17.0.5.0.8-2.el8_6.x86_64.rpm 63c857bda2ac036200ab1200c75d790ccbeb6e2188c06a888ae6f3989e4093f7 java-17-openjdk-javadoc-17.0.5.0.8-2.el8_6.x86_64.rpm 0704d2feac8d566e51e651cfa698732b1b90af3ba10e89d61df4a0e04401f6c8 java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el8_6.x86_64.rpm 61d2770cc684c0cee9537520ec7b7c1766c7b81ff1a5a01367d9f5fe0eefe809 java-17-openjdk-jmods-17.0.5.0.8-2.el8_6.x86_64.rpm 72cfedb194fb81bc92c44995237de168454da9f1ca92e4982839c94d5117954a java-17-openjdk-src-17.0.5.0.8-2.el8_6.x86_64.rpm f572d7bc2035a81698cd38ef656827cd5e790575a81d88a96b20271965971683 java-17-openjdk-static-libs-17.0.5.0.8-2.el8_6.x86_64.rpm 616d88fa04d8c7ab45e631db0cf0fdf6e6352968ab569145c5c4581bcaea023b RLSA-2022:7012 Moderate: java-11-openjdk security and bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863) rocky-linux-8-x86-64-appstream-rpms java-11-openjdk-11.0.17.0.8-2.el8_6.x86_64.rpm f1ec1f28c33c37259da402d2e06a1467f4f9d7dfda6560d6c82ecfaf3ad6a8bd java-11-openjdk-demo-11.0.17.0.8-2.el8_6.x86_64.rpm b4e143d786bb6f13ad9170b9a5c7dd433aedb83213cc620ed9eea084a9f10b7d java-11-openjdk-devel-11.0.17.0.8-2.el8_6.x86_64.rpm 294a5307e7d6a47cddb771bf7331bd33f0c76f11713a340cf9c2ba898fcdf3d4 java-11-openjdk-headless-11.0.17.0.8-2.el8_6.x86_64.rpm ac1d47d33942cbb35a09fd0bbb94c70bf33ed1294a59069d1e7ede814e3d6fb7 java-11-openjdk-javadoc-11.0.17.0.8-2.el8_6.x86_64.rpm 51fe1350c0503073ec925d0b4872a11160cc0861b5e5d410533132621fc72e8f java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el8_6.x86_64.rpm a07639947737757b7337950563036a4d97230d069275a35781f6fa631a41bc71 java-11-openjdk-jmods-11.0.17.0.8-2.el8_6.x86_64.rpm 0670b157826eed4f457070a9944f09d339724159aeff56f6befed0496757cfcf java-11-openjdk-src-11.0.17.0.8-2.el8_6.x86_64.rpm 4ebaae7da862f73d7398d0053cfd96d1249bbe313afb54279c6b0379be246732 java-11-openjdk-static-libs-11.0.17.0.8-2.el8_6.x86_64.rpm 4d8bec512555940ee20d1b0df6bc3f4680498b58c28433fa49b2431f5f5e40a7 RLSA-2022:7119 Moderate: mysql:8.0 security, bug fix, and enhancement update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.30). Security Fix(es): * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415) * mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596) * mysql: C API unspecified vulnerability (CVE-2021-35597) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423) * mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625) * mysql: Server: GIS unspecified vulnerability (CVE-2021-35631) * mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632) * mysql: Server: PS unspecified vulnerability (CVE-2021-35637) * mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534) * mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427) * mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547) * mysql: Server: Parser unspecified vulnerability (CVE-2022-21304) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374) * mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367) * mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457) * mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633) * mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.30). Security Fix(es): * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415) * mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596) * mysql: C API unspecified vulnerability (CVE-2021-35597) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423) * mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625) * mysql: Server: GIS unspecified vulnerability (CVE-2021-35631) * mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632) * mysql: Server: PS unspecified vulnerability (CVE-2021-35637) * mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534) * mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427) * mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547) * mysql: Server: Parser unspecified vulnerability (CVE-2022-21304) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374) * mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367) * mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457) * mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633) * mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940) rocky-linux-8-x86-64-appstream-rpms__mysql mecab-0.996-2.module+el8.6.0+1057+4d6a1721.x86_64.rpm 3c0021184a048d318e81df62882e329ccc9575395989cf57e5c6bb8d3dd12153 mysql-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm 9cb5d1bbe5620dd769c4f7f75a45e21dcbcfac3fe3ff91b934d0c1fc3f15a0ea mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f mysql-common-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm 1bc4b3d9628f3a617b83f355d19ec0105d6f13922efb67ca08ac33f99dbe5ca3 mysql-devel-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm 824a5cada6538b9f41773f07d6c7f94b0aeb89454426062b7b2911873db1cd18 mysql-errmsg-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm a2063a9fd8dffa3a87a5e511b9b5e39052a530fcb27920f88ec0efed3e740d3e mysql-libs-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm 3bf0fe5f852a135cbae23e9a087f4724038b237938cd9fc2b19339517417a13a mysql-server-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm c9db82d27d816893a193b9cab3c9195cb693c69f6dce2227fb4136bcedc1b7c9 mysql-test-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm cc7ee9a9065cb0585ee6606c762ddf8d87502be170df730f4de4cf1978e96fe8 RLBA-2022:7122 virt:rhel and virt-devel:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * scsi-generic: Fix emulated block limits VPD page (BZ#2121783) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * scsi-generic: Fix emulated block limits VPD page (BZ#2121783) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d RLBA-2022:7126 stalld bug fix and enhancement update The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126495) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126495) rocky-linux-8-x86-64-appstream-rpms stalld-1.17-3.el8_6.x86_64.rpm f7461f2670713844d6f832dc358b7516e6b53b0386403c7de3b83bf5f88c5aba RLBA-2022:7127 container-tools:rhel8 bug fix and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * containers config.json gets empty after sudden power loss (BZ#2130237) * Podman support to perform custom actions on unhealthy containers (BZ#2130912) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361) * PANIC podman API service endpoint handler panic (BZ#2132413) * Podman volume plugin timeout should be configurable (BZ#2132993) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * containers config.json gets empty after sudden power loss (BZ#2130237) * Podman support to perform custom actions on unhealthy containers (BZ#2130912) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361) * PANIC podman API service endpoint handler panic (BZ#2132413) * Podman volume plugin timeout should be configurable (BZ#2132993) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 RLSA-2022:7128 Moderate: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm 7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm 193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc postgresql-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm f95444ae27053c5504601cfb1bf4d44bdc56f7d54b60f69fabff2a3a30f4f8c7 postgresql-contrib-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm d1da2be66f7b945e18f9ce5937472540a4e5fae27b68a66f3f6860a4c6b4cd04 postgresql-docs-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm ffa8d10df01db092f4039b3819a79dca1222c639c62cae7aca314fd59bcf68cf postgresql-plperl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 29e8b7b91a348651e31084e03c04835aa7c00a84025fc22b252cfa772cbb2a14 postgresql-plpython3-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 1fd6e4891442fa7c18e0d3333658477bac3edf374df44767ad1a4a86d510f438 postgresql-pltcl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 5f1507924fba91e1f0ba51b3bf43d689c833a106b99635464db81d7916521a4d postgresql-server-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 91acd673cfab624d1f4740cfa486f8da657dfe03696600e6eb50abcc8bb7469c postgresql-server-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 8c9e2a4148198e518085b207d0f4845feeaedbd20ed36dc6bab84eb7a706394b postgresql-static-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 43620e6cb1f200bca1539909808563f88ca31f0776c0e38a33213b63a3be7c30 postgresql-test-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm e994ddb1ebcac70c941d100c25cec93c489c1b33ff282e70f15525591e807236 postgresql-upgrade-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm 8253518c68242b0c0f1807b360228af9568e96156030d52b8de3278ef1e89f0d postgresql-upgrade-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm c7b67025026e57a72036510e11d20e3516f3792d177a22d78c9973622d401fad RLSA-2022:7129 Moderate: git-lfs security and bug fix update Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851) * golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * git-lfs needs to be rebuild with golang 1.17.7-1 or above Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for git-lfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851) * golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * git-lfs needs to be rebuild with golang 1.17.7-1 or above rocky-linux-8-x86-64-appstream-rpms git-lfs-2.13.3-3.el8_6.x86_64.rpm d8a246dcad708db6bac5f33227ceefa96d4a79c8dd6ec00d99ad12d0ac0adf9a RLBA-2022:7132 idm:DL1 bug fix and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324) * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324) * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051) rocky-linux-8-x86-64-appstream-rpms__idm bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm 615d759274eb3f3f8c28657012cfec65b67d8a47fbf38b897955cec7bdde1495 opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2022:7240 container-tools:rhel8 bug fix and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345) rocky-linux-8-x86-64-appstream-rpms__container-tools containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 RLBA-2022:7455 jigawatts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jigawatts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms jigawatts-1.21.0.0.0-3.el8.x86_64.rpm 4dd6d7a49e770ec4d95f4bd04a3c6fc11f66c3889786262819905773a984f52e RLBA-2022:7456 ansible-core bug fix and enhancement update Update ansible-core version to 2.13.3 Switch from git to git-core dependency Build manpages Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Update ansible-core version to 2.13.3 Switch from git to git-core dependency Build manpages rocky-linux-8-x86-64-appstream-rpms ansible-core-2.13.3-1.el8.x86_64.rpm 292ce7fdb68aab58926c7df28b3e108988bf148642adae06ba348a557d8b85ba ansible-test-2.13.3-1.el8.x86_64.rpm ec9d55e4bac46fde13b4b2d2bedb59fec2b424441ad913bb8596fcbb984690eb RLSA-2022:7457 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190) * buildah: possible information disclosure and modification (CVE-2022-2990) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, conmon, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190) * buildah: possible information disclosure and modification (CVE-2022-2990) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856 slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 RLSA-2022:7458 Moderate: flatpak-builder security and bug fix update Flatpak-builder is a tool for building flatpaks from sources. Security Fix(es): * flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for flatpak-builder. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak-builder is a tool for building flatpaks from sources. Security Fix(es): * flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms flatpak-builder-1.0.14-2.el8.x86_64.rpm 38a880b0af6d805dc60a1620d78a913f8c72a50492847a3c3c4f9171185a717a RLBA-2022:7459 flatpak bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for flatpak. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms flatpak-session-helper-1.10.7-1.el8.x86_64.rpm 58c7ddd4eb66a852c86537cd722cba96f9167c9ff1209e0aca229354bd135d60 flatpak-1.10.7-1.el8.x86_64.rpm 16307d86bcf90b9a10b580f7264318cb01a20df8223a49db0361c08719093cc0 flatpak-libs-1.10.7-1.el8.x86_64.rpm c0d6a3caa7713cf94f9e05bb1c83d0fef2bbfe006fba98d52da154523d765b0b RLBA-2022:7460 rsyslog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsyslog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rsyslog-8.2102.0-10.el8.x86_64.rpm 6ecfc0924652059a0e59a20663a4c8492163d3a9476ef65fcc05b618885b110a rsyslog-crypto-8.2102.0-10.el8.x86_64.rpm 501ef5dd0642197789c8afee86e586a53b3dc4e0dec9ed6454538c50b9b9e936 rsyslog-snmp-8.2102.0-10.el8.x86_64.rpm 01cee07ed3a8d9e112cc04ea731a89ddc4900d3eac727348f602f8e70104c315 rsyslog-elasticsearch-8.2102.0-10.el8.x86_64.rpm 5ae55243ecb13f18a8d4eccc3bbe99b688782bd25f92cca293650b13969b0c45 rsyslog-gnutls-8.2102.0-10.el8.x86_64.rpm 26f9b8eb9d7fb3d1ee0fa496c6d86afe1745a1300a2aeeb033f5336534b3b3ac rsyslog-gssapi-8.2102.0-10.el8.x86_64.rpm fb7659e51b89347942a0682769c11c65b480af8b9fa5283fbf6a912bc3b51763 rsyslog-kafka-8.2102.0-10.el8.x86_64.rpm 57623cfbeaf169b8d9db3917e3380e47ddf7d3a77981ba322a992945001e2c7c rsyslog-mmaudit-8.2102.0-10.el8.x86_64.rpm 7c02db10512225c70140c4efe8fed9983dd8c23436e73d637b930abd82b5d6a9 rsyslog-mmfields-8.2102.0-10.el8.x86_64.rpm 8ae41c4ebda5bb2f5e490be17ea34df8a796a8ac82e37a4c6f79151fb880a682 rsyslog-mmjsonparse-8.2102.0-10.el8.x86_64.rpm 8990b09e3e34970d687f3a6dbb7a068a219ff3fa3d5dbfc6950c7009a263150c rsyslog-mmkubernetes-8.2102.0-10.el8.x86_64.rpm 18ed1f630dd647c958ab135b7d19bf0c58a6bcf84d1fd4cf2b87abd3a1403869 rsyslog-mmnormalize-8.2102.0-10.el8.x86_64.rpm 121fbc57104776d1c67e521a9a26ba31ca81ad9cce470deaf29dc7726f5c3c18 rsyslog-mmsnmptrapd-8.2102.0-10.el8.x86_64.rpm cac180c9d44da54781f873b435ae76dbb37cdaf659849420fc5ecd50df9d5de1 rsyslog-mysql-8.2102.0-10.el8.x86_64.rpm 009b093a178792b7a9b1322e1727a539e34a4f1f3e67333e3b157e41c623305b rsyslog-omamqp1-8.2102.0-10.el8.x86_64.rpm b0f15abe796a6650d2431ee09c162cdcccd9025800153f2b8521b591d5ac42d9 rsyslog-openssl-8.2102.0-10.el8.x86_64.rpm 0608b3b3949e0d32ba9ca1dd81cad91f3380b223a03ce25f8602399a5c4f5020 rsyslog-pgsql-8.2102.0-10.el8.x86_64.rpm 781b4b2940485824095aafbc61004154fdf5e7a82ffe9551952a935f51631b9f rsyslog-relp-8.2102.0-10.el8.x86_64.rpm 8ab65a687c251669d44ce1a907e031dc45d99bd63b90796562afa9b698dbe3da rsyslog-udpspoof-8.2102.0-10.el8.x86_64.rpm c42e276660b6ec51faeabe13bee30151c26f441bce27a0818f5da24bcf973d5d RLSA-2022:7461 Moderate: libreoffice security update LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libreoffice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libreoffice-base-6.4.7.2-11.el8.x86_64.rpm e784d3b3d878595e6b5718236bfc928ddfd72e16b594bb701f169d5b4bb19fb0 libreoffice-calc-6.4.7.2-11.el8.x86_64.rpm 13a622c42cc9bb41a70c3f323778a02b216fffa7cac576de211cd008c4be5924 libreoffice-core-6.4.7.2-11.el8.x86_64.rpm 569b1e6c4b044f78ccc7f2f719db1d31bb6bff3c73c49bdcbaac648f1d34706a libreoffice-draw-6.4.7.2-11.el8.x86_64.rpm fc12df8aac7db65f8811e75271dbffabe2f35c0327782c1f19183ae2cca17ca0 libreoffice-emailmerge-6.4.7.2-11.el8.x86_64.rpm 068020d9b424cf5b6064ce2445ca374426fb790bfb70fced8b03216aedaf11a6 libreoffice-filters-6.4.7.2-11.el8.x86_64.rpm a4942a4e72a76ac33204bb3405a0403b555eb3d416ab202038dd225bb1b7bc82 libreoffice-gdb-debug-support-6.4.7.2-11.el8.x86_64.rpm 73cb704b69babc93a7f851b3139e674479f490a77f52be334efb8afb64b05335 libreoffice-graphicfilter-6.4.7.2-11.el8.x86_64.rpm 9fef96de29a3c8d3038d71c04f35c81140547d0fcd91e99b9913ab7776a64746 libreoffice-gtk3-6.4.7.2-11.el8.x86_64.rpm 4ac6b5cb0644021c73e86ece8780d23869cc28e5c771e53a29eade4c3c17842f libreoffice-help-ar-6.4.7.2-11.el8.x86_64.rpm ee890e090faa8676295771d932fb884d6099a2beaaab0603399e910705e890ad libreoffice-help-bg-6.4.7.2-11.el8.x86_64.rpm c912487c44b0738bfca597127376b9e6f6b1ea159cf8fdc75e7275dc2dd7de1e libreoffice-help-bn-6.4.7.2-11.el8.x86_64.rpm 920f525cb192101f31076810a33d06f8b277aa3a7c10c3ee0a83e3254a0caad7 libreoffice-help-ca-6.4.7.2-11.el8.x86_64.rpm 575219a5a54c5c83668914536f5b5d837fefded1ed9edf5e3002513cc02a0c16 libreoffice-help-cs-6.4.7.2-11.el8.x86_64.rpm 791f9d044ff91ce79e41611cbaa090831eb388712faa25b0ccb83f1e14faae3d libreoffice-help-da-6.4.7.2-11.el8.x86_64.rpm fa389a9af08bb8f5cc1d8ecd93b019985feba5686a5f0258cc36e5d57e05f5c0 libreoffice-help-de-6.4.7.2-11.el8.x86_64.rpm 421df053f212befe0d653589e9a9d7a6bdf24d8770962df2b5df5b95bb4647ec libreoffice-help-dz-6.4.7.2-11.el8.x86_64.rpm 87a691ac5f08d12a8d82edae974431450adbb696065815656c1d2d381d927cf7 libreoffice-help-el-6.4.7.2-11.el8.x86_64.rpm e171326eb0a005c3ce6be4d70b38b5bf759a2edd055c831d7ba6985bc8b4d0e3 libreoffice-help-en-6.4.7.2-11.el8.x86_64.rpm 40cb5a04825d52b8024097953e8ab073251b1b9302492a3747ac76b5d8eeaba4 libreoffice-help-es-6.4.7.2-11.el8.x86_64.rpm ece90ae7d153a7b4ab4342ef668d2d0d2d9c3848a5533bac1646223514308c19 libreoffice-help-et-6.4.7.2-11.el8.x86_64.rpm 2584db17d49570e5be9bb9c6b1992f657f1fd39a14c22660fac5f5ad3a0f12d5 libreoffice-help-eu-6.4.7.2-11.el8.x86_64.rpm 9b2bf8f20b5c55f45814a41e8b03eabf933b9e7f2102d264b5a772553e53795c libreoffice-help-fi-6.4.7.2-11.el8.x86_64.rpm 248b8850942c061e29f85fea119dad8b4d9bbd4ee3a4b6c82507d1d14c0b8ac4 libreoffice-help-fr-6.4.7.2-11.el8.x86_64.rpm 07750739db60164fd32aa035c5759d2f98556e21a9500003cf4e0f9f56aecbaa libreoffice-help-gl-6.4.7.2-11.el8.x86_64.rpm 83866e5641d3d082eb819ecaae24a9464268de6f43bcb6c5267da61f03a001a6 libreoffice-help-gu-6.4.7.2-11.el8.x86_64.rpm 20a62bc41f0c1f385c98cc698a8eae4b07966216927abb3d04e60d1295ceea3f libreoffice-help-he-6.4.7.2-11.el8.x86_64.rpm 6bc1c0e71e2f937ac0b63d22e9216ebf1ec34edcb18001b1bf08c22fb288f65d libreoffice-help-hi-6.4.7.2-11.el8.x86_64.rpm b7b375b0a8b0611b9e5602dce593f650d8ba6f47b9b462313939d3314ac6b321 libreoffice-help-hr-6.4.7.2-11.el8.x86_64.rpm 888b6b6761e58dd9f2f197415eaff390a8e26b850aa58c64172541f5a4afb851 libreoffice-help-hu-6.4.7.2-11.el8.x86_64.rpm 95795933c331257c56715e5a7bcd3a8abd5238f991ce0bf6267e47c69c643bc5 libreoffice-help-id-6.4.7.2-11.el8.x86_64.rpm 33ddc4dc9bf005d2931c67d54293d4514cb82ff15ef1faba84f97f38de994b10 libreoffice-help-it-6.4.7.2-11.el8.x86_64.rpm 559cac012576ad3f96840f5b7d74456b05df1ce2ca7de35e06cfee76e725de92 libreoffice-help-ja-6.4.7.2-11.el8.x86_64.rpm 6c69d6276a109cabb59ab93f1654a4d9870ef55d2db79461c1ca07dac419108e libreoffice-help-ko-6.4.7.2-11.el8.x86_64.rpm 05f77b6b10dd37903b3bb15c6ce79d95d2ef0430ed73e1fb408a59d053a9a171 libreoffice-help-lt-6.4.7.2-11.el8.x86_64.rpm 594806caaf8c77e46d0b480a46025333177a488ece90735e3428e9bc0e278061 libreoffice-help-lv-6.4.7.2-11.el8.x86_64.rpm 049e912243762a99accf055d7e62353664eea8c77454e0285022f94df087b58e libreoffice-help-nb-6.4.7.2-11.el8.x86_64.rpm fc80baa0e6dec3c3ec5033fa26b63466e5a3ee2d1ff402d27ed93d50a2828d95 libreoffice-help-nl-6.4.7.2-11.el8.x86_64.rpm 685eae5ec3d43b31dcdd7b236bf4e31c2077e3fff84c5f1b6bc0b4fc5cf7bf33 libreoffice-help-nn-6.4.7.2-11.el8.x86_64.rpm bb9f7eb8f57330402296b20934818ba5a19ac2c029ad0a47a633886a3abbe102 libreoffice-help-pl-6.4.7.2-11.el8.x86_64.rpm 9690a6a8be4dbef2807b61f5b052e78615452a654857bac3a41ff3bdfdb82765 libreoffice-help-pt-BR-6.4.7.2-11.el8.x86_64.rpm 62f14100a8f013a43f6bb58859ad6e7feef6c3d8183e6d8d96cacd431eb04025 libreoffice-help-pt-PT-6.4.7.2-11.el8.x86_64.rpm 4b3aab38a0ed9e7a48c5e1a7827e8c2566b9636e08f1bb813ea2e4e3754ed2a3 libreoffice-help-ro-6.4.7.2-11.el8.x86_64.rpm 44785c7cafb42fd6c3ac8a5bf658b877c470d8c91737a92da6f5da82b56fe87f libreoffice-help-ru-6.4.7.2-11.el8.x86_64.rpm 7bdf2abb286b93262572148ad11d7041b20d18b06d7faea3fb6eb3a9cbaee64f libreoffice-help-si-6.4.7.2-11.el8.x86_64.rpm 5453763157ca7a92b1721f1911ab68c62e5052535dffe77867cbe685a01413b6 libreoffice-help-sk-6.4.7.2-11.el8.x86_64.rpm 0db00490546a1c35218f0f82b635884b62b38470ae277396b83f6289613a8b71 libreoffice-help-sl-6.4.7.2-11.el8.x86_64.rpm 6e7733266c803e5caa36e2896fea4fe599e5012751452a610903f8d4df67dca5 libreoffice-help-sv-6.4.7.2-11.el8.x86_64.rpm 164d894544ed4a05ecbf69ad8c2c46d6c5fc7fb7cea79b70339805aacb810acf libreoffice-help-ta-6.4.7.2-11.el8.x86_64.rpm f83456099ab414a7dae0f7b009a4f62db6ea612bef8c439048b85d7e6f41b9d6 libreoffice-help-tr-6.4.7.2-11.el8.x86_64.rpm e806c0810d321553f1e019230b9478faca0e9a2c7e1b2c15f7336ae84ae50648 libreoffice-help-uk-6.4.7.2-11.el8.x86_64.rpm 394ba1ba1178fe17b10387d6130b7993bf6181e1fedc51489af41c758420da06 libreoffice-help-zh-Hans-6.4.7.2-11.el8.x86_64.rpm 331aa48197e887000c33ec90eb152233758417a8ca7a34a9c23fa56e9867abeb libreoffice-help-zh-Hant-6.4.7.2-11.el8.x86_64.rpm 51bfd6c693778df95e385dab79f3a2d9dd620460aaf91d7f9841f2e7b9f7438c libreoffice-impress-6.4.7.2-11.el8.x86_64.rpm ab078bb46f726b92d551f80de1c1e4fe4dff33e544bd1f5400d1252197c48122 libreofficekit-6.4.7.2-11.el8.x86_64.rpm 31ee988803ad3d5fdffed3fcabe9b8e09ab09c4bba48da7deec1edff7bdc542b libreoffice-langpack-af-6.4.7.2-11.el8.x86_64.rpm 920b83b49d2f09d784f401be46451dbb64aaea5cd9e17dac49bdd36697f0b7b6 libreoffice-langpack-ar-6.4.7.2-11.el8.x86_64.rpm 78d7693a1d87b98587be9292817d18ad52ef17f86d20c6deebc30412781e1c08 libreoffice-langpack-as-6.4.7.2-11.el8.x86_64.rpm bf9f6b9f8785ee91989b7ce88fd895b34c7f24f1270c352c4cc305d246136100 libreoffice-langpack-bg-6.4.7.2-11.el8.x86_64.rpm 568ab8afe163d334bf54497768ad14c00d1345e88c246ddee3bcbe65bf3cbc7d libreoffice-langpack-bn-6.4.7.2-11.el8.x86_64.rpm 9d46c8162e4a6c61c0d03f4a9957455994796bbad10d405affb586bfb371007c libreoffice-langpack-br-6.4.7.2-11.el8.x86_64.rpm 2072472994ae16686268dc29d979511844c96ce03a7817a5fb2960be76b9448b libreoffice-langpack-ca-6.4.7.2-11.el8.x86_64.rpm 4a64181451223fa8ff4e23ce1f170c33bcf9fc450e56beb4246f622e9c22f005 libreoffice-langpack-cs-6.4.7.2-11.el8.x86_64.rpm 6f37ad410df8528f60b9ae8692b6e930f5b746b2a78e9dfc13f6ea062824108d libreoffice-langpack-cy-6.4.7.2-11.el8.x86_64.rpm 08db94cfa6188f782f7dac1c52d27f9cdd7a103b67ff035edc10a579fc7ecafd libreoffice-langpack-da-6.4.7.2-11.el8.x86_64.rpm e7ac8a5cc2b5c040c6763be085cbe073b446cd0c8bfe2b3472fd24e412735adf libreoffice-langpack-de-6.4.7.2-11.el8.x86_64.rpm fa0967f42a2a7ed22dcc87888d61b4f59de2d8124f621281c3cbe6ea36160cfc libreoffice-langpack-dz-6.4.7.2-11.el8.x86_64.rpm 052a14f24797706b445f29da9ec6c7a4dc996caa698f7e6df88606b4cefb0aa8 libreoffice-langpack-el-6.4.7.2-11.el8.x86_64.rpm ed1d9e061b826621936931c484880dcd308547ddf4e35e6babf9ed6bd4a97ade libreoffice-langpack-en-6.4.7.2-11.el8.x86_64.rpm 2e2bd44915aa57912b1c011f147871a08e0a4d28f1c2c25c1714d58c52380532 libreoffice-langpack-es-6.4.7.2-11.el8.x86_64.rpm 9c4eb79e70ab48de21eed1b5d165840c050cbce63fb0123e61ebb784745d2569 libreoffice-langpack-et-6.4.7.2-11.el8.x86_64.rpm a19f1eccd5d341bf50942f31d50faf245e4744be232020be202397a39cab10c4 libreoffice-langpack-eu-6.4.7.2-11.el8.x86_64.rpm 3ce74f2358e6c95eb557d18ff35dfda581c0d9c962266d2559a1af8d5e4a95fb libreoffice-langpack-fa-6.4.7.2-11.el8.x86_64.rpm 66ec9fa22aff02f7b450aa593ee2e17bf1a7a9328def2b2e218aa79a92c1afbd libreoffice-langpack-fi-6.4.7.2-11.el8.x86_64.rpm 0007da28362f134d6a29b59c0e31507819c2e8eb907cdc346f2626059ee54f0d libreoffice-langpack-fr-6.4.7.2-11.el8.x86_64.rpm 1e971ec9733d2f2b0a8104b330cdb12fb0279f7180126f3ae02c045bd559ebd3 libreoffice-langpack-ga-6.4.7.2-11.el8.x86_64.rpm d2d3b4d019c6dae924c0213ea715ed91e3097bec26584bb57abb2909ac6ee004 libreoffice-langpack-gl-6.4.7.2-11.el8.x86_64.rpm d474863b26dd82ba714788d8a5446babdf74577a209545c4afb37d75f37e50d4 libreoffice-langpack-gu-6.4.7.2-11.el8.x86_64.rpm 9c21941139e520fc8df84e541874189de039beb2699f7b2eaa6b33810a8c8b73 libreoffice-langpack-he-6.4.7.2-11.el8.x86_64.rpm c547e3730b7df5e9609bca51e1aed8ac056072c0398fccff9e35baf50d120b75 libreoffice-langpack-hi-6.4.7.2-11.el8.x86_64.rpm 90364bc4907ecd68d76e456ec4aba8fcc0ac6145a65e9528f16331463dc3993a libreoffice-langpack-hr-6.4.7.2-11.el8.x86_64.rpm e1053f16476b87fd20df4afb4b31babceba72ac39c606b3e4783447a9eb10c5d libreoffice-langpack-hu-6.4.7.2-11.el8.x86_64.rpm a47a5652b3fd1cbd20e81f01864bf30882dcfbb9b488686917a6a8ee4964d7b5 libreoffice-langpack-id-6.4.7.2-11.el8.x86_64.rpm e5fc6af405d73ed4acd1f8dbf26dc90193f37f76807b886fbbef762969a6d908 libreoffice-langpack-it-6.4.7.2-11.el8.x86_64.rpm 2278b30d85f696659b0a8b839229139595aa4f084133f5874b892e336ca4baac libreoffice-langpack-ja-6.4.7.2-11.el8.x86_64.rpm 4a6c68d4cc66833e63bc094270eaf56aa3a4c18bf6561553813a1503a59d181f libreoffice-langpack-kk-6.4.7.2-11.el8.x86_64.rpm 7e0d56cad92910078122a661f46d2d1d47b3876e5372473ecb61f8caeaffae4d libreoffice-langpack-kn-6.4.7.2-11.el8.x86_64.rpm b9d9eda16e0193f6c2de880587875f1f717a73169bd3628ed262f38e5c61c78c libreoffice-langpack-ko-6.4.7.2-11.el8.x86_64.rpm 7ac0e0b82cf9490d634ebf46652992767434abb4df8ee1e7c4fe859ffcbabc78 libreoffice-langpack-lt-6.4.7.2-11.el8.x86_64.rpm 94ef0c95d3a2fcad1446ada35b9a8e3c2856deaed94e74f511360d24c229a1a9 libreoffice-langpack-lv-6.4.7.2-11.el8.x86_64.rpm c9ac8ea5cb09ce99cf6696aea58f8c41184a8b13196fb89e1ca710d443cac54a libreoffice-langpack-mai-6.4.7.2-11.el8.x86_64.rpm b84546e33836b08193ef9f21ad24b890acdb90f00f4e04f605967b9968056a02 libreoffice-langpack-ml-6.4.7.2-11.el8.x86_64.rpm 01a3ac316f6787a3954c127250bb120a664dfdea71cd7d29a0ad2228da5b7ad2 libreoffice-langpack-mr-6.4.7.2-11.el8.x86_64.rpm 74bbfebf485064a916d2b177296680da70f16201f5782251e08afb1a2dd4aa33 libreoffice-langpack-nb-6.4.7.2-11.el8.x86_64.rpm 7596e0be67731a86d23baaa48653a88f1c9f58b7866058718a341a9ff539eda3 libreoffice-langpack-nl-6.4.7.2-11.el8.x86_64.rpm e0425b68617eac2cfe1f4778b57fbc91829bd4705ad1a46117153f6790b19676 libreoffice-langpack-nn-6.4.7.2-11.el8.x86_64.rpm 54246c31a82ae4a834c4e443f69f8208dac2b7a0f07ec9a2566aae5375987ffd libreoffice-langpack-nr-6.4.7.2-11.el8.x86_64.rpm 8ee2cb7edefb120807acf38d12b9266110f9d8f038e3d3d2da3d94775743a61a libreoffice-langpack-nso-6.4.7.2-11.el8.x86_64.rpm 3d3e1c098ea29f4b056e16f88d478dd1889ff2ddbca105d3cb415b3cdc10784b libreoffice-langpack-or-6.4.7.2-11.el8.x86_64.rpm 2bd24705f08d7fa3eed46b80b6862f879a3275fe47937b4cd709cc121bf3aeed libreoffice-langpack-pa-6.4.7.2-11.el8.x86_64.rpm b60f858a2490f6e1c129557dc27f9a5c4d0db6b5dd7ca16b852b4f61b22c2514 libreoffice-langpack-pl-6.4.7.2-11.el8.x86_64.rpm 6be7e833f030e569a69abd3f365bf6bad1a0832fa06e0aa8b55afdb138cd3a56 libreoffice-langpack-pt-BR-6.4.7.2-11.el8.x86_64.rpm 8586cdac51a23f6191ed5ee0902f1013a8d89931a5485348bae81787ce3247c3 libreoffice-langpack-pt-PT-6.4.7.2-11.el8.x86_64.rpm 1d398544cf751db220dc57b0cede75b98b8fde4905f30480f3c4b346d96fb356 libreoffice-langpack-ro-6.4.7.2-11.el8.x86_64.rpm 01809b70aef0cd108de61e294d9dec7987cd29498ff227973545b781ff8be96c libreoffice-langpack-ru-6.4.7.2-11.el8.x86_64.rpm 4120bfe2987a8e3686239e55cfbadcb75b46dbb052456987a9d3af4164278652 libreoffice-langpack-si-6.4.7.2-11.el8.x86_64.rpm 9c5db83d6d161c13fb6db8ffa620aa98028a72169e62c533a662417b86fb72a8 libreoffice-langpack-sk-6.4.7.2-11.el8.x86_64.rpm 42816f66e0b3add535d723e74ef474715559bdcdf50ea6bbf8baac0c46e7f035 libreoffice-langpack-sl-6.4.7.2-11.el8.x86_64.rpm bec9e82d634f585a2bbca25637ae8f552120f00b167d15ce95fd414e9961d2e2 libreoffice-langpack-sr-6.4.7.2-11.el8.x86_64.rpm d66eb1c40feb6849926c06c7ff09d0de1868b7a013c62d74eb3c8bfa40509571 libreoffice-langpack-ss-6.4.7.2-11.el8.x86_64.rpm 40c16a683107387c4eddc0bc20777b63451f010c89efe29a53bd8502c5a1808f libreoffice-langpack-st-6.4.7.2-11.el8.x86_64.rpm 35455447bc8b151b54be32cae0d0ff05ac977560e4b63f5ef08c00280abc6d44 libreoffice-langpack-sv-6.4.7.2-11.el8.x86_64.rpm 7d0cf2fb10d71e4516316ada6dc0fb2056f95acb9cb11a2802f9b68798b4ccd5 libreoffice-langpack-ta-6.4.7.2-11.el8.x86_64.rpm 9ceebf7aaeaaa9b5b8d0c8d0f22cdd574aca4a5f6dfda7bb0f5de1cf4ac4d0a8 libreoffice-langpack-te-6.4.7.2-11.el8.x86_64.rpm f0979c16747675ec447148eedc8e8bc8911995ab920e1c160ac92037ee14697e libreoffice-langpack-th-6.4.7.2-11.el8.x86_64.rpm b9130736d9c55c76e97a44e0dc962a8031d7e32ecccaaa748e7480df8e388a27 libreoffice-langpack-tn-6.4.7.2-11.el8.x86_64.rpm 86146a3ed6873845b74de241424108cae0d08fc2c7455f54da13f6f9f1b38f48 libreoffice-langpack-tr-6.4.7.2-11.el8.x86_64.rpm 471572257f239e4bf9d45b3c9eaaf0a66b7770503b10244134fd341588199ee3 libreoffice-langpack-ts-6.4.7.2-11.el8.x86_64.rpm eab92b10daa3e4e1f91b45e5974610165513d85f77f72901cd8eacf4974ac4ce libreoffice-langpack-uk-6.4.7.2-11.el8.x86_64.rpm 8443da58a43ab69132adccd4b6c4e1660c900da203c7d6d282f127848fc7c9b3 libreoffice-langpack-ve-6.4.7.2-11.el8.x86_64.rpm b322b352715b61ea3cdca2766ab860131b54b5a4e2d403c62f98c4a9469ec913 libreoffice-langpack-xh-6.4.7.2-11.el8.x86_64.rpm f059618824618d09a8b2775aa0ed08d9e968e6f0cd4a6f87d45528e89e8e37c5 libreoffice-langpack-zh-Hans-6.4.7.2-11.el8.x86_64.rpm 0a34d26627c8afa66059c6ddd5b5c3344f5ca01858b0d02c99d54af1c9c8d757 libreoffice-langpack-zh-Hant-6.4.7.2-11.el8.x86_64.rpm d24444aabc7278a7c20c8a3000d6dc6921a21a511e4ca669b51110ae27af21db libreoffice-langpack-zu-6.4.7.2-11.el8.x86_64.rpm c466d26a5deecbc1e28a950d03a3c15c1ee964afee2821f74426fa9cf8675dc4 libreoffice-math-6.4.7.2-11.el8.x86_64.rpm d001266648ce05a1235e7028d84898268905787686ee7faabdb72cebd4645803 libreoffice-ogltrans-6.4.7.2-11.el8.x86_64.rpm 7b4ab27cf8d16d626049f9cc4016f6445b1f3950f7308e122ec73b9d2a92b70b libreoffice-pdfimport-6.4.7.2-11.el8.x86_64.rpm 4173256e429df5eb0b28dbabe2a961612aa840b9d89b0b11f2b5cea8a2305113 libreoffice-pyuno-6.4.7.2-11.el8.x86_64.rpm bc96cfc8ccce93fd6fa9ec61d1fd02f164893754bac7e766e3655c02a8e898aa libreoffice-ure-6.4.7.2-11.el8.x86_64.rpm 008dcee0c499355dc23ceae84b819be63f3a245052e46068af0b6b0aad3cee72 libreoffice-wiki-publisher-6.4.7.2-11.el8.x86_64.rpm 87121150e754e030e1dc88f7dc4c7c4b3632cfb8cdeaaeb90fe407ddd044e313 libreoffice-writer-6.4.7.2-11.el8.x86_64.rpm 42e7244e1d162abbda7a6e4e3acbcc11a880cfb8692ce5ad8aee842026f05dd8 libreoffice-x11-6.4.7.2-11.el8.x86_64.rpm 32e691c44997fb0530c0ed4c9ba40ad4eb6f9c4a471640f11560bb1c610199d6 libreoffice-xsltfilter-6.4.7.2-11.el8.x86_64.rpm eb29356082fc1eb03f733e03503830625f605aec1673daebc65a6db85c3cf191 RLSA-2022:7464 Moderate: protobuf security update The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for protobuf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms protobuf-3.5.0-15.el8.x86_64.rpm bbe6424af46d5510d24c8e9c5d9198ac1b130582bd806a32b37d4308b803007e protobuf-compiler-3.5.0-15.el8.x86_64.rpm e8d6d89ce0937625dede41e2543fe7d68e9057b110c286da3f8ab570a42e577f protobuf-lite-3.5.0-15.el8.x86_64.rpm 8c7dd42b7cb65b53a24b1c730699b4d443b2b5191fd07885dd5e568a59f6c511 RLBA-2022:7465 nmstate bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nmstate-1.3.3-1.el8.x86_64.rpm 63466af6734f4f6c8cc09b9eeca17696fd0cb24a4cbfb52712c67c75d3c35c61 nmstate-libs-1.3.3-1.el8.x86_64.rpm 6a78b43ecc69f3e2fea22391a2e3429e739541e2705409ac22750ba029d0d922 RLBA-2022:7466 network-manager-applet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for network-manager-applet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms network-manager-applet-1.26.0-1.el8.x86_64.rpm 6de3fb69095b578fc44818250cb608ff5d1eafd2971b5919789a0f0af9838f23 nm-connection-editor-1.26.0-1.el8.x86_64.rpm 573a88541d4fe6bf303cf3f6ca9971252ffc8781b1a8dbfdb24e48a63d9f7624 RLBA-2022:7467 annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms annobin-10.67-3.el8.x86_64.rpm 001814c01eab83a5008379e3f6092e31d6df9948bab87770ac6e1c04bc8c4877 annobin-annocheck-10.67-3.el8.x86_64.rpm 5af4367270a02b2aee39756ccbcb6c37cefabf6bfaee61224595b7c5b7b849f2 RLBA-2022:7468 libnma bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnma. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libnma-1.8.38-1.el8.x86_64.rpm fa9f87d388e229cf8b3611d5d5d6db249bcc97f807fc25e5fcfa68e76b49054e RLSA-2022:7469 Moderate: container-tools:4.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 8fb2669180d717578f5407e383babf56b298d037148cf7d9c0bd7f819a707601 buildah-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2f25ea2a6be5c7011a1916c56ff82621deb8cd1d6f0217706778357723366905 buildah-tests-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm ddf136a758c754d1fd72d1438e3c92e44b6eb6b97f825cbe0d8e819e04ab1d73 conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a containernetworking-plugins-1.1.1-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 66a46e625dfc054cd5870d6167e113d10bb59505276e810ba7da03a8db35b55e containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm a0a9eb3a59768b77fa3790a555c1fb3f3b221258a5703418c0cd05b65245b4c9 crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 5053642b22732a14803ee43bcb11874bb3771e7bc9a4ddac6f46ffdd3543a154 oci-seccomp-bpf-hook-1.2.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm e554c656d1081836a1cb7ba203733908cd2d6962e5d44444ce830f7390fb18ba podman-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 490f60764e4fcbd8023ea76f67ae1388251b4652f3fb943722ced31cf84fdf0c podman-catatonit-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 52bd88d63cbbc3baaceefc983b99f22f9dcc35d413fe6bbca4546d7e60c0033d podman-gvproxy-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 42d506b86c4af61e6a5ffff7af6ac0a4ee9f22755927088e298554dbc3fc1eb3 podman-plugins-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b758f026bc43ab5ace11b05645d519087a5ec14e826a5d12f9f49979dc3e0a1d podman-remote-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm f533129f039cf6cb7f2d4d3a961305ca1f6b731f5d60994486a27d958780a293 podman-tests-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d5cdfb3bee10883d7db12f92d710a598abcdb3a607790d54f5706f5bcd9bf581 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856 skopeo-1.6.2-5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 00879c92217e659f1ab2e92d2b65b8f09c2db2a4b690cc63ee70ac2f5a8af06b skopeo-tests-1.6.2-5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 3692622d7758eb5d1b23030258ea1689ac1c7b55d93e241db3a43fab9eef329e slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37 toolbox-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4070fc688f1a94fb09eb2d1d290c15aa06cc523a40ec39a6eb2c6e2a4a49cf14 toolbox-tests-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm f2ac5e105f0c039a157be718b529c5c0d1fa6478b678cdafb95ce6388c006700 RLSA-2022:7470 Important: pki-core:10.6 and pki-deps:10.6 security and bug fix update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__pki-deps python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm 3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6 rocky-linux-8-x86-64-appstream-rpms__pki-core idm-pki-symkey-10.12.0-4.module+el8.7.0+1069+6f3de942.x86_64.rpm 07512c1525c5c5f2e8d0cd8e854a10cfe6bea277397011d10161b6a49bbaea33 idm-pki-tools-10.12.0-4.module+el8.7.0+1069+6f3de942.x86_64.rpm 59ad86761970d0125faf88d75fd1ebf7ce377cc3bc004dba6457a259f47c1978 jss-4.9.4-1.module+el8.7.0+1069+6f3de942.x86_64.rpm 639900844e2769e46d074053aff869916a34bf1c396dc8a068585c9b06d50654 jss-javadoc-4.9.4-1.module+el8.7.0+1069+6f3de942.x86_64.rpm 37da27e63ac0c3f7440ffac703a02e1efb8689438552706bb0b53e661cd8ff87 RLBA-2022:7471 libestr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libestr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libestr-0.1.10-3.el8.x86_64.rpm e1e6d6fceb008a0fce814e9664a506b16325c490e608f3e6fed42a26f7058f7e RLSA-2022:7472 Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828) Security Fix(es): * QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) * libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) * swtpm: Unchecked header size indicator against expected size (CVE-2022-23645) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828) Security Fix(es): * QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) * libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) * swtpm: Unchecked header size indicator against expected size (CVE-2022-23645) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45 libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645 libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0 libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100 libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52 libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm 8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0 libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm ea41423cb9ccd317d1a5ebbcb070b9e1a74f99ecce9c3e5051267bb64c188eee libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 7ed71d62ecf427822af3a0b9e20fc93f9e05bf2004fb7be9511d6ab5e9b3de7d libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 0ce8f2e8e6dca56e8a76186d1dfa73130956079bfd6f2818c1ee50944fc0b416 libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm d0cea4e0b6167849fb7edcb91531b3716e01887bfe9faea099bd0b8c7fc51858 libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 0c0d39b5bfd236922c883c4367c39d9c711ccdace73f36ece10088d466b889de libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 092bc77167d3a1d392f4f214a08a4eaec63d5b25c12f7f3f0850b48c2de205e5 libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm c484e35d7ad61b87ad9662109aecb110158136240c797bbc126dae3078f4414a libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 830a30966b383cdc2ed0cf28870c8af581d8a2b1dff4d0ed3fc1b4e6ec9941b4 libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 1f37a92b9f136ee4e4fc8f9bed72ca1cf858bbde132596cd5fcb789018e40a8f libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 97350f3e49235032387990bfadb529874b4cc8fdaa39edc6f13d69e36253b4ad libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6df6e0e49b97c69ff5b065e574b4c9eaa08c0ae4de46832fd1dc5c8b19abe6c0 libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm e8d54db9bd04dc675d8b44bab42de599af7c56fa68d5715135c1742056a0c6b3 libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm c87e4f8cb42bcbe09ed1c043fe3d57ffd7bc2e7f5adc56814651901db5f79a40 libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm ef4b347f15c6ab94fb348337c7856ba6acad1fbd7d425486741be6a5640a73e3 libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6c4b97bcb6b615b8c2bf886459f22fe782c05d2679c56fc1808e044feb60658b libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 087db2ba93134a2c732b4fa5fa37b3c9fc2369447398a86a1a6c10de5f467609 libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm a791d8f7e3badb26d0385db4d3c03fbc0c8c800c6f5e4b984c3fcb093ba36d15 libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 57a656c3775cd30fb0e46818c56616b2083bb5a6fc1268ef52cb2ba0bf11968d libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm b382f68a7b9146a952801ceeadf99f7ffacd5b3cdff873278f4c5e87dcf12169 libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6233e0708101c4fab6f867a5bd7081aea83c1b813f0b73b27d2dd066424feab3 libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm cfbadecd26551afc63bb73ffff83ed1a575276d71fae78783579b7200030e03e libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6118db5d391e5ea27aeb8131ed3f596d918706291f0cb7a0ad2df37aa7d8eb26 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm e2a47a6cd93b6be3cb6cfe5b2db5852bd9934cf0e959f37ee82ac6bbfadffe93 libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 4330e66821e29bc2d1412a0480aec1bcdc1f942a81da56d43653bfb9172d9636 libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm fd055f2146f2f2210fe413dcd3500896cfaaa4683cdd3ca9cb6d130f0eb56e51 libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 5853e8e20b37b510049a488594a5e92bfd022747013a2854fcbdcc21bae08757 libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm decc7c7175a8a8456aa9fcb8aa312d9a0aac9657b8cc8a427af79f203bcaf0cb libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 108e8b905f821306c1a18e368b647482898b6726e56268f57f967ba8ca263ee6 lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776 ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70 supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm 9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838 swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9 swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4 RLBA-2022:7474 pcp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pcp-export-pcp2json-5.3.7-7.el8.x86_64.rpm 7f6c8907c4010774ce95460a05c58da2ac493943168eff189beb3546d7274805 pcp-export-pcp2elasticsearch-5.3.7-7.el8.x86_64.rpm e1049e0e49a43d39b9d0a550b3c6d65356ee2a186a64d9cf8e3a81a2a563b232 pcp-export-pcp2graphite-5.3.7-7.el8.x86_64.rpm b118fcafeee32bd85c199e196edcb04c4215fc393860148013d28f32dd3d4fc8 pcp-export-pcp2influxdb-5.3.7-7.el8.x86_64.rpm 1eb430a6942f94f8c246f0b64b49879f076a9211967ee1170283a4416fb155db pcp-devel-5.3.7-7.el8.x86_64.rpm 53ed873be0a925f576b7373bd6e5b82227406aff0f7bd6d92e609ad40661f00b pcp-5.3.7-7.el8.x86_64.rpm 00ebd7b43bc8a1b8c881d0c1d90752e7f9bdea90c55d4d6bdd960b52d2721d6b pcp-conf-5.3.7-7.el8.x86_64.rpm dc498244e321fa312f5fcf7006dfa5c0c7845bf1925ecfd5d6c393ed60ed69ba pcp-export-pcp2spark-5.3.7-7.el8.x86_64.rpm f2d5bb86bcc8ee31ed2b79beebaad4cc1dbb561e6db017857dd5b7beb06458b2 pcp-export-pcp2xml-5.3.7-7.el8.x86_64.rpm 5f964378221649516161216e7186f07f765f8812f51752b3548398444031616b pcp-export-pcp2zabbix-5.3.7-7.el8.x86_64.rpm c6dc535961e350604a665fe860315640b2f0c92e49a283cba3f7ab54e2e3e712 pcp-export-zabbix-agent-5.3.7-7.el8.x86_64.rpm 35c42db07bfd2aec133c643626ade46fb99c1161eb68ed0687ddca0d355b27d9 pcp-gui-5.3.7-7.el8.x86_64.rpm 2b7d06926848b9660823faba8921967bbd086cef56ded0fd2ac80285f4f64e7c pcp-import-collectl2pcp-5.3.7-7.el8.x86_64.rpm 9bf437967b2f1ea1bdb71d0c9cacbd4769f5d51f6fe5fdc0e974da18434885fd pcp-import-ganglia2pcp-5.3.7-7.el8.x86_64.rpm 9b78bddabe9eefa71861c432eac7a7b204ec400c4fbba29242ef0ac020617cad pcp-import-iostat2pcp-5.3.7-7.el8.x86_64.rpm 02fe9376a1032c9103eb11733f9f08102b987d2315b14191bf264b1299c10b40 pcp-import-mrtg2pcp-5.3.7-7.el8.x86_64.rpm fa014a3f31fc1ca1e5691b00d83739b3b98dc9af771fa697922320edd29ac72c pcp-import-sar2pcp-5.3.7-7.el8.x86_64.rpm 3560e51b6528e51c36475c5949281077b881fe901ff1aa244b90ec6f364f7926 pcp-libs-5.3.7-7.el8.x86_64.rpm 9e17bc46a551e9edbf052b7b61639eca23fe433e0de7dc83b0bcba2cc12df00f pcp-libs-devel-5.3.7-7.el8.x86_64.rpm ca7ac79edf9b392626264422415265aac1b7c389085b94fdfccfd23359b46028 pcp-pmda-activemq-5.3.7-7.el8.x86_64.rpm 872e8abcf6fcc6c2a00990999d551ddda31be1a91d1e4a03ea6752b47fbb546f pcp-pmda-apache-5.3.7-7.el8.x86_64.rpm 67d4640cedb9b327455eb3df26a6a2248561fe24391785db8bba26d3156ce6e8 pcp-pmda-bash-5.3.7-7.el8.x86_64.rpm 51facfa1c869ba09f53e3aa70900fc2f701a4321ec94d5d1687c70bdbb73e512 pcp-pmda-bcc-5.3.7-7.el8.x86_64.rpm 15817e139b5918e6503548f997a23bd7a540728ed25efef4a3c9b7b07adf5423 pcp-pmda-bind2-5.3.7-7.el8.x86_64.rpm ea7c47bd76ea337e05476c8bc72c1b3df4f916efb5f3fbc453ef5b22a58e34bd pcp-pmda-bonding-5.3.7-7.el8.x86_64.rpm eabee9b7c021e2f1b2d78d634741220b1d5ad90508ed38d571eb68528fb8956f pcp-pmda-bpftrace-5.3.7-7.el8.x86_64.rpm 614fc74fb65feb56a18aaffcb9f14737e0233a9b937be0ef9322f6be6c93fd3c pcp-pmda-cifs-5.3.7-7.el8.x86_64.rpm e9240900588e11d294004c9474ec240b680c0fa8c53d85971ea428ade018db04 pcp-pmda-cisco-5.3.7-7.el8.x86_64.rpm 6ab58ef8e02de9a0ab041ad77a17b93e036a4055f5599baa89122094afb6f44e pcp-pmda-dbping-5.3.7-7.el8.x86_64.rpm 1ed8819ef1bb7b9d0cf2f3b6fa0fe03614235ebe1bd7d9cb43f01d5ab2daf80b pcp-pmda-denki-5.3.7-7.el8.x86_64.rpm de66b1141ec48dd4ce4ea4bc73e9796355a6f87c4371aecd197d81d360fadacf pcp-pmda-dm-5.3.7-7.el8.x86_64.rpm e7116371b14ad7f2d12b53b973bb4835916810bc23c93cb8ffbbb99251df158a pcp-pmda-docker-5.3.7-7.el8.x86_64.rpm eb41b394a2cb327dd5cf978e5e5442fa61465d0a2c7a7c936c92b442111a4a5d pcp-pmda-ds389-5.3.7-7.el8.x86_64.rpm a18e9439e2cfa458108c3203231d54289504963cb558277b2ae2adf1419572c1 pcp-pmda-ds389log-5.3.7-7.el8.x86_64.rpm 5ca961ca4a3cd832154e978a234b2366aeb821c9d386c50f7ef5f126dbfe4ef2 pcp-pmda-elasticsearch-5.3.7-7.el8.x86_64.rpm 07f3370cae783f296f3ef63f461b828440a14c0d97f5c05993c34afa7d8b27bb pcp-pmda-gfs2-5.3.7-7.el8.x86_64.rpm b81dea7bafdfff3b5153ad1c2bfe01b4e5be4ea7b4940ff7e126c126bad0650e pcp-pmda-gluster-5.3.7-7.el8.x86_64.rpm 5f4005fa3a78eb4a30877aa3ace5d1c663f3685699c17d9ad24dea89af231a87 pcp-pmda-gpfs-5.3.7-7.el8.x86_64.rpm 373e6c36ff883952ca43c985667d6d22b1460bf23c825436695b61f6f82aabec pcp-pmda-gpsd-5.3.7-7.el8.x86_64.rpm c7dd1e16b62800b5941b53b9f6f965ad6d96f54f9220eecaca89ee4d841ce5af pcp-pmda-hacluster-5.3.7-7.el8.x86_64.rpm 560a0f7086af3c8c812fda6105d9ec9d17284549539db3ca9c9982b59037bb2d pcp-pmda-haproxy-5.3.7-7.el8.x86_64.rpm efe061e03e82e894a6e563896bb1a55245aa4a7ab5ba5862ff46ae032ebba3ab pcp-pmda-infiniband-5.3.7-7.el8.x86_64.rpm 66d153a49faec50aaa7b5d439c7fc86f34f2ded2828169e06d2964550c955cf2 pcp-pmda-json-5.3.7-7.el8.x86_64.rpm 902a782334542230ef69e996a6a1d1b853789798ea3d1643b51e6ba2b6d7b288 pcp-pmda-libvirt-5.3.7-7.el8.x86_64.rpm 8f2643279569d40fe30d06aee546598a6c1bef045eab4780a0c4bdecfc5b7119 pcp-pmda-lio-5.3.7-7.el8.x86_64.rpm 9d335fe1edf4daefd1ae9476b2f37ae9127de91848d181a3a0254fc336bcad9b pcp-pmda-lmsensors-5.3.7-7.el8.x86_64.rpm 05f540c9b787a785d7d3cdccb846a2ef395961cf380859a564cab572de1026a8 pcp-pmda-logger-5.3.7-7.el8.x86_64.rpm 409849d5599e3fa27ac740cc80ab2f78b1f48c136d15c15d92f189022c5418c9 pcp-pmda-lustre-5.3.7-7.el8.x86_64.rpm 752d7c1012c438e765c2592ab3feccfb1c25f919b3bd5f5b323c0e8bed47f00e pcp-pmda-lustrecomm-5.3.7-7.el8.x86_64.rpm 783458dec76d9e1747586260565105804723d3691e05e7e8ef3e638f8debc494 pcp-pmda-mailq-5.3.7-7.el8.x86_64.rpm 854e15d307eb44a6d3327fb9f361a0a565bb86841ca1ad9a7db790e5d7178990 pcp-pmda-memcache-5.3.7-7.el8.x86_64.rpm 5b7d46fb1b55895b98cef386fbf0105d9252952fc140779b57a4000b7f54eebd pcp-pmda-mic-5.3.7-7.el8.x86_64.rpm d64902cb5d41f559ce5d33d0db74f0f78e4b6f23720c479e07e6dd357f6e97cc pcp-pmda-mongodb-5.3.7-7.el8.x86_64.rpm 6ae518e8af3587d018b42fac33081762609aa6beccf4fac89cab91cf44fadb79 pcp-pmda-mounts-5.3.7-7.el8.x86_64.rpm 16b938aa3e8180b94e7f2767cff2c0812c3a743bf825fded52678f6394ccf323 pcp-pmda-mssql-5.3.7-7.el8.x86_64.rpm 3123ce8d083dd4ffb03eb5ad07a9e1b793dcebe090dc26c960849a5a5d2d3442 pcp-pmda-mysql-5.3.7-7.el8.x86_64.rpm 245dc0e620170830161c3fe8209cf402ec1f978cd40980fdbf262660ab056d82 pcp-pmda-named-5.3.7-7.el8.x86_64.rpm 064f4f327642f255dde1ef4eef4f04920c6dc47a8953a8f2f5bbfcf774d769ab pcp-pmda-netcheck-5.3.7-7.el8.x86_64.rpm 2424f1b2fb83f55878bdd2eeb2cfa2cea5416deca67c1748419b90d218e53201 pcp-pmda-netfilter-5.3.7-7.el8.x86_64.rpm af97b89d79002cc54cb2495c53edca7feca94a4d8213d3b7e76e6584b3e65cbb pcp-pmda-news-5.3.7-7.el8.x86_64.rpm f11571ad54438d2b54796baecdfe3815420842b39b2f8199681ebf10a57361c4 pcp-pmda-nfsclient-5.3.7-7.el8.x86_64.rpm 35f0478d71860dd5735407f6efb74dd9f4ffaa35d6e4c5a103bef9825743a7c4 pcp-pmda-nginx-5.3.7-7.el8.x86_64.rpm e78b31685a0d0126fda6c4ca67102e8fe17aa5c0e2c24461e9dc58eb7ae6c025 pcp-pmda-nvidia-gpu-5.3.7-7.el8.x86_64.rpm a0903ccaa5d73ca885c7b6c9238433dde0f5ed22aad7c713692808fb369a6f9f pcp-pmda-openmetrics-5.3.7-7.el8.x86_64.rpm acda2ced8cb0e5cf25c340ff68af62118b2b54d631fb013bc3e49d87c867fe57 pcp-pmda-openvswitch-5.3.7-7.el8.x86_64.rpm 4019049bd7536ef2cfcfffdefa1ad20d14497e9ffb1b8440c0515570f65e8fca pcp-pmda-oracle-5.3.7-7.el8.x86_64.rpm 265ba7ec8906991b9d82b8741eb06a19cd09870f5e0e0f4d455805226d66d4a0 pcp-pmda-pdns-5.3.7-7.el8.x86_64.rpm 03cc10c9c45397426a6f341eb3e2281b4c40afa120de3f60e6a115d11280a9cb pcp-pmda-perfevent-5.3.7-7.el8.x86_64.rpm 5c46827714826ad2e46ca438832372b68756a23b2a814d232c24e004cb22bb8f pcp-pmda-podman-5.3.7-7.el8.x86_64.rpm f98fc7f25d25d301001a221af560a5181ee3c28780b2b7478031856797c3cf97 pcp-pmda-postfix-5.3.7-7.el8.x86_64.rpm 6cb13bada18d1817a51e19ce494ad14a965904a8f2a5426aeab20f744402b7ac pcp-pmda-postgresql-5.3.7-7.el8.x86_64.rpm 2e940c0bbc810fa465555a3ff028676adfd86f02a999464e2cd48b056eeda51c pcp-pmda-rabbitmq-5.3.7-7.el8.x86_64.rpm 715ab60a7c06980e5a05777b2d4697269ba1776d561b75c35e66ff0e1f8c8531 pcp-pmda-redis-5.3.7-7.el8.x86_64.rpm 34f3c72cc2046583e287fcf28ccbc00d8e08398f9699e56802942a0cc292e62b pcp-pmda-roomtemp-5.3.7-7.el8.x86_64.rpm ef99347ad293640a26a44dc17d1e2f7abc94df873ce5ab70aa77ac9578e449b1 pcp-pmda-rsyslog-5.3.7-7.el8.x86_64.rpm 53fad6bb65b717420b8ee72d4a95498d4b6a1ca55c390044b91e2acc5509462e pcp-pmda-samba-5.3.7-7.el8.x86_64.rpm 87aaf1312975daf6af0ffa6a579ff34681c7efd432b454f92290ca771cdc1107 pcp-pmda-sendmail-5.3.7-7.el8.x86_64.rpm d6d13dc716111db98c2376e7a3a916984f99afa1009c0341e3ae2c5b627ff292 pcp-pmda-shping-5.3.7-7.el8.x86_64.rpm 860edf1878bf5794559a23a78f2f7c17a20ca3e999af2e2b9a773d6c663ddd79 pcp-pmda-slurm-5.3.7-7.el8.x86_64.rpm 7ef94e6af4bc6384063e02cb096261e8880e5c0d61be8c18eb2e2ed466513255 pcp-pmda-smart-5.3.7-7.el8.x86_64.rpm adce64bc75f3ed731ad1dd76346a59fa47b81184b9d0c302b5ed493c21498190 pcp-pmda-snmp-5.3.7-7.el8.x86_64.rpm a3d4e26d42a018553a136e19e5b862e42cb32d62992a03a5fe0efa42db0ae51a pcp-pmda-sockets-5.3.7-7.el8.x86_64.rpm e4ab1e5d7a26a2f9223f120c0b7e703622410f4df956df2acc72a6eb2668cc59 pcp-pmda-statsd-5.3.7-7.el8.x86_64.rpm 2dd774c88537feae2dd76e3a9e6cad37ec5aa603d32da9398935df31ba85607e pcp-pmda-summary-5.3.7-7.el8.x86_64.rpm 04a905391cb95625ce471b18343a1cafc0a0bee64a75b90c600313d3b446824f pcp-pmda-systemd-5.3.7-7.el8.x86_64.rpm 37942492caf9f786859b2415103e5b4ebc0c69267dea087ed893d394deef005e pcp-pmda-trace-5.3.7-7.el8.x86_64.rpm 788b42135383d3d3e29891c9088d746a3cec73b335ceba123d74cc7485d92c4f pcp-pmda-unbound-5.3.7-7.el8.x86_64.rpm 7e9f02e2b312b580a969985523797ae105f67c75dd7d0fdb4d8e8ec421648e26 pcp-pmda-weblog-5.3.7-7.el8.x86_64.rpm f012e167eaf763d8908d1f56a85659cedb77ce3b2f0568af50734daaf19c0880 pcp-pmda-zimbra-5.3.7-7.el8.x86_64.rpm 1f5bc88a2cf9f5aca0ac3f814ffb56b8852a2b5fa690adc9c676b004c2796377 pcp-pmda-zswap-5.3.7-7.el8.x86_64.rpm e38b1b32a225ac0e773a10c49df473113c602d2e58702446355d5d5944936b48 pcp-selinux-5.3.7-7.el8.x86_64.rpm 0c80aba651a6d738b1437bceb7d9cc88423603d523e67de9fdb3a574248afa81 pcp-system-tools-5.3.7-7.el8.x86_64.rpm f0e0d1b2ec9871988473d800224d427031dd19725080490c70fb944a21c5180a pcp-testsuite-5.3.7-7.el8.x86_64.rpm 92021870bee5c92df2860e2ca5860da23dae9a47b27e4e47cbcc9b91816a23c8 pcp-zeroconf-5.3.7-7.el8.x86_64.rpm a4325860c9a9e0b0dd9fb5801d5b83fa6fe6f3368a37519e2236ad70b2ad4a0b perl-PCP-LogImport-5.3.7-7.el8.x86_64.rpm f3cdaff8b6ad441b42acb20d38a12e845bb46a782f619c9b0aa7bef10f5cdc01 perl-PCP-LogSummary-5.3.7-7.el8.x86_64.rpm e334610db252b3d394c6009ff10086f012404fe268ca8517038b66005e1a36d6 perl-PCP-MMV-5.3.7-7.el8.x86_64.rpm 8f348ee17908a1b0c01e846baa66b3ce580fb02c13267fae67af3e6bb0dc94cd perl-PCP-PMDA-5.3.7-7.el8.x86_64.rpm 061290de4584cf422e1b7c33be79c4f6511997b7cfeb55ef7c0f3ca01ff9d646 python3-pcp-5.3.7-7.el8.x86_64.rpm 4ed2c50a8db6aa05bdc0cc68778bd1a99ef408e618fce74ef366cce4b6495d74 RLBA-2022:7475 flatpak-xdg-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for flatpak-xdg-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms flatpak-spawn-1.0.5-1.el8.x86_64.rpm 092dfe7f72bc10fa6b176644a851b3f7139c0c8f0b9d6dc5c2957925fb9dc54a flatpak-xdg-utils-1.0.5-1.el8.x86_64.rpm 214e2855e04dae2982f996b9c3cc6fb99644190001a4e40eb56908c88053ee10 RLBA-2022:7476 xdg-desktop-portal-gtk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xdg-desktop-portal-gtk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xdg-desktop-portal-gtk-1.8.0-1.el8.x86_64.rpm a85062ed9546335a63ee9c70d9af983ef3cdec29f602b3f07d985cfd390627d5 RLBA-2022:7477 motif bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for motif. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms motif-2.3.4-18.el8.x86_64.rpm 86ecba4ceba64fdff89a7f101adceb50d239963cf57986f5d25a33bf2c95571c motif-devel-2.3.4-18.el8.x86_64.rpm 43139d0c2d1505c072a6a3da122d89a597308f6e4ba0ddcb35c0bb73036527f3 motif-static-2.3.4-18.el8.x86_64.rpm b2238946b5e91bbfe0aba25eb8dc14f1209c844bb36cba8697df79d01fc0190b RLBA-2022:7479 xdg-desktop-portal bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xdg-desktop-portal. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xdg-desktop-portal-1.8.1-1.el8.x86_64.rpm 4fdd21063a36da9322478dd1539c5c0b5150467da0d9deebad8276e7e5736c2c RLBA-2022:7480 mod_auth_openidc:2.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_openidc, cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm 6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102 mod_auth_openidc-2.4.9.4-1.module+el8.7.0+1061+55d14382.x86_64.rpm a7a7267411bd04af8caa7eb94670e7a9891c5013d3d13ee54f1249db8f50fe0a RLBA-2022:7481 python-qt5 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-qt5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-qt5-5.15.0-3.el8.x86_64.rpm 84a3a09fcbccdf1a11d7b7c0480468953b090a06e1e609c92ecf9ea68025bb29 python3-qt5-base-5.15.0-3.el8.x86_64.rpm ab6493c339c96cb6a973f3e1132c5f341ea7bd8f81dc0b1444bff9d661a57233 RLBA-2022:7483 adwaita-qt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adwaita-qt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms adwaita-qt5-1.2.1-4.el8.x86_64.rpm d8f67653bc6e3a790140c8429aa913b72ac6fb74f03f43d435e133befb9d5e03 libadwaita-qt5-1.2.1-4.el8.x86_64.rpm 87fecd70e89aa29945a28fa96049f3511b7240218c0d4f5accf1e6db0bbfafd8 RLBA-2022:7484 qgnomeplatform bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qgnomeplatform. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qgnomeplatform-0.7.1-3.el8.x86_64.rpm 64fb1dfdeff8c07b8660f54caebc5749cb648980112637684248d419fc897b91 RLBA-2022:7486 qt5-qt3d bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qt3d. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qt3d-5.15.3-1.el8.x86_64.rpm f642deb151e9167b281d810050bbcfc12fc5c7f52d759374312c16165b49adb1 qt5-qt3d-devel-5.15.3-1.el8.x86_64.rpm 8d93413a59bc9466e402d5f66fa3d31d8cdb730c4861c6f236a762bca5f3f27d qt5-qt3d-examples-5.15.3-1.el8.x86_64.rpm e5fd66c3c33d003cf23cde7a101ea5df935c06b390903deb595718d6849feebe RLBA-2022:7487 qt5-qtbase bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtbase. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtbase-mysql-5.15.3-1.el8.x86_64.rpm dc359fa9c118d821e66dfb9bb15d5f8cb81214aa97059b17f053543b164b2283 qt5-qtbase-5.15.3-1.el8.x86_64.rpm dc4b63e65a81d43416a0e4d32d9d32f766fa1b1d84725631f41127353beb9fae qt5-qtbase-devel-5.15.3-1.el8.x86_64.rpm c3b18b7f39aff76909fc8a46a972178b119927ad3390082cefb2f39aebf93ddb qt5-qtbase-examples-5.15.3-1.el8.x86_64.rpm 0ded827c44ecf02c587c99ef8644b63dba7fb1861c93005d437eb3fe88cbf33b qt5-qtbase-gui-5.15.3-1.el8.x86_64.rpm e0cd9f93b35b74e750bf6b8c261852162e62ad5370b2b8c0f945410c3e054445 qt5-qtbase-odbc-5.15.3-1.el8.x86_64.rpm 0a326827cf4afdde4766f906369ebf8d4528fbed72547a40135c93dbe8a17fd2 qt5-qtbase-postgresql-5.15.3-1.el8.x86_64.rpm 3b161f3710bc965e70dfd1b827301ce1602132e50e9317ed889f4cd5daf447cd qt5-qtbase-private-devel-5.15.3-1.el8.x86_64.rpm 75a20862f2c2d64cf34c949c5251bbbc187d513240d15a08eb51782bc14ca2b7 RLBA-2022:7489 qt5-qtconnectivity bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtconnectivity. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtconnectivity-5.15.3-1.el8.x86_64.rpm be299dd4932be3deabe76096da6c38eb2be939a7a31213729c2739ea0d93e92f qt5-qtconnectivity-devel-5.15.3-1.el8.x86_64.rpm 7613a3fff4065c91d19671415f34e42340e3bfa7fa14f6bb9bd2f3383cb21a4f qt5-qtconnectivity-examples-5.15.3-1.el8.x86_64.rpm 0f221bcb899ad158aa0305ccec25b21c9d992c3315bedb6569f1b8083776e21b RLBA-2022:7488 qt5-qtcanvas3d bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtcanvas3d. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtcanvas3d-5.12.5-4.el8.x86_64.rpm c73830a1359e8613357d6481cf21cc3e3c681eaf5aeb3de83933c32a67930bb0 qt5-qtcanvas3d-examples-5.12.5-4.el8.x86_64.rpm 372384db2ebc1b1060416eb037fb407c9ee7070ddab840bc6a665293b249e9fd RLBA-2022:7490 qt5-qtdeclarative bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtdeclarative. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtdeclarative-5.15.3-1.el8.x86_64.rpm 81491b48ae87d0a1ff98e6ecb754acc649785dd754a2109795bef669542da1ec qt5-qtdeclarative-devel-5.15.3-1.el8.x86_64.rpm ebf169329015e35b3e644bf229d92fdacc1a88d42d1b2afa533fb290cfa841ee qt5-qtdeclarative-examples-5.15.3-1.el8.x86_64.rpm b37e87d2f25e77843b77268ea4e3d2f3d52f34e075f60d40681420ce5868efdc RLBA-2022:7492 qt5-qtgraphicaleffects bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtgraphicaleffects. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtgraphicaleffects-5.15.3-1.el8.x86_64.rpm 922bf366ab50acea4ed46c3b02aa697dbe2a8a93374f38a538b9e470e434f294 RLBA-2022:7493 qt5-qtimageformats bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtimageformats. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtimageformats-5.15.3-1.el8.x86_64.rpm 35f5a9434f1e60f2eb3bcb3bbda936e06749a8fb8dea14bbbc844ea2fb0e6d7b RLBA-2022:7494 qt5-qtlocation bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtlocation. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtlocation-5.15.3-1.el8.x86_64.rpm ca43c96196e6a8115fbf0cdf01a4489ade997dbd58048e924228498acd7a0097 qt5-qtlocation-devel-5.15.3-1.el8.x86_64.rpm 5bffd4353bab449e1392becd7834bf272be7651bb68a6794ce2f8e7ef64c8515 qt5-qtlocation-examples-5.15.3-1.el8.x86_64.rpm b189cdea1cafc1ca79c697f4aa1665c36f4608b8115df8a76b57e41643b6a246 RLBA-2022:7495 sip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-pyqt5-sip-4.19.25-1.el8.x86_64.rpm 21db75baab778c8cd4ec6c33f44121a6532765db7ee209d7f9846b38528da3d5 python3-wx-siplib-4.19.25-1.el8.x86_64.rpm 90031a5995d9cb103e42d1a3f843f403f8a967738f3cb5ae563f9d12a1147420 sip-4.19.25-1.el8.x86_64.rpm c68c49f9f4c35640f1d4650b4e787019062837c576c291ad21ff95c460b4e803 RLBA-2022:7496 qt5-qtmultimedia bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtmultimedia. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtmultimedia-5.15.3-1.el8.x86_64.rpm 1e948901d495ba214f0cf4e587ee090fcf45e891720c0110f77c3f7334c7344a qt5-qtmultimedia-devel-5.15.3-1.el8.x86_64.rpm 81822f107128ae673ef95bebd307e7df7d6dead5186814de1ad54de356522e41 qt5-qtmultimedia-examples-5.15.3-1.el8.x86_64.rpm 3fe41f0f9ec7114616ad8e821087cb67530c043f8dd0a1387cad67a4c6ff0209 RLBA-2022:7498 qt5-qtquickcontrols2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtquickcontrols2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtquickcontrols2-5.15.3-1.el8.x86_64.rpm 91ff6355e91bf7fe76755e23c8ead79a6fa87c4f252d8e6aaba7ead0d5fdc9aa qt5-qtquickcontrols2-examples-5.15.3-1.el8.x86_64.rpm 63e7a95e7a582c2d5eb16ab5e562fd91a1373fe43bd56f47b32321584087b902 RLBA-2022:7497 qt5-qtquickcontrols bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtquickcontrols. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtquickcontrols-5.15.3-1.el8.x86_64.rpm e841695428818cb159ba7374630821ca61b5c031b7b7c626d8608a90ab763dcf qt5-qtquickcontrols-examples-5.15.3-1.el8.x86_64.rpm 8824d8b3cffaa241822275917734a2895be9512f23237c6b7dd78fdcfd7bc921 RLBA-2022:7499 qt5-qtscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtscript-5.15.3-1.el8.x86_64.rpm b83e41de8c573f77493eb68b2f7d0b6fadbd3780c862ab4d842f8625dd9f5266 qt5-qtscript-devel-5.15.3-1.el8.x86_64.rpm d59bd5ed20649f3fe127a33e219167c0acb851430a925ae2ae90fc8d17e9b840 qt5-qtscript-examples-5.15.3-1.el8.x86_64.rpm a13d7b60509e536da399c7616845b03f02a2b32b766aa47c1e26dc1eb659ef62 RLBA-2022:7500 qt5-qtsensors bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtsensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtsensors-5.15.3-1.el8.x86_64.rpm dd4d07314abe281986d456785a42987f84b669116f22cda25d5b51c13520e6f6 qt5-qtsensors-devel-5.15.3-1.el8.x86_64.rpm 33692a009b3d3696018cc619d05a208a45121b882e0a8efa610d5fb210d485e7 qt5-qtsensors-examples-5.15.3-1.el8.x86_64.rpm b6e291636b85e6e0ce8ceff41b66c45d8bb855b05dafe996d16b604c7412d3ea RLBA-2022:7501 qt5-qtserialbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtserialbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtserialbus-5.15.3-1.el8.x86_64.rpm c4db81d111757495d20ca6a7b68973c7e927a8d51396c163117f31000b81b3bf qt5-qtserialbus-examples-5.15.3-1.el8.x86_64.rpm 50d8960d7d9c4254094cc5705434fbd6541ca8d820fb396a7f41f13d0d75e84d RLBA-2022:7502 qt5-qtserialport bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtserialport. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtserialport-5.15.3-1.el8.x86_64.rpm 09eaa88aabaa25fd0f3d2de55688c787571ebd157e1519c8ac9b4c36cb899faa qt5-qtserialport-devel-5.15.3-1.el8.x86_64.rpm 14e06e875b9033364a60bdaa8e0fcc4d2bd3d13f6cbd863471d9db02341b3f31 qt5-qtserialport-examples-5.15.3-1.el8.x86_64.rpm 29c28edda395b9cc97d2e70bfc48f2c82e4577652069d130ed35eb6eb2166483 RLBA-2022:7503 qt5-qtsvg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtsvg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtsvg-5.15.3-1.el8.x86_64.rpm cdbf4491b61986e0ee8cf4414e8070c8a2ca6d764ccb28080171454892e33ad8 qt5-qtsvg-devel-5.15.3-1.el8.x86_64.rpm 3f24f40dcde1e14c935483eb9817603474a86669cbdc10fa4482547b8ac5ab3f qt5-qtsvg-examples-5.15.3-1.el8.x86_64.rpm fbc08cea6cf9f441676ff57ddc1f83801e1bb61c406e5e9130e70f4f39783e8b RLBA-2022:7504 qt5-qttools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qttools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-assistant-5.15.3-2.el8.x86_64.rpm 4786d6a96af720485ec88fdbe3bdaddfa6a61d3d087d56d0c5bc274229280b42 qt5-designer-5.15.3-2.el8.x86_64.rpm b588430701a85e8277df8f757f3e8b4374d8867b9115d8fbb5b903a01edcf7ed qt5-doctools-5.15.3-2.el8.x86_64.rpm 793533bdaf94da8620a691031351a0ac17770ef7e3256e94be2b450afd201d08 qt5-linguist-5.15.3-2.el8.x86_64.rpm 5eff7f0d07543875cfb87014838ee97e538245510cc9574ea9bfd51d8e56f772 qt5-qdbusviewer-5.15.3-2.el8.x86_64.rpm 7e1f1b3baa1205fcac3da36229d869f85839cfbc277dfed7bd8021f414e37f1d qt5-qttools-5.15.3-2.el8.x86_64.rpm 3e61f3b558d79f3a3132909a1ba6e6acd16ded1a93f5bd5dee748ecab73c0b34 qt5-qttools-devel-5.15.3-2.el8.x86_64.rpm a23ae3009fe541d82308977d2b4b5075f621e055a13d6e664fd29d7e6b1ce2d2 qt5-qttools-examples-5.15.3-2.el8.x86_64.rpm 2d11266ebc3e3d3fc23e27f5bb078ce38b24bf9d569bf03f7a21f1e0ac8e48fc qt5-qttools-libs-designer-5.15.3-2.el8.x86_64.rpm 2c97dbd47aecc3b760b3c2d9284150bed26a1b97e65ac70fd09eb827bf11e512 qt5-qttools-libs-designercomponents-5.15.3-2.el8.x86_64.rpm ff65c962ce9aac0643920b97bba917dc2ca0b543b6abe5ed9ec063ac361291d7 qt5-qttools-libs-help-5.15.3-2.el8.x86_64.rpm f44d75132665fe1e52e6caa7dceb6be280b5b2150187cb8db3f5eae7e33a3598 RLBA-2022:7506 qt5-qtwayland bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtwayland-5.15.3-1.el8.x86_64.rpm 8769fcd7c04ba583f9aa0c984102efcdd0e5bc577c4c69643b0885163b293c83 qt5-qtwayland-examples-5.15.3-1.el8.x86_64.rpm 330235f622ad7be14595e9ab681a33e0bafab0c261928bc39dba45dbd7e112da RLBA-2022:7507 qt5-qtwebchannel bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwebchannel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtwebchannel-5.15.3-1.el8.x86_64.rpm b5c86d314559448bf51dace12132f8f443f0c120428c4a101d70a4bf25a33be4 qt5-qtwebchannel-devel-5.15.3-1.el8.x86_64.rpm 1976ea364e37d03ec715bea5a4e6e3280c10cf657ea2c518229bd8278f0f3a48 qt5-qtwebchannel-examples-5.15.3-1.el8.x86_64.rpm f59a44f98929e829dad4e3e13e21851b64c8def131f0bc093a78e9531cc1f3db RLBA-2022:7508 qt5-qtwebsockets bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwebsockets. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtwebsockets-5.15.3-1.el8.x86_64.rpm b4d4be2415c4b0e76a3503f8a4c0b18902e7e7a5dc1b1c3162c6f04f64af2b95 qt5-qtwebsockets-devel-5.15.3-1.el8.x86_64.rpm ff3872ded5fcbea63b4e0b5a2d784890a4340d73c577e7b76cd96aa8e8ed3169 qt5-qtwebsockets-examples-5.15.3-1.el8.x86_64.rpm 79320ecf2fb9a33400357523fde690f8feee0b0387b6b0f1e70afe532436fcd8 RLBA-2022:7509 qt5-qtx11extras bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtx11extras. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtx11extras-5.15.3-1.el8.x86_64.rpm 78e2cdb2bfddb5279ebb67065511d1bdf66f319faf4c3e87bffffc0f8eee4f35 qt5-qtx11extras-devel-5.15.3-1.el8.x86_64.rpm 8f6b8ee7473805e8b5626940f0874ba8cbc0a5577052fe7ceaf760782f036643 RLBA-2022:7510 qt5-qtxmlpatterns bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtxmlpatterns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qt5-qtxmlpatterns-5.15.3-1.el8.x86_64.rpm 1794e993e0845db24c600f3e8c3273016bad7b19d1e9214a8a6afe8b6c54db31 qt5-qtxmlpatterns-devel-5.15.3-1.el8.x86_64.rpm 9441b21ff1425ac34927e4d4d9e559dd4d8f9579977d4c4d5282025d3ff7a42e qt5-qtxmlpatterns-examples-5.15.3-1.el8.x86_64.rpm c19c46e282d2f0415f76f45271d9782ca8ebefffd8143406a755f0303e077eb3 RLBA-2022:7513 crash-gcore-command bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash-gcore-command. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms crash-gcore-command-1.6.3-2.el8.x86_64.rpm c62a9f19df7f7cb1c3c040df142636139a09406b030fdb601071fb30223ee44b RLSA-2022:7514 Moderate: fribidi security update FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order. Security Fix(es): * fribidi: Stack based buffer overflow (CVE-2022-25308) * fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309) * fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fribidi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order. Security Fix(es): * fribidi: Stack based buffer overflow (CVE-2022-25308) * fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309) * fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fribidi-1.0.4-9.el8.x86_64.rpm 140455eb981d3ea0296f5719b1026b29f8e6316caf885301b5607af38483edec fribidi-devel-1.0.4-9.el8.x86_64.rpm faba78d5909ef3519964138414e4eb0d3a72a2b0251d407382b1351e9dcfd1ac RLBA-2022:7515 papi and libpfm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpfm, papi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libpfm-4.10.1-5.el8.x86_64.rpm 494bf65d6993e1af506a1289877dee03a3e8acdebdcedc3d56f0e6b175ff064b libpfm-devel-4.10.1-5.el8.x86_64.rpm 0596e3333ad57a7cbfb1eb7205ff0fb33f8eb32b6651eb5962a8dda3c39401d0 papi-5.6.0-16.el8.x86_64.rpm f3e910ba21ae8d8c84fb4a863e4e974a44a4c98136b70072c23dcb041744a7f6 papi-devel-5.6.0-16.el8.x86_64.rpm 7460659d870a675802deb1ae4b0b40a12c7ed26bb6568733a0529836fc58b526 papi-libs-5.6.0-16.el8.x86_64.rpm 923001360211247341c2e32a8aaad2649ce1fe5ae82902426d96f39750724bbb RLBA-2022:7517 cscope bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cscope. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cscope-15.9-11.el8.x86_64.rpm 3780ca8f1158a74d20e09e7290b502ca445d9e9bf09e8335a0d771a682946580 RLBA-2022:7518 dyninst bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dyninst-12.1.0-1.el8.x86_64.rpm 12a4d57690143e288538a6eb2ae079e312f2eaba2baaaf9e24ae018daa455a7a RLSA-2022:7519 Moderate: grafana security, bug fix, and enhancement update Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348) Security Fix(es): * sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * grafana: XSS vulnerability in data source handling (CVE-2022-21702) * grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703) * grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grafana. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348) Security Fix(es): * sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * grafana: XSS vulnerability in data source handling (CVE-2022-21702) * grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703) * grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms grafana-7.5.15-3.el8.x86_64.rpm 34d4eb252d22d335ff8f1dc3ce270d6e7b354af349860e74a39d430c57b6eff3 RLBA-2022:7520 fence-agents bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fence-agents. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fence-agents-all-4.2.1-103.el8.x86_64.rpm a17f6c28510305c719c3cf348360783fc48c50897dfcf6bf7bf88ca89161524a fence-agents-kdump-4.2.1-103.el8.x86_64.rpm a2856762f3dc88db905edfc92ab1e6029d7fde90796c1e304f377a225f3b88bc fence-agents-kubevirt-4.2.1-103.el8.x86_64.rpm 5544706a9d2b7aa240ac81883b8c2f01c445a124ae7ab0b5898271d5c1b63608 fence-agents-redfish-4.2.1-103.el8.x86_64.rpm 5e65d9e3b9ccb0357a7b0d13bd2102f095a342c4269c016e404fc9b762e1438f RLBA-2022:7521 tftp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tftp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tftp-5.2-26.el8.x86_64.rpm de51b5d08092f05a1fee9c26441c20c3fce36f76015ea2e14d4b59d16490cf04 tftp-server-5.2-26.el8.x86_64.rpm f408a44bc2cec703d78478ae3359aa2ca95962d644d99f80ec93c8a02bee38f3 RLBA-2022:7522 go-toolset:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for delve, golang, go-toolset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__go-toolset delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm be45db0ede57b9a9918c621811a3aaffb944f36ae3770ac645652983d9c3e4a7 golang-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm 72e59fc43726600f51602f6126e1e9efb12dcdd525b52613b360a91d6e28faa7 golang-bin-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm d7246676585f4146b680bd263905fc30fdbeae6895072b8210a6b31081682d39 golang-race-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm 89897b9645358e6c32cd4c81afbcc34046c15277fe62873a5dbfe0a8afa79ada go-toolset-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm 95b1b435a0fb426600a6538735c5a98a44af71e0fb4de962a6cec1cc1e63a4c8 RLSA-2022:7524 Moderate: yajl security update Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for yajl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms yajl-2.1.0-11.el8.x86_64.rpm daca84d640abaceed94eaa249bcf7f85df19201cb41e1be7a908d4ee8a12534e RLBA-2022:7525 valgrind bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms valgrind-3.19.0-1.el8.x86_64.rpm 3e53250e78ff4505641d6fa1665cc6a8e0a51972017e583191e3be1622f367f0 valgrind-devel-3.19.0-1.el8.x86_64.rpm 6b9ff3fcba5a03dacce33410d00ff6052bfee362e885e4f0e06ef7405c0ce218 RLEA-2022:7528 ruby:3.1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__ruby ruby-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm f4004fc8f1fbe42230b6b849a4f2c487dd17a20acd7e046d1b886ca8adba8391 ruby-bundled-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm b46fe1f1f933210251597c5b927c4e78baa1066f0a0e2a859a898c4f7ebc77ee ruby-devel-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm c659134bb04568a0f5cad3ea76e2be9194ed247070fcc2700fac4c027e78482e rubygem-bigdecimal-3.1.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm 975f18976d211bce5dbefe7ee440a278295698833a6bb4d2aa8f059e34de1002 rubygem-io-console-0.5.11-141.module+el8.7.0+1081+f0a69743.x86_64.rpm d8d1cc2f174f93e306e1632ea97393986e5d8a0a2f793baf916c2690e814ae5e rubygem-json-2.6.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm 00bea2d03d3884ba228fc716df85e81537ceaa4fd80c67a514493f2bf83cd46d rubygem-mysql2-0.5.3-2.module+el8.7.0+1081+f0a69743.x86_64.rpm c2c8f820300b260bbe21037c29d089b5c685d944baa6c9a33f992de1ab7ef3b5 rubygem-pg-1.3.2-1.module+el8.7.0+1081+f0a69743.x86_64.rpm f08ddfa2201801ae0272d077d8f5ced1fdf3c416bd330e5569710739be04ca76 rubygem-psych-4.0.3-141.module+el8.7.0+1081+f0a69743.x86_64.rpm bb252b125709fa8b52739a2c8e948567e15e6b8887c0cc4f5650f26d2d38f8e2 rubygem-rbs-2.1.0-141.module+el8.7.0+1081+f0a69743.x86_64.rpm d51cc0321fbd69dd43120d6b872f026d9cd5831dec96aa50e96df871a0edb4dc ruby-libs-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm f313a918d61bd5ae15f35483b3ee33f9ad655bf1c4467de40c205fb9a86c0565 RLSA-2022:7529 Moderate: container-tools:3.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__container-tools buildah-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 08f071670fe28ccd63e3840c62819c2b25d38d2287c3b63605626114e544a6eb buildah-tests-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpm fca90c4be12b6d3078b7d6d682abe4434fa6d956f655bc1731879a67dc6c425c conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3af0efabcac69789ce47fab592ecc29899095fcc2be8f8a6201db544376bc188 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b containers-common-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm abc291da55ad2008cc79640586a2576695de84b8e44f1c5e48dcaa247a689cc0 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466 libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6 podman-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 110128fa91767a24299b7b40ea77ad98ccb477c231150e66c88370e3ea47c249 podman-catatonit-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm a14d125bcc99bcd1c40e8a2cb27780e523c46a358f60cace03f148289f3ab0dc podman-plugins-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 6e9b5997c40ffd4377bcacd10528f1cc38441c04d0afbecbb192e5aeb29c271c podman-remote-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8b4a1ed3a0c0618e372a5cf506864b6b336f186190d9016056a979d46bcf4847 podman-tests-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm bddb7e274024806035e7a1e8ca34d2716099d36084975731d99de1df93264289 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111 runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2 skopeo-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 2d660e8c7f3942d3f67cc57ddbf24728bbe91c63b10954e46d93171785575532 skopeo-tests-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3aac4f2b10e39dea615da0233a32a6be25ac7294fee165483e1e63c5ceae577 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05 RLBA-2022:7531 evolution-data-server bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution-data-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evolution-data-server-3.28.5-20.el8.x86_64.rpm c567ccf699097288b1861e2d0ffcaebea3ea10b9508af5d7ad1c84c4a7639db6 evolution-data-server-devel-3.28.5-20.el8.x86_64.rpm bd6853c427551bbe5935caa4eea7b54008a050b4567457d16fcb71366cd50047 RLBA-2022:7532 evolution-ews bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution-ews. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evolution-ews-3.28.5-13.el8.x86_64.rpm a7c0a8ee534fa31c5b6c06f92db8f26259f8bf9eb6b2c025dbf3e145dc84c545 RLBA-2022:7533 cheese bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cheese. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cheese-3.28.0-4.el8_6.x86_64.rpm 1cd8f7b5f5f9888477b2bcefcb93b5be066a6590b2c641568c3f6181b6285412 cheese-libs-3.28.0-4.el8_6.x86_64.rpm dd228cd48876d9151169a9ea0a1a7038423436c278231b7f41c1acc0fd374499 RLBA-2022:7534 mod_auth_gssapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_gssapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_auth_gssapi-1.6.1-9.el8.x86_64.rpm 59074b8ba68426e1ac78f601751ae94a3e7346d77490e26d283cc0e43456b588 RLBA-2022:7535 stress-ng bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stress-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms stress-ng-0.14.00-1.el8.x86_64.rpm 09e5fede907ee0ee3049dfa622b48736b808198032227dcf05bf1ca2a911ddf9 RLBA-2022:7537 llvm-toolset:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for compiler-rt, lldb, lld, llvm, llvm-toolset, clang, libomp, python-lit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__llvm-toolset clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 4019138e3c053013c923f5b29f8f3d8d6665f4bc966553b1722eeb52358105cb clang-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 32adf389fd14a400c7714351b91ec01d22d2b7df50c66609f2017855d5313ef7 clang-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1e9ae8c22585124989957376e435e92ce7a611f9daaa4a6b884b91f08e4f91ac clang-resource-filesystem-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 570e5e123e4974910864f4b56d333412341822f894bc90a416968a0cd0b79487 clang-tools-extra-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 9683b2d54e15e1273295c2799595215d7e4019716f54a130eaa5285e5aaff13e compiler-rt-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 905b2cc701a2f5785c66604609207bb95341c6a02281d01db8d402aa02688a19 git-clang-format-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm f36b25e63fde63ec7bf1aaa3ca23afd3ddfbe58d94445462370fad7df7abc402 libomp-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm baa0ee79ba1778f3f7f8b0002202d6f10bfd9b62fc4556a642887ee14c3ff543 libomp-devel-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm 8d2a2f4aa8c374c2769dc4bd7cf93dc52e2a2a5b2791a9498db42669772ef424 libomp-test-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm cbb90c4dc11520376ced98704d10028185ad9002dbb7b23c664b803b7db2b2ad lld-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 6761adc0183eb3675d79aedc216bccb6bf03187e7658d323bb8271fe33d8007d lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 648cbc670df222c9909ce2f4b07681ded1a5b574446b574d0e658844101a07ea lldb-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 140e0416e72aa350be3bd1a30189f19121b937f498cadf919bf213ff8ee5f18e lld-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm b3cf3fc434fbccdfd091bf2642dd4453fd31d1a36f30a73370953a54cb95200a lld-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm ac581ec9fa342d38c1661237d260ceff68c8daf89a9cbfa823291cbb804cdd56 llvm-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 025dd2e04a1d7ec2304905d7b86da94d7ffb46c372e72ecf2d91766d25f97996 llvm-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm c86f75512c19a0afae71e4eaaeb9e09613df6c8b00295c6ad01b6e89cf20fbae llvm-googletest-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm e66365da6dea97c46700dda219e87d2770be98f57b07cb687a3b96955a8be915 llvm-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm db3cd9ebcbda9282c40e20386e21a30ebf6d178592284ddc2f4a86962761fd0b llvm-static-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 39e1f7fa0779fb638208df74797475233aa11a53a02a342f8ab820fcd2713983 llvm-test-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 436b8dca43fbf2daf6065a807d9a4f5036d71f8cb3b4e98e805509329f2021da llvm-toolset-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 698737c91866add724a82bc2b32e6793a7e4ba02fd11d100f4ed132fc59dbb48 python3-clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 8f99ba21f59cf14ff807ae1042b5ffd06471af728c2a7dd0bb3cf0fe70d0d9b7 python3-lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 365f752b0027d7cf9015fb9ddbf566777801d9d12348801b4a45fcc9d2889d29 RLBA-2022:7536 nautilus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nautilus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nautilus-3.28.1-21.el8.x86_64.rpm 11e67d5eb29255f83fb1a0372e062574d29d28288ca886f009b7f9ff6286c20f nautilus-extensions-3.28.1-21.el8.x86_64.rpm dc186b11c5054e93db20cc7e3fff78501893fd9296dd7928b46ec4d42136f47f RLBA-2022:7538 systemtap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms systemtap-4.7-1.el8.x86_64.rpm 8d56d3f7f25b1f0ab7989ff2aedccda102c6373c51d80a97c006edf9c4e3c8a1 systemtap-client-4.7-1.el8.x86_64.rpm 94c0288987480045fb0360a19e6d57508930feb1357b047c75317cbc59e83bc7 systemtap-devel-4.7-1.el8.x86_64.rpm 3e3173bc5da8e298e2b65f563bbfb017e313d582a7d2f656c2d8ed7719c37a3e systemtap-exporter-4.7-1.el8.x86_64.rpm efacdbcf9a4f2a485bc1eec0673086181fbb3033311917ba6dc8e15760f3ad9d systemtap-initscript-4.7-1.el8.x86_64.rpm c53ee31c2b1b778c4b0a2bdcc1f177c2c9992c1f34f0c9137c0ff1cc67d35c0a systemtap-runtime-4.7-1.el8.x86_64.rpm 40c542c53113d9bdd6da664e1ba4c1299c4c0ba3615499bc6dc376c52046a0b6 systemtap-runtime-java-4.7-1.el8.x86_64.rpm bf9152e68d8091ad35919157a52cd06d3546b3cb64cc85832a682cfeb3f463d9 systemtap-runtime-python3-4.7-1.el8.x86_64.rpm c39170333c363e4789894a8989db4965d986e1fb8fc9236f1ea189b8b2bf9ddf systemtap-runtime-virtguest-4.7-1.el8.x86_64.rpm b786f6bd861b7a5d8ad4c754587ffa696942aebc3792e0e65bbd1bf70cb0b75e systemtap-runtime-virthost-4.7-1.el8.x86_64.rpm 3bff66eb561bc80457981900ea1af095cc3047101321b009910b86dd475ed28b systemtap-sdt-devel-4.7-1.el8.x86_64.rpm 5284d6c6e5f93880d0520b6954a4e3401bca1be7dc8e492280105760bd21c905 systemtap-server-4.7-1.el8.x86_64.rpm e51f53c8099209f335ec89005182df88b9a071b181c73a1b1bc441fdb61d7487 RLBA-2022:7539 libgdata bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libgdata-0.17.9-4.el8.x86_64.rpm 75d4aa16927ac0856e33a7da1df09d7f51c39b0a94d686e5172c151e2935e090 libgdata-devel-0.17.9-4.el8.x86_64.rpm f627bf3a4956c741c8ee7e1a6be9a5ab9bde87a9e139cd42d78fbdac26368fc5 RLBA-2022:7540 idm:client and idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__idm ipa-client-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm 0f015ca9126dbf6adf72e89def936c93720d13bd3ab39996a07681cdb1e6b968 ipa-client-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm 5627c47f2914e7189d0ec801e8d67e9c32ebd02b79728197995f6d952274d6df ipa-client-epn-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm 89d738551a9170fcc56efe16ed2266831877c8de1d6fc8b636920afb52a22826 ipa-client-epn-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm 16f5cc61defc5d37520dff7f5de7040f82348302fb8e08991f54dde571b6c5e9 ipa-client-samba-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm da345ecd063a748b18217785da5198cd2c19e3a917c8ca0b4107fc2c11db3b37 ipa-client-samba-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm ec80710ad400a4e43d183499f085e9a737e1bdd47ed4a1ff1b01c0eb0711b90e ipa-server-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm 980b7ef4cf9445bb17abcdee681a311357eaaf62a14e927998807201360dee40 ipa-server-trust-ad-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm 62e27f55b52932cad8b3fc8b029753ae0b93cb1a6dc16e1975d7c62c9cd690ff opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLSA-2022:7541 Low: redis:6 security, bug fix, and enhancement update Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873) Security Fix(es): * redis: Code injection via Lua script execution environment (CVE-2022-24735) * redis: Malformed Lua script can crash Redis (CVE-2022-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for redis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873) Security Fix(es): * redis: Code injection via Lua script execution environment (CVE-2022-24735) * redis: Malformed Lua script can crash Redis (CVE-2022-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__redis redis-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm 993f80907022da689b54d819c1393c56e94702a0bad0edaeb5517a2db1d874f9 redis-devel-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm 41aaf2f81f3473eefbae0eaa3f6d923b5886dbd8f1517b4d3d3143387e41f404 RLBA-2022:7542 subversion:1.14 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 731bbe79595f494e581798261d3910616e1bcdbae2ef7f981b215453cf5af705 python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm b9453a4cc7f514c6b5d4fc9635d55f1cf4c75dc38cb5f774719646b8d4e57001 subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 2089246938eb318f05ba38eeeb5cbba0cf766f9b1d2add194ed624c6123087f5 subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 7a0b71de12a9a00fa90c466b489c01106b0efb79cb41ff2eba7559ae09236461 subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 117b77bc021f04f14594b64923ba7fc5d339150c0c18bcaac03c2830da8dc238 subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm e08caf8753168202fcb5ed6b9c38e8bb3897bfa19054afb1746cd7ea65d6fd4b subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm 2f746f1042536d1ba89f58dfb7530418fc05f4c86af692b53a40239cb12a83a2 subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm af4c11a20b867799fde5ed6bf4dfb553c6904e4e9c46a1824273bb52354920a0 utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpm 58848ac20523ce7eb107a8b9ce747474ded2c3f55f12f1f6c23511e45c735e6b RLEA-2022:7543 subversion bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm 16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm dc6f52adf8b10fd6b240c72b5ea1d62e0bbbe3d5bcc47380339117fc1953eb3f subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 802bbeaf38639b1e42096fab308cf1bf8efe3df3a1b3c3720b7a5ac3939b7265 subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm e5c5a44c338f73bb0445575d27aef6a4b1a7d1ae1f7246b7bce10b6fe5782f47 subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 152d3eccdd9928c4d97f5a47117cbd0d224ae5b7c9886e3cb0414f645ad85d82 subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm 1837382796e426c99566575486d20468e5e08d54a9feec23a37f37664c105dd1 subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm c019433f83ba3f54fb215c6f1a57e182c582f2f7b5aba6659278fb65bf8216cd subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm a181eeabc6eb2ac08c26cea039b8776703ecd01ee9af67eeddeef97c3765418d utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpm 58848ac20523ce7eb107a8b9ce747474ded2c3f55f12f1f6c23511e45c735e6b RLBA-2022:7545 zenity bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zenity. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms zenity-3.28.1-2.el8.x86_64.rpm 77daeb3134ae0280c77c265cca49f6116c1390eaf3b1c5ff3f0aa910d1a4b54d RLBA-2022:7546 createrepo_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for createrepo_c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms createrepo_c-0.17.7-6.el8.x86_64.rpm d828fa1173d6e0b69249da5c965b6ba3cefd303fb390e485c768f4c540e044c0 createrepo_c-devel-0.17.7-6.el8.x86_64.rpm b1cfbe29d70723acd0b6d83293a4c66c85c78f82c8db6abf5d57b4b771e0bf43 createrepo_c-libs-0.17.7-6.el8.x86_64.rpm 035cc734eb41822da21c95e6216047da87841c6e556820a07eeb3cc719b0c6b2 python3-createrepo_c-0.17.7-6.el8.x86_64.rpm 16e83c095a1c3a4654b4ffcc714e7e93fb5c93a626f5e6199116f082a4357b62 RLBA-2022:7547 gnome-shell bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-shell. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-shell-3.32.2-48.el8.x86_64.rpm e50fd5ed905dde25ae8c673f919534cf9cbb6c339dc177b6afa62173acd319ea RLSA-2022:7548 Low: Image Builder security, bug fix, and enhancement update Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Security Fix(es): * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for cockpit-composer, weldr-client. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Security Fix(es): * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms weldr-client-35.5-4.el8.x86_64.rpm 19c8b20aab31af7a43f7ce7a80a348a686adb340b65afda7f6c4d83d25da3485 RLBA-2022:7549 rust-toolset:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rust. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__rust-toolset cargo-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm e2aacb62b0a04d09e65f77eb3e6956c748376c05f6256ba7280f11242641aa8c clippy-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm b55e65d264a1edbf17dbdad814cf6d1f0c5d4f2eeb74f2fe3b544b7b8696ab5b rls-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 9292c0914637091ccfc4548010a93309190976fbafabac36017f925663261924 rust-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 597b07fc8c22d4eaab9d77ed221630f5c150dde5294dcdba7bab4016ed400129 rust-analysis-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 9847d19de31f87f39a3e468cd7dc83888b38031bf3392fea1421bac0c39b9dfc rust-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 05711b5b03f2ce3d391815ff403527b9b4e60fe998d3be1ee6028688d2efa1c0 rustfmt-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 616c1c9558c7be14424a13966220a074edb22bbf1182e1a97283cf5d8b322054 rust-std-static-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm d52db076d0134d47baa62886125b1f01002747e35c1f68f533234f97f444edc2 rust-std-static-wasm32-unknown-unknown-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm af938bf001ff2a4eac39304861b05bfae61be186e5216dd9e618f6c58f208a44 rust-std-static-wasm32-wasi-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm 0e339fd20d42a84dc580f26aa49abf344a75c21ad438cbda899da6f81551cf3f rust-toolset-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm f322dd661282948b26c683217b23d22ddfb41312c27b9afd50e8b9ca9736d462 RLBA-2022:7550 gcc-toolset-12 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-12.0-5.el8.x86_64.rpm bb3bb847cad532741692cd6ee4aec06211ac3813583ac942506f14de75cd4492 gcc-toolset-12-runtime-12.0-5.el8.x86_64.rpm bbe5cbe4d6baa144f7ee3b6e9da8858b68014eb39b1bb695e7cda3202627dd7a RLBA-2022:7551 open-vm-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for open-vm-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms open-vm-tools-12.0.5-2.el8.x86_64.rpm d83ff8d9a0ee44ee88557c14e9d0e0ba1f914c46156a3b7a72110c4c75d4e18b open-vm-tools-desktop-12.0.5-2.el8.x86_64.rpm d26ad2544eed14cc8820cd48dcf587e2297bb23b69453540f39594eb1ccaf93f open-vm-tools-salt-minion-12.0.5-2.el8.x86_64.rpm c480803dfafaea1e468ec9fc6abaeb0ed847e4bc9652ab0c2d3ed6bdcf24a83f open-vm-tools-sdmp-12.0.5-2.el8.x86_64.rpm 1edeea21be29003c5601fd52c98b39935890b33f5cd60fa27f28653260b6369f RLBA-2022:7553 nmap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nmap-7.70-8.el8.x86_64.rpm c7cc616c87e54be47898034e3444f285fbc48dc1737a35c08e1ca53b580355ca nmap-ncat-7.70-8.el8.x86_64.rpm b347dd5a8f73d8a60b1cccfc7430f170ad6cdb62a21fc992bd9e9bfcd7f62763 RLBA-2022:7552 389-ds:1.4 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for 389-ds-base. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__389-ds 389-ds-base-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm fd4b8faa3537e6c1ef532c877e223a0352bcbf54a5b9b45b7436afebd70bc5ef 389-ds-base-devel-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm c85f42e199ab8b7796366b25ac528cff406ec413dcd43e67ebb60d055b867969 389-ds-base-legacy-tools-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm 0fb9e7794dd320934e292c19fba27baef221225ab2b85d3f635ecb6493822fa8 389-ds-base-libs-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm 90b0f1fb9776623272a2c53715d6be6c6bbc0a1baab67d9618c10be91668bb65 389-ds-base-snmp-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm af40980abeff5a461d09cec4b5ed13facd6771a658af746f29f71348b2fdb60b RLBA-2022:7554 cockpit-appstream bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit-appstream. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cockpit-pcp-276-1.el8.x86_64.rpm 724958dd3523c678b448d672af28f3414cf897a54eed5e1d95b308dbd24ec64f RLBA-2022:7557 ostree bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ostree. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ostree-devel-2022.2-5.el8.x86_64.rpm d9cf6e883b8e44fb17e72fd716130ff67e206778409ea9c95dc624e57d693da1 ostree-2022.2-5.el8.x86_64.rpm 6470b17fcf53a73a65c26431776bdd19a96694fc30153338c34f37c48f71d821 ostree-grub2-2022.2-5.el8.x86_64.rpm 6d647b18115b7a3b11910ec40e37f01da98a46f6cab9c2b18667930f6c2b70ab ostree-libs-2022.2-5.el8.x86_64.rpm 1418313af255a42d78576f3469a52569a8f3714f631f830d7327af87e97d9429 RLBA-2022:7559 lasso bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lasso. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms lasso-2.6.0-13.el8.x86_64.rpm 5db64309da2504980bd16ab3f66dd92e05db01b6cf53e6d5303f3fe3794f1c26 python3-lasso-2.6.0-13.el8.x86_64.rpm a48c00e1bbe40437cea54bdb5110ab9a69fc60270c404e1ba36bd27ac62f09d8 RLSA-2022:7558 Low: wavpack security update WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode. Security Fix(es): * wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for wavpack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode. Security Fix(es): * wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms wavpack-5.1.0-16.el8.x86_64.rpm c6f564012bcad071e357f40e1fe440d2450dce3d861234012db5a202195959ab RLBA-2022:7560 frr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for frr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms frr-7.5.1-4.el8.x86_64.rpm 40349304cec6cea14759a270205c06b16524aab130b788b6dc1b76e078e85ffe RLBA-2022:7561 crash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms crash-7.3.2-2.el8.x86_64.rpm 38f279bf1df01be9e2748c6e471e0bf5a567a59ef29c7d5480e5e129adf6f8d8 RLBA-2022:7564 gdm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gdm-40.0-24.el8.x86_64.rpm 5209a4abbd8ef0be8f1f69de8cf1aa055cf62e89887c0820d5c7460d3bce1135 RLBA-2022:7565 gcc-toolset-12-gdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-gdb-11.2-3.el8.x86_64.rpm 113e65b0dec403e8d27a46c7614e0d52cbaa8ba67d219a7584d27cb96e3a4389 RLBA-2022:7567 evolution-mapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openchange, evolution-mapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms evolution-mapi-3.28.3-6.el8.x86_64.rpm 7f231b19829cf1654fa538ebb26420543f4afaf10fc28342c9dc46790c17a214 openchange-2.3-30.el8.x86_64.rpm d360ecf50110f43847ce2928f60ce179feab205b108d75c05efe0e4cdbf84362 RLBA-2022:7569 gcc-toolset-12-dwz bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-dwz-0.14-2.el8.x86_64.rpm ec341f65c71d9195a1cdb04667c4a918343269a7eec2916e770e26c5a8891e4e RLBA-2022:7570 gcc-toolset-12-gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-gcc-12.1.1-3.2.el8.x86_64.rpm 5f036e6fb65cae4c6e167c2689023e3829260ae53ee5eed33eaaaa1549f6853d gcc-toolset-12-gcc-c++-12.1.1-3.2.el8.x86_64.rpm ff3c8e494a47328d8b81142cde56486cdee179aef1627015f538b28afaf3d533 gcc-toolset-12-gcc-gfortran-12.1.1-3.2.el8.x86_64.rpm dcd4889891cbe7e92a591f9698fb865a74fff7e2163015e2dbd8fcc69a7ed761 gcc-toolset-12-gcc-plugin-devel-12.1.1-3.2.el8.x86_64.rpm e105fc2a8b63133b835544259e25d89cf005e78f9f3ca67f11d0091c3dc181ba gcc-toolset-12-libasan-devel-12.1.1-3.2.el8.x86_64.rpm 04a5c62c5052f74f31475db17553ab88f39815d74d1011733396dc7418901948 gcc-toolset-12-libatomic-devel-12.1.1-3.2.el8.x86_64.rpm c2112498e3675685653f75031aa2db6dc146cd168fd0784cad59a291858fdd0e gcc-toolset-12-libgccjit-12.1.1-3.2.el8.x86_64.rpm 844e43a44a05f61e469a7a6f329f260c76759af94ae2887ef9e95e194236de85 gcc-toolset-12-libgccjit-devel-12.1.1-3.2.el8.x86_64.rpm d5376961ba53bb5cd32ae4a4c045b76e7624d2646b2d8a38c962c246eecfe129 gcc-toolset-12-libgccjit-docs-12.1.1-3.2.el8.x86_64.rpm 39eb2a4794ae978a24c235dc832738ee081e0a7f9a20fe2fd47d72959a7f0b20 gcc-toolset-12-libitm-devel-12.1.1-3.2.el8.x86_64.rpm 8d8f6a9da3763dc20c3c10290992837e3700b8d43304ef190d4ee7c1979cdb20 gcc-toolset-12-liblsan-devel-12.1.1-3.2.el8.x86_64.rpm d78f4e39473a53250d264b7a036ecb0ac3a1b6a96e2c1d0f50c7023d34ca658e gcc-toolset-12-libquadmath-devel-12.1.1-3.2.el8.x86_64.rpm 28a06382e87a7cae81b765c06a0fd1983d35e4f7c88dc805b0770f8e429b16ac gcc-toolset-12-libstdc++-devel-12.1.1-3.2.el8.x86_64.rpm 56afc0a2684b3e900c5f285c85676f37ac205aad636fbbcd2847266948a8058a gcc-toolset-12-libstdc++-docs-12.1.1-3.2.el8.x86_64.rpm e637572b30d1d1a8e6db6c777e86dfafa79abe24df5466d72cc18a4e3943a1a9 gcc-toolset-12-libtsan-devel-12.1.1-3.2.el8.x86_64.rpm 1275294233303e79d66a11eb356125b64f52d145cfbf93ae8dea363b162f7e4f gcc-toolset-12-libubsan-devel-12.1.1-3.2.el8.x86_64.rpm 9ce1496e0e9aa163826496d9d8318bd09a60ccfcf110a7bd8bc94257814e033b gcc-toolset-12-offload-nvptx-12.1.1-3.2.el8.x86_64.rpm a909abaf339eaf0284fed8e9bb42e9e9956741cb3856097e2834ffe997143290 libasan8-12.1.1-3.2.el8.x86_64.rpm 3ee84fc5ca2c33cb691553ab75a03bdc2d025c62e2b10a899645783673603f6f libtsan2-12.1.1-3.2.el8.x86_64.rpm a2d5ba8622e3567c659ec0b9e5f4ab52c16ed69196963fd7c28f1af66f01db8a RLBA-2022:7571 gdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gdb-8.2-19.el8.x86_64.rpm f1e95f9044f66c46c5993e65d2523a747bff3d68c8604faa755782621ba20b61 gdb-gdbserver-8.2-19.el8.x86_64.rpm 814ae1ebe3a48cb22f6560523d00abbf64a6639dedcc9264b020dd88f966ae94 gdb-headless-8.2-19.el8.x86_64.rpm 8b56d064df49f1c40fc59c0d4e135adc0dee8468d858156db5a97cd530dae191 RLBA-2022:7575 tigervnc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tigervnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tigervnc-1.12.0-7.el8.x86_64.rpm b1230611e255b50351678f6737c1f8492c6b1da51bee071d5d342e0a7be97827 tigervnc-server-1.12.0-7.el8.x86_64.rpm 59c2cede9288429ba79bd7a91edae3f87a5d15b35b48f0736e99a0804057afe0 tigervnc-server-minimal-1.12.0-7.el8.x86_64.rpm c9f6c21d2e3453fbe478ce1b8becc66701e4a08d236867bcd84511412c96c6c0 tigervnc-server-module-1.12.0-7.el8.x86_64.rpm 4af29ff868785ef4a86269a6642378bf677db753842b7238e2d309af6faa0d02 RLBA-2022:7577 sscg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sscg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sscg-3.0.0-5.el8.x86_64.rpm 0db1c510948262c20b6a1ba7c848b0a3d4afac4f0761094362458e22ceff4253 RLBA-2022:7578 pulseaudio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pulseaudio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pulseaudio-14.0-4.el8.x86_64.rpm e1e3f78e4963e6e3064bec42d2e0b94ede5d43f1d4b4c63600350ea20b78b44f pulseaudio-libs-14.0-4.el8.x86_64.rpm 4c725cafcf46b59b2a5d22a5623d6f320a89a4bf3e26a9a36b9b46a6831a3840 pulseaudio-libs-devel-14.0-4.el8.x86_64.rpm b8e962c9c1ee69f72aa7584965ef961f767772cca70fc37b327faa980bd6e572 pulseaudio-libs-glib2-14.0-4.el8.x86_64.rpm 1181871bcec0d4f9f9f3deb1a70a86e7364097002845ce07a8c3b35e25f0b2d4 pulseaudio-module-bluetooth-14.0-4.el8.x86_64.rpm 203c17e03a8109ec0e8c87fb083892a386e95a0ad1652bea8eeba4f9dbf8280c pulseaudio-module-x11-14.0-4.el8.x86_64.rpm 5ffb362c7115ace38214e5fdde216cb1ae23b92e0dccc585fe3c8b03809c1375 pulseaudio-utils-14.0-4.el8.x86_64.rpm 95f025d51b234c77a329bdccf4b654b005d143fa1af6cb27e64ec2eaa1d4b2ea RLSA-2022:7581 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python38 python38-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 70a9edf01a0c1901f64757580ba7fa770b350f3e26e1820427d35e78c5681376 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-debug-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 68ea827137ec2715f8675b9393368075f33597c97882d2474cdbb77ac13f430f python38-devel-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 253671a0f9ab494983d37500e7dc829490a27f0f1ed658e7507934536da2a8c2 python38-idle-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 83b0dee7242733e100b23cd0eebd2c77a0b47c507be10f5bc061c1c68dea88a9 python38-libs-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 8e5504e8f1a06bc9c1523594028e3b7b78217286647adae1f2b8715b29d05735 python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpm 7867930af945070f981bdaa8645a2cbabe1c20d36c2afd88a03cec102bfef2cd python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-mod_wsgi-4.6.8-4.module+el8.7.0+1063+20f2b9a4.x86_64.rpm c88aa51cce97a21315a074389892d42df391b98d18eba4194960548ef3e0c9e4 python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029 python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm 5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm 2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm 1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm 74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057 python38-test-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm 33e3bc0f8a3badff0a2c98d23517c75af46747be5c6f4180071f87c5f44bad7c python38-tkinter-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm c8b73f455de91cc9f1768ae07b0a39feca6f85d12f132be4165c279d6844adc7 RLBA-2022:7582 gcc-toolset-12-annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-annobin-plugin-gcc-10.76-5.el8.x86_64.rpm d81c0388932c920a78267d834ad095e3a44522d5c311043611b5c579ada2d5ec gcc-toolset-12-annobin-annocheck-10.76-5.el8.x86_64.rpm b8a9952c6f25520cb101e48561e554431c7ebc3e5fa04c3f9e741bf2f69d0f0a RLSA-2022:7583 Moderate: xorg-x11-server and xorg-x11-server-Xwayland security and bug fix update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xorg-x11-xtrans-devel, xorg-x11-server-Xwayland, xorg-x11-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-9.el8.x86_64.rpm 243dbdac755b81ceb4e08f4e5c8df7deaaa6c2fda23af5c512040cca4d620303 xorg-x11-server-Xdmx-1.20.11-9.el8.x86_64.rpm cc382d22f8c338a0a30ddab2206c1c42cbec25b99fa0bf390c859eed820d8596 xorg-x11-server-Xephyr-1.20.11-9.el8.x86_64.rpm ebb46c4978564fd1539eff728a8de6db3f75dedc744592683409984af203371f xorg-x11-server-Xnest-1.20.11-9.el8.x86_64.rpm fdef8f253dd920e91d2f9ba799a5b3e5b95204756d3824f261a4a93d66a72f7d xorg-x11-server-Xorg-1.20.11-9.el8.x86_64.rpm c9f4a94db051b499721b84bb3eddc0b5d895ed8a2c393fe20ceee4f6ff6f22da xorg-x11-server-Xvfb-1.20.11-9.el8.x86_64.rpm a99a7511f43cca2d6edcb49e9fdcc4d26c4ffaff15f9fe6cbae504e06e3a10e3 xorg-x11-server-Xwayland-21.1.3-6.el8.x86_64.rpm d4122e38cb1e98d83ab05954f3917ea6860595f3656084502f4d4aa7352d16d7 RLBA-2022:7584 lorax bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lorax. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms composer-cli-28.14.70-1.el8.x86_64.rpm 566b39066cf83df3757322bd4f75f5e2ad0e204e8ffcae974577a9f9dd88c385 lorax-28.14.70-1.el8.x86_64.rpm 3fea44f5a18ae5d2b1b2ba431a42bf55200ce6687ae39ada916bc19620f40e86 lorax-composer-28.14.70-1.el8.x86_64.rpm 6e65bb0a8210698bd1744c0e2af233843232ebd500ecc872db7ab16e7c8f6f40 lorax-lmc-novirt-28.14.70-1.el8.x86_64.rpm 7fdbe69127d3b95fe7fdef36f7e7decd866e5c9efdd661d440e8385e311fc185 lorax-lmc-virt-28.14.70-1.el8.x86_64.rpm 103ba3e44ec3b2bb7155a5498f94ba1661549e19321a071b009c00b4480a4970 lorax-templates-generic-28.14.70-1.el8.x86_64.rpm a35538ec540cbe2e3fe0c7d40fca5af6e2062e0f72bc9bc5a9f90c1c26561f6b RLSA-2022:7585 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561) * libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562) * libtiff: reachable assertion (CVE-2022-0865) * libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924) * libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355) * libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844) * libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891) * tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908) * tiff: Divide By Zero error in tiffcrop (CVE-2022-0909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561) * libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562) * libtiff: reachable assertion (CVE-2022-0865) * libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924) * libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355) * libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844) * libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891) * tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908) * tiff: Divide By Zero error in tiffcrop (CVE-2022-0909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libtiff-4.0.9-23.el8.x86_64.rpm 737b891cb4bbb38adaa29d482c291dd2bfca79cbc69dfc4113209859109e7641 libtiff-devel-4.0.9-23.el8.x86_64.rpm a0d3483698c48679e4a03e5b5e33aa8303fd8a82a80c7c652f3e0789712e0f85 RLBA-2022:7586 tlog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tlog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms tlog-12.1-2.el8.x86_64.rpm f14e1d63221cb540cdb0d5ef775cde86b9c6fb6ccb006313d95d06ae9acf4cd0 RLBA-2022:7587 gvfs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gvfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gvfs-1.36.2-14.el8.x86_64.rpm c3396af3cd19238ac1e3d4e0bd180fcb365fe57ba37c790dea55fe006a31a7f4 gvfs-afc-1.36.2-14.el8.x86_64.rpm 799de4e17e055a49ea4e2af95b8f193c9a41ef84cb4db9a167a4e164d44f7c1d gvfs-afp-1.36.2-14.el8.x86_64.rpm fe026dc45a4f1f1458c4081f1fd18323ffddf681c696ac2997945bf260242e4b gvfs-archive-1.36.2-14.el8.x86_64.rpm a3d9985a0c62dddc2f2e67b80e837d07c73111ef81e24ec0d474214726f66e07 gvfs-client-1.36.2-14.el8.x86_64.rpm e3e750d027c8ec2ffec10035204d5b86f5622eb8f3a6646db64a9fbbdafdfd1b gvfs-devel-1.36.2-14.el8.x86_64.rpm ed4893212db9f34afb44f4db740f92b9e09dddd995107878a3286d6cbdeeadcf gvfs-fuse-1.36.2-14.el8.x86_64.rpm bbe4bb376c304201a1ac23eacd1056661044b7a4c4d049ee59bf883f3de4b64c gvfs-goa-1.36.2-14.el8.x86_64.rpm 6ae54c65bed8a86d9637012094096385e864ead1762208e1179297d4a4de78f7 gvfs-gphoto2-1.36.2-14.el8.x86_64.rpm a0f4c1b85f1d5db4e2441dbdbecd8c5741a6b73e0e5c977082ae61b097b4f1ce gvfs-mtp-1.36.2-14.el8.x86_64.rpm c12ec2c5bfa6fdc98d882d830cf04681bc03cd0d0bf11360520cc238da2d8efe gvfs-smb-1.36.2-14.el8.x86_64.rpm 73db3c63640040334dcec02cc4f280c30fc852c94ed3783694c310251dd867ab RLBA-2022:7589 yara bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for yara. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms yara-4.2.3-1.el8.x86_64.rpm bde176a3a4a81a37e20fda6ce6066f6cc1efb13af44d5cebd454d39a624ceb7c RLSA-2022:7592 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm ed32c93d78b87f60465c94b954b49bb628a596faa9471a9abedd7e4f211c2b7a python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-devel-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm a08dbea41abb325d9bde0d9255ef00bda9f75d57c110053fe8d3de5c63fbff04 python39-idle-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm f2ffd5105213b5d051686c36392d8e8d5052cb81340c8a179a30c3656b11389b python39-libs-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm 0a70fff839ea02331a39ed679f5e3eae58501bbad631e7ab0f20657091b06a86 python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17 python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm 603e3ea442bedc2f6a2ab4f9b17eb4b50ee5bcfefdf2a90ac14eb32fdf1d3938 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm 49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12 python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d python39-test-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm 9c12c6ed6455bbcfcde117dabce43a704c0313b56d294e6603cca5486868fa8a python39-tkinter-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm ac9255a15b872f0eb7811bb94786ba64395b4569d85d9f1be078638c5e83b509 RLSA-2022:7593 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107). For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107). For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__python27 python2-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 7015c1da853f57364651a1f73dfaad46ebeb1c296a6a927431754dccac1acfc0 python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm 6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm 8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f python2-debug-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 3e7704a761bd3ad81d595574ca315458a858e0ae769cbb76bfefbd34c5143cf6 python2-devel-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 4009f30096acfb9b0337901f47fd585a5bb0486a185a988c1b9bd1bcf3674662 python2-libs-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm cf5083603baeb48b91afdc0da35c2ce52ec937582fd8a57944e0dcb9dcfa6da3 python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.x86_64.rpm 1257203382679fe9daa7dee565a99b8ffdbcefd743bda938d3facb7c15e9a571 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9 python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm 39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm 638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768 python2-test-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 57b5085932b57f43f8f5359f190033586be37c14121eb5da7cfe8462118d345f python2-tkinter-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm b7fa41bc91383b205ba3e8f20d8c3f397d6d353a616f88f9381a0c7974b86a6f python2-tools-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm 1894967e20dd3a304945f1bdef29adcbee4ccf9d34fb14b7d7b0e47ac9566964 RLSA-2022:7594 Moderate: poppler security and bug fix update Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for poppler. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms poppler-qt5-20.11.0-5.el8.x86_64.rpm 43f58f930b820bd24c5e0f2937b59f98b2ac8e147e173bcde2b493ba594ab44a poppler-20.11.0-5.el8.x86_64.rpm 6a337f32ddb1e52c1f81b62612990a2aac41f6e458765193ce30373621d5008f poppler-glib-20.11.0-5.el8.x86_64.rpm b8dbaa5539bbeae4a7d9190d083b1975a6330895e16e46e110c6b01098ac875a poppler-utils-20.11.0-5.el8.x86_64.rpm 498d99a9b5a9f9636419f7397fbfff5fc6881b7e2f4f8e8c197985d0d474e11e RLBA-2022:7595 bcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bcc-0.24.0-2.el8.x86_64.rpm b43d3157bece9cf3d3140b27f39eb65b0e6098dd7660183af2506e36f415e808 bcc-tools-0.24.0-2.el8.x86_64.rpm 394c2506dd1d27850ca14d3f452f1bc348b6a290b70abc473a84b5a298504f5b python3-bcc-0.24.0-2.el8.x86_64.rpm 742246525d38e5c6ec71e75544d4e4de06a004e0ae3451ca81afe84ce24e985d RLBA-2022:7596 sblim-wbemcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-wbemcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sblim-wbemcli-1.6.3-16.el8.x86_64.rpm c3d4b7fbe0bffc67fa1f645f42cb02f7740ad77903ed01a37c3473057e6081be RLBA-2022:7598 bpftrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bpftrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bpftrace-0.13.1-1.el8.x86_64.rpm e8a04ca8b6e3e2e02d815e31bbace35f1c90201bbd04c44dcb33c0ac129c2662 RLBA-2022:7599 xmlstarlet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xmlstarlet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xmlstarlet-1.6.1-20.el8.x86_64.rpm e42355fc28e75e550270e7d44a037b4d5af17830fb2eac4acbd594c9561b5ee0 RLBA-2022:7600 boost bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for boost. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms boost-1.66.0-13.el8.x86_64.rpm f9b5aabf4efd891eff03865b02a5216c09a3ed805813d7fee22967de35990d89 boost-atomic-1.66.0-13.el8.x86_64.rpm 81a52eb6c974139e40dcc0a2a0b0a74df75f8bafd69d4d040c8564c73a6f051c boost-chrono-1.66.0-13.el8.x86_64.rpm 13d9d6b2e16d4ed399364fa302313002eda8954a1972660b00766f69603ca130 boost-container-1.66.0-13.el8.x86_64.rpm ca0e76f6a19edd3f438282d1410f3bf889ff9743a5222c45c786e878ac1dd4c3 boost-context-1.66.0-13.el8.x86_64.rpm 51455cfaa766bd42c0a9b162c624d7907573cfea8afee2a583222ded31173448 boost-coroutine-1.66.0-13.el8.x86_64.rpm 9c1b1e698193294b66986bcd3f8860689a03cc2d68e037be6071d6f80ef0fd07 boost-date-time-1.66.0-13.el8.x86_64.rpm 0ccb46e0969c83decfaf0d1cc6e31eb7383d146828bf50ba01201be26d7b0dbe boost-devel-1.66.0-13.el8.x86_64.rpm c16446b23a0fb0483e9b0416e82cdeb09b2505efd3262e465d7744f35872fd1b boost-fiber-1.66.0-13.el8.x86_64.rpm e08d739334ce5b91b2e6778c0897ea96649dcac433e257d78e8a87a2ef1faece boost-filesystem-1.66.0-13.el8.x86_64.rpm 7c7c3f708ab3908ab8c5ce9c24b4afd90f763fe81f56f61981b581221fbda82d boost-graph-1.66.0-13.el8.x86_64.rpm 7846d71e0283f478bfe2881d5d54113176723b19f6188ce7361fc39048b1f91f boost-iostreams-1.66.0-13.el8.x86_64.rpm 3ff6762969cc3795e195c79c57462271aa7cc0924a97a47f5f620d974ed9b159 boost-locale-1.66.0-13.el8.x86_64.rpm 73d5da8e7c6c2d9b7f2c744ee40c3bd2a20de668607bf657a1ec53d456fd401b boost-log-1.66.0-13.el8.x86_64.rpm 2d4281a6f52c320656ec0942d8f2028342d0102a3de12187ab6b78bb5e0bab39 boost-math-1.66.0-13.el8.x86_64.rpm 03863ce72ac7080d25b1779b07bec8c7834275709b99cf69a76a6cbb515cd9d2 boost-program-options-1.66.0-13.el8.x86_64.rpm 4b5301b5d92d824990af374b3650f63d700fa46960d1459a9b8da95e6c4b5931 boost-random-1.66.0-13.el8.x86_64.rpm e33fb27c611253dc3f4eafa516a83f9eb05c1f49bfd7d65caeb95e9de8edfde8 boost-regex-1.66.0-13.el8.x86_64.rpm 5aa01be320a94051756382fd78878cffb8fdf59a97fab23a6a750d0c9d99b254 boost-serialization-1.66.0-13.el8.x86_64.rpm 1dc4557a94ae44f131959cd41c5b993a0d71c0261bca77d7eea5b71d692136b9 boost-signals-1.66.0-13.el8.x86_64.rpm 9fcd1d616e52673d76a38c49956cdf51de61de1a6030c272f16dfa35c2861f54 boost-stacktrace-1.66.0-13.el8.x86_64.rpm 6826fbdd8457d8dc4f7a3a680d5b3b95d7a7febc99b5c667cdcd436f11262f15 boost-system-1.66.0-13.el8.x86_64.rpm fcae1cd46f216c9c9741894d2c4995d7ad14848ad06139f07a2dfc59d886d5a2 boost-test-1.66.0-13.el8.x86_64.rpm 64665d9a04cafd8ba88d9e9ef8be6ce034900a97d50bc2b7c8db98b1792eb93e boost-thread-1.66.0-13.el8.x86_64.rpm e0091543ecc67f75c2d21f14c484f15e377045e9b885e37bda6c2ada4367ceaa boost-timer-1.66.0-13.el8.x86_64.rpm 05a50d26202246200a9d8faf90434d990543a8f12e96b0f154c51666cf9a45fd boost-type_erasure-1.66.0-13.el8.x86_64.rpm 5ef4a9474ef6b2f936ec8efe5e9836b87a088ba82def6b4b237863024149b652 boost-wave-1.66.0-13.el8.x86_64.rpm cfa1377a69616dc1f5e6093f60432413e7ef3792aa23457e56b42a9bbe3663f0 RLEA-2022:7601 libdrm, mesa, and wayland-protocols bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wayland-protocols, libdrm, mesa. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libdrm-2.4.111-1.el8.x86_64.rpm e394a9750bef7f85575b7b5e5757b07be87d3051f852e774d2c5dd349919c57d libdrm-devel-2.4.111-1.el8.x86_64.rpm fd8c0a4a0402c9c0f05a2e43e6bb499371eeb9d6d373a0a1118664409c2ce837 mesa-dri-drivers-22.1.5-2.el8.x86_64.rpm 3be36619d048768ece7290533bf33d617ebd67b90db9d3171d3504b794cdb08e mesa-filesystem-22.1.5-2.el8.x86_64.rpm 491327bd259004a5d38d1fee58b6ca12bc6eaa66f3599770f41ca93a551a0b54 mesa-libEGL-22.1.5-2.el8.x86_64.rpm 06e5f5d2ff8a974d82445718d4916043a80122355d7e72d968cfbb8e08f57dd9 mesa-libEGL-devel-22.1.5-2.el8.x86_64.rpm 1594cbdbdf9c43dde0d882936359067bec1dc66e9bb44e4bcaf00caa10b524fa mesa-libgbm-22.1.5-2.el8.x86_64.rpm 889f75f01e3c57b747dbc83b95a31effb102af0e50a2cd7f2b9d8b766d1c580e mesa-libGL-22.1.5-2.el8.x86_64.rpm 06e712f139ac5a65db91a3205b6783b3a60239162628ed76e3d0398d3fa20e23 mesa-libglapi-22.1.5-2.el8.x86_64.rpm c5280a195a74d5f001366d0d31c1ec191b10603c3d5ca343b72cb066fc0e1342 mesa-libGL-devel-22.1.5-2.el8.x86_64.rpm 69e1fc2457b342d69b24910675f128f847b6cf1a57eb6423be489bab3c277113 mesa-libOSMesa-22.1.5-2.el8.x86_64.rpm 3875805b55ea3fc9690d976cf0a8e2dd16ca4e8755d834cf621563634ace5974 mesa-libxatracker-22.1.5-2.el8.x86_64.rpm bb90afd1968756802a6ce62cdc984d7e4ed311a5d5e58fbdd531341e3ea5866f mesa-vdpau-drivers-22.1.5-2.el8.x86_64.rpm 145c2ad189ec7d23ce54d2b524b4bdd18abd7d5d665802c58657db38f3f547e9 mesa-vulkan-devel-22.1.5-2.el8.x86_64.rpm 72593858b56bb1ccb724d16a0f73f2ee08683ae211d1d4f1826dcce5101dcd49 mesa-vulkan-drivers-22.1.5-2.el8.x86_64.rpm 1e9297112295cf07fabc4adc15a20c50cff1cfb64128477deddb9e2053cd7b71 RLBA-2022:7602 gnome-initial-setup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-initial-setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-initial-setup-3.28.0-11.el8.x86_64.rpm b7a94ff496c028ce0c0b74219c1562d1d8aaac9c7efc618e732e5b04df08ac13 RLBA-2022:7603 gnome-control-center bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-control-center. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gnome-control-center-3.28.2-36.el8.x86_64.rpm 6006473bf42203f7f7fa2215e55a13a02d35a1dc077d726b7c2583664c1a3f48 RLBA-2022:7604 libtimezonemap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtimezonemap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libtimezonemap-0.4.5.1-4.el8.x86_64.rpm 3e70b5b2eb8c0a82d5ed985ce7968d62df94786c876b83b207c3a7c973b55ca1 RLEA-2022:7606 gcc-toolset-12-binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-binutils-2.38-16.el8.x86_64.rpm 65ae6ef853b240ee9dbc1529e85e5eedefbc080ff7302ef345526079b3c8d650 gcc-toolset-12-binutils-gold-2.38-16.el8.x86_64.rpm b63458b91e980c09020188726a13f5e1c424bcb263223ed8caa8ac95bfc1edfc RLBA-2022:7609 sevctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sevctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sevctl-0.3.0-1.el8.x86_64.rpm 8883794e71306e213b24089214bb8542019dbee94dc1119caae336131b4eaac9 RLBA-2022:7611 esc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for esc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms esc-1.1.2-24.el8.x86_64.rpm 098fa8a1f91412ca575bd4373786faecf3bba27e34276ee56f83fae4c7bb5171 RLBA-2022:7612 rpm-ostree bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm-ostree. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rpm-ostree-2022.10.90.g4abaf4b4-4.el8.x86_64.rpm f722c597248cbc9723af75f304b0fa74f21915a8bc5cdd9fc236705e85c6d828 rpm-ostree-libs-2022.10.90.g4abaf4b4-4.el8.x86_64.rpm 13595c7f0cf104651466f47bb5ace870a75b4c937816ef0e9e60154a4495583e RLBA-2022:7613 linuxptp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linuxptp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms linuxptp-3.1.1-3.el8.x86_64.rpm 9a606032cab1fb5bc57189b012eb24fb8ae781c3014ff6f545d47cbbbf1db868 RLBA-2022:7614 xxhash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xxhash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xxhash-0.8.1-3.el8.x86_64.rpm 5db7484a6872866a914fe5034367b65b4edc5cacd5e9ced0d095c22be4c410a9 xxhash-libs-0.8.1-3.el8.x86_64.rpm ebf42d96569762da0c84a0bb45e671d8dbbec85c31be20970965d5861a349bf4 RLEA-2022:7615 alsa-lib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-lib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms alsa-lib-1.2.7.2-1.el8.x86_64.rpm bf2a1da9089da0cb1bf360ebedbbcbee3f214cd2f5e455b6374a813ca971afe7 alsa-lib-devel-1.2.7.2-1.el8.x86_64.rpm bc17c1bd17d5be661db3b056718e6995176d87ff645afd7d23de6756f4695b84 RLEA-2022:7616 alsa-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms alsa-utils-1.2.7-1.el8.x86_64.rpm 65ed99c2d71fd99a4fce0edbf33dc89bc5a34254600d4bba5bcc5e2c4aa54570 alsa-utils-alsabat-1.2.7-1.el8.x86_64.rpm cb36cf54b2922d6b4b3841cc5708848ada801a8b3f1765b1b03f3dcc28bf95b3 RLBA-2022:7617 rt-tests bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rt-tests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rt-tests-2.4-1.el8.x86_64.rpm 51a62e16f8c44ad2f798cdc626efbeac9b2190e32134b02dcf4ea2232ba0f629 RLSA-2022:7618 Moderate: gstreamer1-plugins-good security update GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gstreamer1-plugins-good-1.16.1-3.el8.x86_64.rpm 2b1bce4000218db12aeb9b4d0d291379b50b74f1b76c104e397cc44be5b661d7 gstreamer1-plugins-good-gtk-1.16.1-3.el8.x86_64.rpm 17f9f05e985f6dfaf1a9aa9b749f4c3a6eb310e13dfacc864941b3a9a62f5b57 RLBA-2022:7619 libva bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libva. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libva-2.13.0-2.el8.x86_64.rpm 9e98a8ae933b9e8aaea6c3a644c15f6c86a1ee7c232b575444e1dbdebfea7619 libva-devel-2.13.0-2.el8.x86_64.rpm 3aff4ad2d1e2806565e5ac6462aa9087844f1226a5822f3c1ee968cac5e1a2cc RLBA-2022:7620 sbd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sbd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sbd-1.5.1-2.el8.x86_64.rpm 82a8d02a85dba32889e969414148fe625138c53e8a1b16a630a88d0494666224 RLBA-2022:7621 make-latest bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for make-latest. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms make43-4.3-1.el8.x86_64.rpm c2fb11b04b4f8f7c6b2fa99875bdd82750e9ba5a7c0cdd8b14d8770de5334f1e RLSA-2022:7622 Moderate: unbound security, bug fix, and enhancement update The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735) Security Fix(es): * unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698) * unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for unbound. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735) Security Fix(es): * unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698) * unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-unbound-1.16.2-2.el8.x86_64.rpm d54f95f9d67733bfedd7c020025d58fa8f3d0d01557de199df410d5a801f8db6 unbound-1.16.2-2.el8.x86_64.rpm b76a482e3a7c9425c23e5a5522bb7d485542df4a6c7139fd23b20fdd9c840060 unbound-devel-1.16.2-2.el8.x86_64.rpm ef50348b1d912f6a8c5d034a72d714343dd63479607610c721e1cdcc652d4178 unbound-libs-1.16.2-2.el8.x86_64.rpm f886b2a5abf92299ffb510e03546a73c7bc9e522613b4de1babd37eec610f611 RLSA-2022:7623 Moderate: dovecot security update Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dovecot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dovecot-2.3.16-3.el8.x86_64.rpm 44ca3ac7e69ac7222188e9d81d0fd667cc6a68725e3fac7b72403f8b6ab56f84 dovecot-mysql-2.3.16-3.el8.x86_64.rpm cca9ba93e14558a9aaa972ab1e3dbf17436747d28ee5dcb0bde3e4e90d45b8a9 dovecot-pgsql-2.3.16-3.el8.x86_64.rpm d32ad1dd39a47a169f45d185c07f3370914e9aefb7b390629d677f99cd0660b6 dovecot-pigeonhole-2.3.16-3.el8.x86_64.rpm 7f2afd0df750de589752505a9d851dcaab761c2cce8ac41fb5bb5dc3a54aeceb RLBA-2022:7625 haproxy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for haproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms haproxy-1.8.27-5.el8.x86_64.rpm a8e48a5349b6d288a406dedbc31c7172491f47ba5ed6ac6d986e9b18531acccc RLSA-2022:7624 Moderate: php:8.0 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm a8348a286ec48a9d3604e12e82440c812e32ec26bffbce314d513c92462e01a0 php-bcmath-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 1a5b54671f55421133e8a529d85a3c123fa3d9c412ecc8e80f5b7c78f8d3749d php-cli-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm eeff3851294f18425c968c0646b50475a97c14d92f4faa44e0b55e267c05a3b3 php-common-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm cf8bb97a63f5aa9530b5a0aa9bf858c03f33d258b096d6e47d738d0a792c9cd3 php-dba-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm b44dc57dac575f1db48001c3a949a1012c5e6716e4ea0042636f9a3db336ec48 php-dbg-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 4a83c25966e56dbc678c509c7d664351111596192d20abd18414c0959e7dab3a php-devel-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm ad33a734ec731512f832cb3a510a5a0a7658e42374c66805bde88549473162d5 php-embedded-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 96273a2407460955cd7d5ef866fc5ad8e2d74b79095a245ffc07cbebcac2a82b php-enchant-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm eeeead05af1841e28a23883f2578bce844218ede9ec90766022b53a20d030d5f php-ffi-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm fc39512df234ac7e85f0987425123fadad54f2b470994414f523b62b3e49ad70 php-fpm-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 85cce205b19955a7a9ec3770fefc16f0061b8a4d61ca9f34606960894fc4051f php-gd-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm a63857577a2659acb3e8fdec4159d54d224bac68a3ad71f860d8a74496083be2 php-gmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 69bcaa0999d4d5cc7fb7d0c79981ddabd1cfe8abf7636692f56e06c1c50a341a php-intl-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 176d023d9815a6f42ec8375bb7edc889af14477516aba5ffeed19c802824303b php-ldap-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 376ece7f191b43804cca3bed1cf5b1aa9665b76af448267837d4dff1e9731e68 php-mbstring-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 9f099e28b9115642ad1664564e5356f95f7be98f2dca22e400649619c842da9d php-mysqlnd-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 7bcf84d79cb7c5ec676500c9e9256d9910e128d0f994e65f2166329403e00d98 php-odbc-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 0550ce31a2c0d310542d23a7740a5947e81eb1150f0c4694b58e064dcb031553 php-opcache-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm e307fa8123cb739f521b9f9eaab655c101ee5bb85cd926bedd1a5ab905064021 php-pdo-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 027d321cd414ebf60134f4470d4e7665b998d985b1641977da9b5bc3c4f19dbb php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 php-pgsql-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 1d0787eeb7308493c46ff4b628d31c0bda6d7befdf3ee3367e4495bede2b4592 php-process-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm ade3494b512052966b1b2f4e14702db8346dffa9e904e30359703afff35d8cfc php-snmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 6cdf3693c3cf99f2f4c7134f5392e27fa6641440b9e382fb386b3996aaa8ccb0 php-soap-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm 263b7bb09b0b49f0a1ec1770ba76acae857ce710699767df99fd4baf85587063 php-xml-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm fceb63064b3d0fa7e035f8b740f18c906402a07b4d503ae26a167b87aaaf24f5 RLBA-2022:7626 keepalived bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for keepalived. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms keepalived-2.1.5-9.el8.x86_64.rpm 0a98989f12a97ca3ee908954eeba644438d30a901453fc3e06ecad3ec7128fce RLBA-2022:7627 fapolicyd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fapolicyd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fapolicyd-1.1.3-8.el8.x86_64.rpm b511d983bdcbf2ed43b5579fee089f69e516fee36d033905ff8263f4c717ffd7 RLSA-2022:7628 Moderate: php:7.4 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422) Security Fix(es): * php: Special character breaks path in xml parsing (CVE-2021-21707) * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php-pear: Directory traversal vulnerability (CVE-2021-32610) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422) Security Fix(es): * php: Special character breaks path in xml parsing (CVE-2021-21707) * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php-pear: Directory traversal vulnerability (CVE-2021-32610) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__php libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 php-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 07bf8f584e968dbf0b98dffe822d6902a58390fadaf72a50138edf455289e778 php-bcmath-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 4441262caee9f6d3d04cace9862cf9a07a2b822856c100e3030498776650e097 php-cli-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm e2128345e3a5577829de3a1a5db723802291bb3677ab173071dc787300f8c6f4 php-common-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm eb40689e613f9840ffb69f21ce9b6838b9fb29b235273464f21455949c49a37f php-dba-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 3878213e84942a92122007f031a6ff9c05c1e2751a5a74b52ebe87383791e8cf php-dbg-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 1a098917aa3e201a96cc3e7be2c8c5cef9eb044aaeccd389d6b1030ef937c607 php-devel-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 3437a0a07b72d5fbd5e206182cab7284f0405ed0058994f16c06ded39d44951f php-embedded-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 0534fd869e31e07c74c3638041da0cdb90662726f06382f1f6fcb43185d2c8b8 php-enchant-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 0f6af66b1394ce147a2bea207f90c52c3d278dc7c0f4f161aa95f3a2a97f0590 php-ffi-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 85457c73a855e2d2bbc20242b56268caff452c107f2c81a6dfc744cfb7478e44 php-fpm-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 84f82ad8aa014b3dcb8549cd5e05d12c9ab2d812a508de9170e89de1b8ad8ac2 php-gd-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 0159f5632f9a7cab5584434e6a8f2d68f2cf44a6995e7cdbc43c3c13fc1203a9 php-gmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm d728cfa99a9dcaa967877dcafa771a14dd6c691787baf6258966abf32e6f5304 php-intl-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 56244aefd61b6a3880ddad75e55674f9ae961a75f948ebbf6ad5c9387622ba5d php-json-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 306a11df0167f7855c7f8f208aa483c23f5d6bf23ade1e2650a765c445a4dae4 php-ldap-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 96ac971cda8c224e2944f8f7997716e1b75105c17473b218a8628c404f0ef1e5 php-mbstring-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 7cc7b8d3fed7f19f3897791d4666eaec1b439cdaf262052c25aa1e05fac9aee4 php-mysqlnd-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 8ac305f4fc4e8bcd0e0afb449a8059d55430ceeabeaf798e0c51da747af3dfc0 php-odbc-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm cc1be49394f375dd2c9cc316c8e056728df7c92172838f3e05eb29a7e5b68cf0 php-opcache-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm f9a1256c6aaa57bec937759f44d82e733da3ddf98c53c949e2e73e4363b06a0b php-pdo-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm d015b7274a5c077db760c542e6b7209df1f79ba0eadcc12fd3ff446a22b8826f php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 php-pgsql-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 44a36e0141ad3ccc42027a399e91e6fa053c54977c22a54c1df61d51207a7e98 php-process-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 9e1700636a03adba623c15fb1443db7f7c45e4ce564f5a42603d047f8f7ca8a3 php-snmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm ecb2ac8b9d3f7f5bf45c994e92ce77c78b9d7149ca6ae158a0b07ee4e3947276 php-soap-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 1ea8b82e08fba7c2de7f6d2fe2f1f8cf57585f9483ef0cfb861faf5e981cc49c php-xml-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 403096f67c8103d7acd686e92a71fb695823898fb8b8247bb3cce6f582bde464 php-xmlrpc-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm 4271876a92a4c98e11dfc9adc5e2b048203dc2c96cf7b93e3cbc0df911c6fc81 RLBA-2022:7629 nispor bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nispor. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms nispor-1.2.7-1.el8.x86_64.rpm c5638d282ec04dae1f4cd901b359ddde09409be3a6f8b78e5f3d82533029f8c5 nispor-devel-1.2.7-1.el8.x86_64.rpm af2591a8d7dac21598930b8ed06fb769b832d4333c6cc4c16a2b7995ee5098bb RLBA-2022:7630 crash-ptdump-command bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash-ptdump-command. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms crash-ptdump-command-1.0.7-2.el8.x86_64.rpm 041760d28c7f97acafc1b90f5d9f12a19c001a3fc90f7d7eb8778daf6d7e34fe RLBA-2022:7631 ghostscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ghostscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ghostscript-9.27-4.el8.x86_64.rpm c3828261c8b05bbaea42f43f46f9e8ab5b1bf542227e498d7ebd8b23126f0b73 ghostscript-x11-9.27-4.el8.x86_64.rpm f366356687683723112cedcdc9a3e7cd047fa03e5c0dbc4dfc357f663ebb3511 libgs-9.27-4.el8.x86_64.rpm a8b1846f370ddab492cfd21485d9a6b13ac3d277417bf7ede7d585ebbfef5f99 RLBA-2022:7632 thermald bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for thermald. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms thermald-2.5-3.el8.x86_64.rpm 2105e8ce92fcef71236a602ac7be02308c6b102ed635b07fa07c8e5316bdec5e RLSA-2022:7633 Moderate: dnsmasq security and bug fix update The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dnsmasq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms dnsmasq-2.79-24.el8.x86_64.rpm 8ef40fd4da1fb82b7c274ecf4b1f66c5aa0459e2668d0c8bc4d2bce70fedbec2 dnsmasq-utils-2.79-24.el8.x86_64.rpm 9219bb674aab79fd7c6c460392f97be226e6a5004eb17d20f3b6fc9f705d4ffc RLBA-2022:7634 usbredir bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usbredir. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms usbredir-0.12.0-2.el8.x86_64.rpm b62803bfb0ff52df6796bba1f5ed2502a6811a7d1a41a218e1ba907eacc97f9a usbredir-devel-0.12.0-2.el8.x86_64.rpm f00e64939bed144aec7c61fc9a4a5d723941b806d24e641b350128667e2e88ff RLEA-2022:7637 maven:3.8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__maven jansi-2.4.0-6.module+el8.7.0+1082+b3a88d23.x86_64.rpm a23782fdbb258ed7ae58fc86b4859d70c66fbffa501f9258efb1c4403a2ba1bd RLEA-2022:7638 mercurial:6.2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mercurial. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__mercurial mercurial-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm 52bc1386bcfc64bf99b1f1c1346120b24532e839a29bee2c91a6958a460520ac mercurial-chg-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm 18c97d8f3e8b7e3dcea459e047cedbf5ce7f7d47ca527ff5daa68cbb2a8c9456 mercurial-hgk-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm 9c945841d9eb5ad2cd4ad36a358f426569bfb95040683ed02f9640258325c276 RLSA-2022:7639 Moderate: openblas security update OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version. Security Fix(es): * lapack: Out-of-bounds read in *larrv (CVE-2021-4048) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openblas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version. Security Fix(es): * lapack: Out-of-bounds read in *larrv (CVE-2021-4048) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openblas-0.3.15-4.el8.x86_64.rpm a6629a2491ae9fac85e928c9d1397a912a9eaa5a1ced7dbb4a83560ed3be1966 openblas-threads-0.3.15-4.el8.x86_64.rpm 5afed1f25fc67c5aad9935e6655ba61da0d26a974c1b387c040fd8fecdef3e54 RLSA-2022:7640 Moderate: mutt security update Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: buffer overflow in uudecoder function (CVE-2022-1328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mutt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: buffer overflow in uudecoder function (CVE-2022-1328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mutt-2.0.7-2.el8.x86_64.rpm 15b13b12c60465cd9da41f83afc017da0d515a17b91dfa14956e532e72d6603d RLBA-2022:7641 fstrm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fstrm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms fstrm-0.6.1-3.el8.x86_64.rpm 009be413cbe00ebcf5cc349e0db8d6913273bb26dec2c187860e69056b69bb9f fstrm-devel-0.6.1-3.el8.x86_64.rpm e5d3ee7dd9fc8a676544e1c9292a6cfe104da22e04bb79262578f31e8d939620 RLBA-2022:7642 setroubleshoot bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setroubleshoot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms setroubleshoot-3.3.26-5.el8.x86_64.rpm edbda7d3a6ed4c6cc0cb6448ee20b063fa2da9a9732390cf0817a275b4381c84 setroubleshoot-server-3.3.26-5.el8.x86_64.rpm 98a9ec6cb83707587e8cca917a9c439c81767a814560807fc9caf01d6e24677b RLBA-2022:7644 clevis bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for clevis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms clevis-15-11.el8.x86_64.rpm 7b1661586fc311cdbc1e9f476968c2dde04253a852c5f527d9d2435114d1eb11 clevis-dracut-15-11.el8.x86_64.rpm 0fb789c732ce81f56014c82ff1a145d917fdff04ff72eedb6cf78d365318a96a clevis-luks-15-11.el8.x86_64.rpm afda820f581b0fdfffd83e4c84c834ec3413291db1061d07b3d0f197bea52eda clevis-systemd-15-11.el8.x86_64.rpm ac473976855ebcdb18d17dd0fd52173ba7991cba4e2dcf2878ff04deed4c6a76 clevis-udisks2-15-11.el8.x86_64.rpm 85e206ef9a26491b946ac8aac5497e1c37f2e370ce1311ea4b609f1219a4c519 RLSA-2022:7645 Low: openjpeg2 security update OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for openjpeg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openjpeg2-2.4.0-5.el8.x86_64.rpm 3f417bd20c742a615ead7114343b3dec930d6a74593f8120bb0cc89d8a45f5a3 openjpeg2-tools-2.4.0-5.el8.x86_64.rpm 1eeca900463ae48d084ef5a6579c884c5b641a2357ff78afb7ea6bf979206ba1 RLBA-2022:7646 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libblockdev-2.24-11.el8.x86_64.rpm 5da174eafaf69af62408a4815a01f3dc246ef681fcc8e7014b0fce0403a674cd libblockdev-crypto-2.24-11.el8.x86_64.rpm 2d4d820490c96a4d9c5c75b7cb3ae1520b579e609356fa336cd7fe4800f9f23d libblockdev-dm-2.24-11.el8.x86_64.rpm ddb1077966da4cd352a7e5054ecbd6393c5294c45a10185f794f19e1f5213924 libblockdev-fs-2.24-11.el8.x86_64.rpm 1ad19562185e8206dc5175b37b20453977bbeeaf4e69c90f0c2701f6a3297be8 libblockdev-kbd-2.24-11.el8.x86_64.rpm cb09b43aa55feab2e48ba005abfedfb8e8bb0170aaa731daeeecea050036b1d6 libblockdev-loop-2.24-11.el8.x86_64.rpm f99218c09d4e71cb3da31faf10c85a3e4e324fa30a2a499104bb554ee7ae9394 libblockdev-lvm-2.24-11.el8.x86_64.rpm 5987c9cd3365981b4e3f0c03f572adbedc4e6e2a27909cbc164c3f2f1b518235 libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm 95c137f79bd41a9f791c48be71008650e3aa7354ab5ac0d6cd54b5bc961cf294 libblockdev-mdraid-2.24-11.el8.x86_64.rpm 40841584b5e8ba50c0316fa6a41a6bb20e470fe8486cc8868bfd1fbf47b55186 libblockdev-mpath-2.24-11.el8.x86_64.rpm 6c11510d841ff0405a0630e37d1ed79d9f741fe85a18a6dc366a4daf7c6165e7 libblockdev-nvdimm-2.24-11.el8.x86_64.rpm 8f5f06d54c67ec053c3268a228e95c91c46741a9976adb23df6f7627ea27989b libblockdev-part-2.24-11.el8.x86_64.rpm 979ebb94b393928e80524a055ced8c32914e3bb69fdbeb7548d61e86048b49d6 libblockdev-plugins-all-2.24-11.el8.x86_64.rpm fd8cdb42a8c71a3313807d62340daaaa650588184e86a039197d94a44b31d7e8 libblockdev-swap-2.24-11.el8.x86_64.rpm 1a319f5063476b8af2207e8d0d8b8564ad66412886b4cf3c337e069c443b5c23 libblockdev-utils-2.24-11.el8.x86_64.rpm c954d6b891f0140d997e1f3106e9cc023ee920288c017910fed598501e321ee1 libblockdev-vdo-2.24-11.el8.x86_64.rpm 3397635712651d00661b4f91563eb6aaaec753824b97fb4e8de64e6a17d9de49 python3-blockdev-2.24-11.el8.x86_64.rpm 00fcf1707621b8ff4a0de879d5e401b5b738a05783621ec8e85c4bfef705300f RLSA-2022:7647 Moderate: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943) * httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719) * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377) * httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404) * httpd: mod_sed: DoS vulnerability (CVE-2022-30522) * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) * httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614) * httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615) * httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943) * httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719) * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377) * httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404) * httpd: mod_sed: DoS vulnerability (CVE-2022-30522) * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) * httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614) * httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615) * httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms__httpd httpd-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm bf0f17b753398917bd78b469b9522c1c69623c39d74e2e072785b506b5fc1394 httpd-devel-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 7e2a0eb54d1df679fb968511c68566e4577d12e5dedc8272b426a7613415bd89 httpd-tools-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 61d0353ca9006ce117284db172b80a31bd2ef425e0337cb67bfdf1e611da8a7a mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm 4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5 mod_ldap-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 835cfd3c56a0b13903a0ad8f0e3184664a2ba5d10eb801785b659ab2bb813b48 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 mod_proxy_html-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 7fb626480ab451a56be9818d127bf95ff3a867d94c0e6bce114562b063d08a7e mod_session-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 54e3780fd2bc9471198a3f222cf7ff9d36e72321ae82092959bf1624c9221b10 mod_ssl-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm 7b2e2dba432aa6e941a52067aac0d10e918366742756a7331fe139258a36f5ac RLSA-2022:7648 Moderate: grafana-pcp security update The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms grafana-pcp-3.2.0-2.el8.x86_64.rpm f51b7ad4d487e5d4704112536ba57dfcf6ad0c993bd63117298c5045be1a4948 RLBA-2022:7649 hyperv-daemons bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms hyperv-daemons-0-0.33.20180415git.el8.x86_64.rpm dd8a73fb9d5128b96c6aa9a9df743b3e0c66d45677dcb76cd14e8bd669f46810 hypervfcopyd-0-0.33.20180415git.el8.x86_64.rpm b83c98927e6bf767536cb0255761884c0d9c88ee0614d9652a2b3665e7263f89 hypervkvpd-0-0.33.20180415git.el8.x86_64.rpm 6ebbb520fadb104c5082bee707a22e062a3a579f6d145ee2ce81613bba565c59 hypervvssd-0-0.33.20180415git.el8.x86_64.rpm 69cb064a0ee993002e232507b1ff8d181f3089001b8458aa7186ed717a5ce073 RLBA-2022:7650 xinetd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xinetd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms xinetd-2.3.15-25.el8.x86_64.rpm 7caf679d6b941ca0c4b3fc40bb80a54c50dc631f1c6364e886eaacb25ca24769 RLBA-2022:7651 cyrus-imapd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cyrus-imapd-3.0.7-24.el8.x86_64.rpm 037557455d8da217bdfe6df1621de585d9427f70beae4256a6ed99ccafe03016 cyrus-imapd-utils-3.0.7-24.el8.x86_64.rpm bd6c2b4f212689e7858b86acb0e3bd1d1ad7f779b85ad3c8b4a3e2c02a249940 cyrus-imapd-vzic-3.0.7-24.el8.x86_64.rpm c38b07ae2373e61aa5091f1649071c17374d41acb213b325fb7eb6378529c7fd RLBA-2022:7652 oddjob bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oddjob. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms oddjob-0.34.7-2.el8.x86_64.rpm a481f325a915f2d704474ed8b4d1df97dd1c58fc168a511b2a1d937fb4039c15 oddjob-mkhomedir-0.34.7-2.el8.x86_64.rpm 91959c72f5382176996bd2a73d968ec84527d0ce3e79ad464d30296f0c630825 RLBA-2022:7654 rear bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rear. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms rear-2.6-7.el8.x86_64.rpm c2a6c74dc0e8d4954a23b5aff5f33444a5b2127e65f41b0bbd3e317cf66c12f2 RLBA-2022:7653 cups-filters bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups-filters. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms cups-filters-1.20.0-28.el8.x86_64.rpm f13e08457a6dd13449b5ac3d38c2d6536504d876287388fe77d00fa760d5cf3b cups-filters-libs-1.20.0-28.el8.x86_64.rpm 891cec03132923ded16005a191ba9c86b595e647f3eba52e58aaaaf00f4d9707 RLBA-2022:7655 xdp-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xdp-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libxdp-1.2.6-1.el8.x86_64.rpm ca9a4c47c93fa78dda88d3e0877dccd474673e4b27eb0882dc7c728dc929613b xdp-tools-1.2.6-1.el8.x86_64.rpm 3d85888491af2f38a37afd748d9e0b8c808561aae77b35e3b66433c596361e3c RLBA-2022:7657 openslp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openslp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openslp-2.0.0-20.el8.x86_64.rpm bee056de851dff0654790c1a354a461c5aa5f45e6cad2690ac62d6271431e94a RLBA-2022:7659 gtk3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms gtk3-3.22.30-11.el8.x86_64.rpm 29a2f90df2465bdb2e4798d90e6d43933bb34cf742747f97efd77db0832c06c6 gtk3-devel-3.22.30-11.el8.x86_64.rpm 197af38646506159cb952caccb7bcbd054ff35f7d5283ae67d730c968af02f59 gtk3-immodule-xim-3.22.30-11.el8.x86_64.rpm edee3fe26bff0a288b5f1c754933e759991b2e77c006e02c8ee540f695a66612 gtk-update-icon-cache-3.22.30-11.el8.x86_64.rpm c574da0954ff6ba85c0eabe58a7acbded426be845d408c57e57cb443fe560933 RLBA-2022:7658 freerdp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freerdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms freerdp-2.2.0-8.el8.x86_64.rpm ee604c4fd7fef6716c1d342119560a2a7b2cde11d3fb089957633db2515e6dbb freerdp-libs-2.2.0-8.el8.x86_64.rpm 9f1ea5245ed7d523776a64a596d8bf686ece476548c7197578992d258ad228e1 libwinpr-2.2.0-8.el8.x86_64.rpm fcd8eed3c1863160827b0cd8a4ec6b38656765537e30213bd2c2855e14f0c716 libwinpr-devel-2.2.0-8.el8.x86_64.rpm 98e2869640d82f85e40a5e5c7712e5a5fdc5ea337a44cc277f7ec3cee64dbd82 RLBA-2022:7660 coreos-installer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for coreos-installer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms coreos-installer-0.15.0-2.el8.x86_64.rpm b965acad95abc501de61f10b0212329849bd0e097160287ad4d3611a37769b53 coreos-installer-bootinfra-0.15.0-2.el8.x86_64.rpm 443ab391cac10e8d56d6f1e09005da0386fbe89d4ef371cff6a50a6a4bf450f7 coreos-installer-dracut-0.15.0-2.el8.x86_64.rpm f330db1a24ea0e10aaeeb76f70e62c3b93159c5ee68b1d5375ce89235f9f24c0 RLBA-2022:7661 vulkan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms spirv-tools-2022.2-2.el8.x86_64.rpm 4a1a23d9d2ac7da4c9bf89d16a203d55c6f6b539c82436f979eedf2e4eb03620 spirv-tools-libs-2022.2-2.el8.x86_64.rpm 4d25bc22840ed42e1e7e2e5e2cafdc808561de408112e85daa62dda183d78c53 vulkan-loader-1.3.224.0-2.el8.x86_64.rpm 04f8daa017250796784a780b73af1def53d4e83cca26aaf802595ddbe2182910 vulkan-loader-devel-1.3.224.0-2.el8.x86_64.rpm 46b79f8228dc0a0f36bd9c52ba433c4fd204aa274b90f6a98bc58306507bb029 vulkan-tools-1.3.224.0-1.el8.x86_64.rpm 52f91b57a908e181714bba6fbb51eeddd52ae1e3e960eacb23d3ad80e797163f vulkan-validation-layers-1.3.224.0-1.el8.x86_64.rpm d9cfa39a9d367a4058bb95303cce3ea2e6473ff387af278c30c4226c0ea9c153 RLBA-2022:7662 opencv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms opencv-contrib-3.4.6-8.el8.x86_64.rpm 57166933fcf4f60098b559813ff422da3f55b01077a0a6457200ea4cf49e4293 opencv-core-3.4.6-8.el8.x86_64.rpm c552fed8cd103e91ab4f5901dbf6c9c0464c90a9b712f376731067c97b6f4fd1 RLBA-2022:7663 wireshark bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wireshark. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms wireshark-2.6.2-15.el8.x86_64.rpm b011d4ee0d747b9d6329f622fa29b009cdf39cdd8454526aeb1a18a6b691c6e9 wireshark-cli-2.6.2-15.el8.x86_64.rpm 28750481e1ed6bcf20b13b29bd17e173bdf3be4c40fde886d3452306753df0a7 RLBA-2022:7665 ksh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ksh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms ksh-20120801-257.el8.x86_64.rpm 11dfa340af7b52321ce90b0425c10c3e90835f6b400cba4b70fa48e107529779 RLBA-2022:7666 qatengine bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qatengine. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qatengine-0.6.15-2.el8.x86_64.rpm 7e82a279e2d83cbd406ebbb2b32b1893fd63554c0c7f77e60f8c5314309c9e34 RLBA-2022:7667 qatzip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qatzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qatzip-1.0.9-1.el8.x86_64.rpm d646b323481492a0ad52a4de12caaac8991d881b8ad4b882af159ec09c61cd9a qatzip-libs-1.0.9-1.el8.x86_64.rpm 33c3fc3aff60b4a339db9471d2e33efe9b4748081e9d0416223fd2dcd28d8cf3 RLBA-2022:7668 qatlib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qatlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms qatlib-22.07.0-1.el8.x86_64.rpm 5107cb43c0648ca8f388dc30335e064d74c738a2f21f4ef95baade1d59244b80 RLBA-2022:7670 mod_wsgi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_wsgi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms python3-mod_wsgi-4.6.4-5.el8.x86_64.rpm ab58858a5e243f8fff7e96f7d9c5c995716545147cd4f152cfa660fad8b95d67 RLBA-2022:7673 wsmancli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wsmancli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms wsmancli-2.6.0-11.el8.x86_64.rpm e5a175e6790a3a221f3c12f816a95fbb8d7f2b8655ab0a18269dd93ab3af505e RLBA-2022:7674 openwsman bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openwsman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libwsman1-2.6.5-9.el8.x86_64.rpm c91dc44a1f1b1e194acfc69be256e06b98b1fc9586790179470cdc3653ec7381 openwsman-client-2.6.5-9.el8.x86_64.rpm 3c8034aa23cff3e5b9bd6c0703da3fba9f1c519a8e44caa8946d4a0dd5c08d59 openwsman-python3-2.6.5-9.el8.x86_64.rpm 8ada5656aada9c3bc19e296c9c229b5b9a247b45684b41aa55c8c7452bff87b1 openwsman-server-2.6.5-9.el8.x86_64.rpm c478858538547c9457032f0e016425f9a3c2015b69f70d20fc531a147f155d05 RLSA-2022:7704 Moderate: webkit2gtk3 security and bug fix update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628) * webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629) * webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719) * webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628) * webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629) * webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719) * webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el8_6.x86_64.rpm 6f9d418c7ea1f1201d9fce9c29a452dd5ff1e50186607bac1d8d5c36e9d0b081 webkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm f264c4563e2b6ed207ecba5bad82bc211e855fcabe1756b92db6001872f5118c webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm 857df66bf8107734cf442e7e59feab3e0d62c626e8738c46f676b57c99fa221a webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpm 022a74acac9929975cd817c2e8820af36362c80ba18c35525aa3143c238e2845 RLBA-2022:7820 virt:rhel and virt-devel:rhel bug fix and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix: * irtiofsd debug log's timestamp is NULL (BZ#2132391) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix: * irtiofsd debug log's timestamp is NULL (BZ#2132391) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45 libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645 libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0 libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100 libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52 libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm 8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0 libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm ea41423cb9ccd317d1a5ebbcb070b9e1a74f99ecce9c3e5051267bb64c188eee libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 7ed71d62ecf427822af3a0b9e20fc93f9e05bf2004fb7be9511d6ab5e9b3de7d libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 0ce8f2e8e6dca56e8a76186d1dfa73130956079bfd6f2818c1ee50944fc0b416 libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm d0cea4e0b6167849fb7edcb91531b3716e01887bfe9faea099bd0b8c7fc51858 libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 0c0d39b5bfd236922c883c4367c39d9c711ccdace73f36ece10088d466b889de libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 092bc77167d3a1d392f4f214a08a4eaec63d5b25c12f7f3f0850b48c2de205e5 libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm c484e35d7ad61b87ad9662109aecb110158136240c797bbc126dae3078f4414a libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 830a30966b383cdc2ed0cf28870c8af581d8a2b1dff4d0ed3fc1b4e6ec9941b4 libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 1f37a92b9f136ee4e4fc8f9bed72ca1cf858bbde132596cd5fcb789018e40a8f libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 97350f3e49235032387990bfadb529874b4cc8fdaa39edc6f13d69e36253b4ad libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6df6e0e49b97c69ff5b065e574b4c9eaa08c0ae4de46832fd1dc5c8b19abe6c0 libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm e8d54db9bd04dc675d8b44bab42de599af7c56fa68d5715135c1742056a0c6b3 libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm c87e4f8cb42bcbe09ed1c043fe3d57ffd7bc2e7f5adc56814651901db5f79a40 libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm ef4b347f15c6ab94fb348337c7856ba6acad1fbd7d425486741be6a5640a73e3 libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6c4b97bcb6b615b8c2bf886459f22fe782c05d2679c56fc1808e044feb60658b libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 087db2ba93134a2c732b4fa5fa37b3c9fc2369447398a86a1a6c10de5f467609 libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm a791d8f7e3badb26d0385db4d3c03fbc0c8c800c6f5e4b984c3fcb093ba36d15 libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 57a656c3775cd30fb0e46818c56616b2083bb5a6fc1268ef52cb2ba0bf11968d libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm b382f68a7b9146a952801ceeadf99f7ffacd5b3cdff873278f4c5e87dcf12169 libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6233e0708101c4fab6f867a5bd7081aea83c1b813f0b73b27d2dd066424feab3 libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm cfbadecd26551afc63bb73ffff83ed1a575276d71fae78783579b7200030e03e libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 6118db5d391e5ea27aeb8131ed3f596d918706291f0cb7a0ad2df37aa7d8eb26 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm e2a47a6cd93b6be3cb6cfe5b2db5852bd9934cf0e959f37ee82ac6bbfadffe93 libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 4330e66821e29bc2d1412a0480aec1bcdc1f942a81da56d43653bfb9172d9636 libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm fd055f2146f2f2210fe413dcd3500896cfaaa4683cdd3ca9cb6d130f0eb56e51 libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 5853e8e20b37b510049a488594a5e92bfd022747013a2854fcbdcc21bae08757 libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm decc7c7175a8a8456aa9fcb8aa312d9a0aac9657b8cc8a427af79f203bcaf0cb libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm 108e8b905f821306c1a18e368b647482898b6726e56268f57f967ba8ca263ee6 lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776 ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70 supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm 9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838 swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9 swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4 RLSA-2022:7821 Important: nodejs:18 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750) Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750) Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm 4a190f09bf708f5a45330129aa5663853fb49b007921d4bebcd2198b56ed9f65 nodejs-devel-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm e997573653d97bb0a0566ab66f16846f7a9e5416cbbaa9c836eee72b487842c9 nodejs-full-i18n-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm 7b243705740ff8777e283fba19ea10341b014068ebf1ec1adc6ab6ef63fe5f7a npm-8.19.1-1.18.9.1.1.module+el8.7.0+1072+5b168780.x86_64.rpm 0f5f81cecfd33ad56c588cdd18631041e491dc3098b1458aa1a064b04851bc6d RLSA-2022:7822 Low: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: possible information disclosure and modification (CVE-2022-2989) * buildah: possible information disclosure and modification (CVE-2022-2990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644) * (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645) * podman kill may deadlock (BZ#2125647) * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648) * containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686) * ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234) * containers config.json gets empty after sudden power loss (BZ#2130236) * PANIC podman API service endpoint handler panic (BZ#2132412) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390) * Skopeo push image to redhat quay with sigstore was failed (BZ#2136406) * Podman push image to redhat quay with sigstore was failed (BZ#2136433) * Buildah push image to redhat quay with sigstore was failed (BZ#2136438) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295) Enhancement(s): * [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360) * Podman volume plugin timeout should be configurable (BZ#2132992) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: possible information disclosure and modification (CVE-2022-2989) * buildah: possible information disclosure and modification (CVE-2022-2990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644) * (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645) * podman kill may deadlock (BZ#2125647) * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648) * containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686) * ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234) * containers config.json gets empty after sudden power loss (BZ#2130236) * PANIC podman API service endpoint handler panic (BZ#2132412) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390) * Skopeo push image to redhat quay with sigstore was failed (BZ#2136406) * Podman push image to redhat quay with sigstore was failed (BZ#2136433) * Buildah push image to redhat quay with sigstore was failed (BZ#2136438) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295) Enhancement(s): * [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360) * Podman volume plugin timeout should be configurable (BZ#2132992) rocky-linux-8-x86-64-appstream-rpms__container-tools aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d33e11f32b7ca8bb1ab9de7144786d8b949b688760adc1785e2fe70d5f39168a buildah-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d1f697d951572b67c4d0ab80a30722a3eda303306f5904ef8cb1d6c3733632cd buildah-tests-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1839a75a6f2fb5593d36c7e2d36012fa706711bf29077b42426eb8858ab34ac1 conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 containers-common-1-43.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 201e2826e656e125b7a753e73fe57cf4c4189315ddc4a4e1fc329bb45f8387e6 crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 119f90778569a22466b4a90fa278b1af63d137005aaf3aa5945f28a5514bec92 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c podman-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm a58af6159401ae01e54b33eff11fc07b6b40a20c6d09e375c6276451942c409b podman-catatonit-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 4e36ac569c72abc680821c471ad1a26236816c0c45769c2b627f0bb327c368ab podman-gvproxy-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1e0d9f6077e42fcdcd44987496509b9f68d7cc1165c49d1c5f013b100a04309f podman-plugins-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 5af440d5ee2dab182636926e7cf4b71c62847b6be75607dd95efb5b75dbd3ccf podman-remote-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 6aeee569dc76847d740d8863907786a80e1918abcaf6fa880a7ab58740538025 podman-tests-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d1c73fb86bcca0c43027e3bf83fd7fdf5ca67a46cd96dafae46cda06ec918e82 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856 skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm b2dbacf676bb36b7d618c125bba63b03b16206500f903f8ce4b76e368f16dd26 skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 8d4dda0fee2dc95c05a961422237e3ab97a7f32f0371cd7dc91c447a09ce5b0e slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 RLBA-2022:7091 java-1.8.0-openjdk bug fix and enhancement update This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm 745a98184ac9a5515249b7cd168a5790d2b07407b3eca941cbb9bf9400d2f689 java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm 10be3aa175d2b7be220ed364679366f5b90ce479d11d65443fabba8fb5e23aa9 java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm a64f5fe29ba875659ccd0a3d6af6f3a1f5e87b0c4e5e93cbabe16cf8ed68ae68 java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm 6facf44a3ef195fb6c7f66ffce323acf6eccf4f331d5b9059e0c03865fdcd5ac java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm 01819f766f0cfdf6b035db3ead2f50c9539d65fb760d89728a34771c4b44a31a java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpm f0b9eb21a54ba79a63a963b57f7a2372954a3c88686a340713fa88332ab3ce4a RLSA-2022:7830 Moderate: nodejs:14 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm 401ad24969db74e1989ecab2aafb6192bd816113db6eca267893d54ec506446f nodejs-devel-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm a258182e176403cf51af2c6dd125924212ab63c9059b2e2a4c40506b638db5ab nodejs-full-i18n-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm f01702069e9268a2594987a91eb54adb343b4236983b1d300c8aa032a2c0bf19 npm-6.14.17-1.14.20.1.2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm e25f3c8f2935111f4012a42737e70b79bce180b49aaeff9c720e169dc08279cc RLBA-2022:7833 pacemaker bug fix and enhancement update The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Bug fix(es) and Enhancement(s): * Running crm_node from an OCF resource agent's metadata action will hang until the timeout is reached because metadata actions block the controller (BZ#2125588) * Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589) * Resource agents that call crm_mon in their monitor action, such as ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown (BZ#2133830) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pacemaker. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Bug fix(es) and Enhancement(s): * Running crm_node from an OCF resource agent's metadata action will hang until the timeout is reached because metadata actions block the controller (BZ#2125588) * Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589) * Resource agents that call crm_mon in their monitor action, such as ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown (BZ#2133830) rocky-linux-8-x86-64-appstream-rpms pacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpm 3140cfc42a7891db48ccd246e8e9cbbbf6bd63470ca182d69d41b638bf54d33c pacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm 98c2f138e3b705ee8a47cb1649347a579fedee8fe73edff425f2e45b9d22e96e RLBA-2022:7835 mutter bug fix and enhancement update Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mutter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746) rocky-linux-8-x86-64-appstream-rpms mutter-3.32.2-67.el8_7.x86_64.rpm fd4986a6c4ca4ba62462427c6b76264a5da45a7923a1253f78ad2671a8fb5b84 RLBA-2022:7258 java-17-openjdk bug fix and enhancement update This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms java-17-openjdk-17.0.5.0.8-1.el8_7.x86_64.rpm 4c83e47265fda2ce1754ddb46c2ade5c95d13e82851ae0d3a0c2ed6d69943ccd java-17-openjdk-demo-17.0.5.0.8-1.el8_7.x86_64.rpm ea691a070f8fcf9e1389200c0b89f2ea21ef6f4edab9af535789127fae32b81a java-17-openjdk-devel-17.0.5.0.8-1.el8_7.x86_64.rpm 9d8b71e2adced4576633c77a2607e532e1655149b2eaa4a38f090089e83b2e57 java-17-openjdk-headless-17.0.5.0.8-1.el8_7.x86_64.rpm 7ffee64f4d6987f5a2ec5be9980b2066dd61f7f865d5e81ee88646d13a63dd41 java-17-openjdk-javadoc-17.0.5.0.8-1.el8_7.x86_64.rpm 6846aa5cd7fae8d5ff1287646c43d7ad3747b43f0a39a0cd8fbcd6060bf8c880 java-17-openjdk-javadoc-zip-17.0.5.0.8-1.el8_7.x86_64.rpm 5c4784b2b0d76728db5459e983aecf854cbc19a0e01cfc48cfd60d33b5618368 java-17-openjdk-jmods-17.0.5.0.8-1.el8_7.x86_64.rpm cc35eda49192a3b003c507ba2364e6da75fa46d1f89e7e7c656aa42e5202cfe2 java-17-openjdk-src-17.0.5.0.8-1.el8_7.x86_64.rpm 14adfb04f91d8b7b41309a93093602f1daf21c41193d7b6834db657f22e5ce3b java-17-openjdk-static-libs-17.0.5.0.8-1.el8_7.x86_64.rpm aa95e8d2da7eef7c20406839ea98ea1f42af0a38e20dbeb5023d6c77d0ed3d8d RLBA-2022:7438 java-11-openjdk bug fix and enhancement update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es) and Enhancement(s): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es) and Enhancement(s): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862) rocky-linux-8-x86-64-appstream-rpms java-11-openjdk-11.0.17.0.8-1.el8_7.x86_64.rpm b4b8298d97ec3a0b3729caa82149c0e482625e9c1bae71d57102330281a9c249 java-11-openjdk-demo-11.0.17.0.8-1.el8_7.x86_64.rpm 413e2059917a6cfb0de0fa9b48b638181769d8c3962e7541033b49992e4150fe java-11-openjdk-devel-11.0.17.0.8-1.el8_7.x86_64.rpm cc2373fa88ae86db0f9056422882b00a8aa63a784241e40484e9f67bbfd5d26f java-11-openjdk-headless-11.0.17.0.8-1.el8_7.x86_64.rpm d7291c0e1bada7525bb4b9d11a516f3998d2faa1f6b441cf1cb765c6d465d326 java-11-openjdk-javadoc-11.0.17.0.8-1.el8_7.x86_64.rpm c69eaea884949a91c731e8bd382d39501f2466fa39ac40b79687e3271eb160c7 java-11-openjdk-javadoc-zip-11.0.17.0.8-1.el8_7.x86_64.rpm 203c475c5749084c9ce2838a10cc8fa4e060ce23daf07c194612b0a4c17f437c java-11-openjdk-jmods-11.0.17.0.8-1.el8_7.x86_64.rpm 376a70b9294fdf208cba2f3a18dbb4e998f7704ae3185f4f764a5b1be53516c0 java-11-openjdk-src-11.0.17.0.8-1.el8_7.x86_64.rpm f4e5bee82d6228dfeff59c4b3e29c4d49a89ae298983607e3745c623c7c2048a java-11-openjdk-static-libs-11.0.17.0.8-1.el8_7.x86_64.rpm 09c1f027ff03b8fa877f02900e2aaa9fdd746ba76c94b2fbcb92c0b91dc0f094 RLBA-2022:7861 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943) rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.0-1.el8_7.x86_64.rpm 878f9d6b5c38bff3b31ad21dabd579b984b8b4cadbd09a106e9daacdaadcaa38 aspnetcore-targeting-pack-7.0-7.0.0-1.el8_7.x86_64.rpm 151c726ec77a0463322cf8e6d85228f433bf9d639fc69d2ba2a62d97afddeb4e dotnet-7.0.100-1.el8_7.x86_64.rpm 206e2ee7237a5c0a55d1043be0537b58a162814fe44fe93f7592ca10a52e702b dotnet-apphost-pack-7.0-7.0.0-1.el8_7.x86_64.rpm 7fa30d5707209477c273499e8c19bed4f6ea19f18ffe37d1b7d050d4855f4942 dotnet-host-7.0.0-1.el8_7.x86_64.rpm aa043a73b66ef2e40266073351cd663c22223c3b1b4fd1f6acf6ed9c51efcf04 dotnet-hostfxr-7.0-7.0.0-1.el8_7.x86_64.rpm 421cb3357b477659fd3b7cb534ee9a3a735ff44b5a69f32e3a3088787c59a251 dotnet-runtime-7.0-7.0.0-1.el8_7.x86_64.rpm 8f9b1c50019b172719d57cde37b02dc769d3332898a710f3599ee174849b11dd dotnet-sdk-7.0-7.0.100-1.el8_7.x86_64.rpm 0461180b438eb7121f3f141e50d7bcf1a7d3b0e271b0c099fc512c82a0c9ddad dotnet-targeting-pack-7.0-7.0.0-1.el8_7.x86_64.rpm 25415080e2c9cf1d0ca5f3c304dc60566c490a4528aadb723ff6479feb685d54 dotnet-templates-7.0-7.0.100-1.el8_7.x86_64.rpm 21fde39f57873fea6b2bd78854959699ac14f8b88298aa0cc711dcc1b88693e7 netstandard-targeting-pack-2.1-7.0.100-1.el8_7.x86_64.rpm b24fc1b37cf501c6ee212bbfc5b112433b475ce0292b5f164529331848c30e1d RLSA-2022:8492 Important: python39:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-toml, python-urllib3, PyYAML, python-requests, mod_wsgi, python3x-pip, python-chardet, python-psutil, python-ply, python-wheel, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, python-cryptography, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__python39 python39-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm 7a8ee5a5cd1f0de76f24260d131d89147cdbe8050e0fdd8498bba2e7a02ec868 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm 5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58 python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5 python39-devel-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm 3b10a486f9f18d09c1172822d0bc10f4839819625b8485997d7ee0686f0e39b6 python39-idle-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm e549dc525b65cd3575243e24e0d3a8a0de0d8db72fc5485f889e74e7db2cdb4c python39-libs-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm 25c78438938258d4a4a38baa2ff0aeaeb5d2b0681305e03194c8a61721c44143 python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17 python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm 603e3ea442bedc2f6a2ab4f9b17eb4b50ee5bcfefdf2a90ac14eb32fdf1d3938 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm 49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12 python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm 8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm 580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm 5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5 python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm 66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d python39-test-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm 15257bab47c339067d514868f259751b4dc1ca12c07ce14fdb09f774d106dad0 python39-tkinter-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm c4cc624bba9ec5d36764ff31594acbe09f464a8227bb79851b38f252a8d1a33c RLSA-2022:8547 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms thunderbird-102.5.0-2.el8_7.x86_64.rpm 475f1d6df087435fcefe313a755054f818a67bba03b9dd066bf99dcbfdd5ec8e RLSA-2022:8554 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.5.0 ESR. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.5.0 ESR. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms firefox-102.5.0-1.el8_7.x86_64.rpm f96ae8017c6b8ae8fb7e05d01518c9e16be3bfc1d8cce9ca70672b6d2387762e RLSA-2022:8649 Important: varnish:6 security update Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: Request Forgery Vulnerability (CVE-2022-45060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for varnish, varnish-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: Request Forgery Vulnerability (CVE-2022-45060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__varnish varnish-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm 5a1fa7ed104adb107faaddafd8e877beba1351a69a607642a63c0379a383a4dc varnish-devel-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm ee7ce281889256348965d2ee8adbbcd754e77829762f455806fd8e514550afe4 varnish-docs-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm de9011b3a31dc1bef73344bf0eeca380405f881f2975d3bf29ae06cc7412454f varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm 9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e RLSA-2022:8833 Moderate: nodejs:18 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818) Security Fix(es): * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818) Security Fix(es): * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm aea785debf4481bd0e02678272a77396bbdc8dcf6b0f02d0a0c355ee25c67bde nodejs-devel-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm de3833917292c5c7473db9db975ae6ac53fe8887d0bf4699c0812ae1da27dc21 nodejs-full-i18n-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm 8dd89c09e0bbc8a8671c8f310147558f61655eb1147da5cbfe8de9bf1bca1257 npm-8.19.2-1.18.12.1.2.module+el8.7.0+1104+549f92a6.x86_64.rpm 5aba9b1c42407f8e82c505064fc689e153c0939e96827320a17e7d389829d550 RLBA-2022:9018 .NET Core 3.1 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet3.1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219) rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm 321a9227f7a51654049bc09e0f2ce8a754e420e11c71a9fab4bc2a456dc2eb88 aspnetcore-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpm ef7b433a72ec8356e0bef8fcc4a48e4fa039b188abd2e815e0ef06bf31db9551 dotnet-apphost-pack-3.1-3.1.32-1.el8_7.x86_64.rpm 61ff6e071d2e85056d0211ad5d8a1983c9e10a8db1da945567f4f38a1396907b dotnet-hostfxr-3.1-3.1.32-1.el8_7.x86_64.rpm 733b0d67480937424b1628b33545714519511b60b4266f9418c8cbcf7b00484b dotnet-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm ecc3c698aa2fc5ffc1a4ae5af831423e80972178883d6897dce35692e0aaf976 dotnet-sdk-3.1-3.1.426-1.el8_7.x86_64.rpm 40687d8ce0358edb1597c22c456ebc8fdebb0b9af4a6839261b1b92d1a37b77e dotnet-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpm e9cfa562100cd5d4ea75e21d0f6f308b00ae1303c73b4e4ccce82e70145506e8 dotnet-templates-3.1-3.1.426-1.el8_7.x86_64.rpm 2eab8aa7fc541ef65617ebdda07745ffd3f98abca35ba60dcacd00df4332ff64 RLBA-2022:9019 .NET 6.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147) rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm 40eb805b34e75308a953b764f740cffc0b52ff48354e118ee2f8c0e1a9fd2f54 aspnetcore-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm 24679a9fa18db67d5e4d5af2f59bf8419100ae01076983c95f32ba3e70edf059 dotnet-apphost-pack-6.0-6.0.12-1.el8_7.x86_64.rpm 5ae896ebac661ffda075e21ce8d41cbca61f4ea1cf93f4126b64b98adfc0f8cf dotnet-hostfxr-6.0-6.0.12-1.el8_7.x86_64.rpm e053fc0aa64ba6a7eb3d21bb6e152838b3cf2bbff56e956a934df59c06444f8c dotnet-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm c8fd6a01a6d2dcf00f64cb90b6b821ceac85408d4928ff5205836a2709a7e6d8 dotnet-sdk-6.0-6.0.112-1.el8_7.x86_64.rpm 0caf19b488f04ef0674893521e5fcd92e8680d7c8fb2aac8a6ed3ceb4c7d3fe1 dotnet-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm 7dca74b8041934891ebadf7bf016390e64745223173672b9631a7b855c50d1eb dotnet-templates-6.0-6.0.112-1.el8_7.x86_64.rpm 67a7dc47e75c39a9743bff3cdc0551b7853024e017afc27773943f3e5445c83a RLBA-2022:9020 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151) rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.1-1.el8_7.x86_64.rpm 7e43fe0a5c4c88b1ddcf2d7f507ad38377da00a50e66b1936097cc9d029a2c0b aspnetcore-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm fd7290132750d545aa8c12072861ab647811219242e5e211961a357ee86f2cd7 dotnet-7.0.101-1.el8_7.x86_64.rpm a95b04fe3de2a4793f8cf8db2bb6e7485ab0c699784446a68a904c2dbad7446d dotnet-apphost-pack-7.0-7.0.1-1.el8_7.x86_64.rpm 0cf19b555eb333bd7382da6c3115543948caf0925634212e8b3ce9c415d9fbc0 dotnet-host-7.0.1-1.el8_7.x86_64.rpm 99fae50921aca12abcd7cb7df97937e13193d133912668f4e10d47b6d6335684 dotnet-hostfxr-7.0-7.0.1-1.el8_7.x86_64.rpm 8ee69163ee0f44a2503eca39c62712330a04830ea711776071004e83fa3a11f2 dotnet-runtime-7.0-7.0.1-1.el8_7.x86_64.rpm 9afab5eab6fbcfffadfb298c1abcdeb421a48d3dd3778e68b1e05d1698ed9905 dotnet-sdk-7.0-7.0.101-1.el8_7.x86_64.rpm 840928e1999fa87024dd8309803d3392288dfa6c08b7aa80fac6940fe14fd14e dotnet-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm fa4ccf679be8704480c144cba45ed10f2c7b3679c42b0440ecc5a98f32cf0f5e dotnet-templates-7.0-7.0.101-1.el8_7.x86_64.rpm 868aa99c208a5ee4098322b5142a27c51c0a9e093092a9c6601cb32a556fbe9b netstandard-targeting-pack-2.1-7.0.101-1.el8_7.x86_64.rpm f0fcc000efcb027874d095cd43fd9210fd8f2f5e61d40f2190bdf833506ed278 RLSA-2022:9067 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.6.0 ESR. Security Fix(es): * Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) * Mozilla: Use-after-free in WebGL (CVE-2022-46880) * Mozilla: Memory corruption in WebGL (CVE-2022-46881) * Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) * Mozilla: Use-after-free in WebGL (CVE-2022-46882) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.6.0 ESR. Security Fix(es): * Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) * Mozilla: Use-after-free in WebGL (CVE-2022-46880) * Mozilla: Memory corruption in WebGL (CVE-2022-46881) * Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) * Mozilla: Use-after-free in WebGL (CVE-2022-46882) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms firefox-102.6.0-1.el8_7.x86_64.rpm 34955a1b826608022b8a34be29ca7e0fc0a075a4a22577ba07aaebaf3b9b814e RLSA-2022:9073 Moderate: nodejs:16 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625) rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm 9627a638967cca454e0eb74aadfba8c320a4f90aff79b91ff116fffca8858675 nodejs-devel-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm 8f759716abc41be055e7d194521e5b8c294942f9a4d69cc8b7fdd2011ccafead nodejs-full-i18n-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm 299c1e5c4de5ad93ac8947a3ff0a1e96cd9f1a4f7f3c4022b0adbf6e287e42fb npm-8.19.2-1.16.18.1.3.module+el8.7.0+1108+49363b0d.x86_64.rpm 63e6c5dbb05c4244de9d5ebe69fccb1c9ddff7b735d232b69d4237db460e5ab8 RLSA-2023:0016 Important: webkit2gtk3 security update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el8_7.1.x86_64.rpm b66f4a20f2cfa416c253e59f5abdae4d60ab0c8eb6fa108b62e5dc437ab2063f webkit2gtk3-devel-2.36.7-1.el8_7.1.x86_64.rpm 80c833250fea9c202b88609c6b4ab83d58dc8c614c4ae61a711f0625e4c82053 webkit2gtk3-jsc-2.36.7-1.el8_7.1.x86_64.rpm 4e1275424c38905ac892ce8c1c0da21f05575d77cc349c53d2ef10e38b11aec2 webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.x86_64.rpm ebcdca510922906cce63a30a560158cc97a434cc1187796aa7a6ca34006f7ac5 RLSA-2023:0050 Moderate: nodejs:14 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__nodejs nodejs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm 56b0c87890dd9e9563794ebf5b65af30a92acddc18d7ae8c378a704621d1946d nodejs-devel-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm 17d8ad3686b58b35212ce357b7ce43e5fc656bdec8d101186f00e5a411b730ac nodejs-full-i18n-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm 8f0511b89a54ea41b1e6e274cdd6e243a084b083d0edfe2d9ddfa5d55b37c2ad npm-6.14.17-1.14.21.1.2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm a472fd1bc022b9a378a5db241fda34d0fc6c16d234ec9801494fd3c3c32e79af RLSA-2023:0079 Moderate: .NET 6.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm 19cd947e3adc70c742d707df2cb6d5002f3d6ac755bc76cb2de3e0967810c3ff aspnetcore-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm e92089de7ad5c684dc22fd190cadc07b0c50a97ad4c82c1d63b0f57b435104e6 dotnet-apphost-pack-6.0-6.0.13-1.el8_7.x86_64.rpm 428b8d78d564a4e70047245b632fdf13b7056b1092fb0f5ca3e9edbe8f6ac64e dotnet-hostfxr-6.0-6.0.13-1.el8_7.x86_64.rpm 1efcffd0ba52bafde6dfab411848e1254daba7bfec6e409a9c16ef31d3305084 dotnet-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm 0e2b60eb3232918cbc31eb82b3b894b49307ceeb33d8c99b72780cc8ea4c114c dotnet-sdk-6.0-6.0.113-1.el8_7.x86_64.rpm 1473d96fd6aeef8aefb3aa4a131ec9b1e20504d940aa8976d055d24aa85078b6 dotnet-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm 513d42eed786b52bac7a89debf53982b79f9c6c97df7dfb8aa82696e464697d1 dotnet-templates-6.0-6.0.113-1.el8_7.x86_64.rpm 8f3a7f3e4b65d6772d56ce60ec525958af78c523c41799386a585c1df0f52edc RLBA-2023:0081 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466) rocky-linux-8-x86-64-appstream-rpms dotnet-7.0.102-1.el8_7.x86_64.rpm e095f2d0625ef0686b6ea540ca45ac81f23bfc9153b5bd7203d31c27453a6298 aspnetcore-runtime-7.0-7.0.2-1.el8_7.x86_64.rpm 2b42f45d82b387cecbe3b41339bcd839a3bbbd0c8194a333a2a7db656bde81ba aspnetcore-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpm bd1b9b7f2c4bd7939c8f6322eae6aa599a18da3f560b2662ecb1a88db6671fed dotnet-apphost-pack-7.0-7.0.2-1.el8_7.x86_64.rpm 2c0e7c8657f597286fdbcb586b1ee995b4f3803c22cc704106a01cded0ec0af0 dotnet-host-7.0.2-1.el8_7.x86_64.rpm 8a4b1cbdf55add0651ee4fd080ac818067fb824fad3178069ed5c337cf2e0347 dotnet-hostfxr-7.0-7.0.2-1.el8_7.x86_64.rpm ce335e7036bf94cc18dc46791b19a44dd51bc2242377448e7df0bb324f51a42a dotnet-runtime-7.0-7.0.2-1.el8_7.x86_64.rpm 6f9a221cb96bfc8a8b3f5f62cfe7ca30ac568c07ff53d47a12c67f8ac97fb3c1 dotnet-sdk-7.0-7.0.102-1.el8_7.x86_64.rpm 3c283655f110b4aa7485baa93ae12f0d3de144d1beb0d7de2d61ab034d611608 dotnet-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpm 53ad722510b3b550ac22e53223f07d2e60a856009a55011a38e66c109ddbd5ca dotnet-templates-7.0-7.0.102-1.el8_7.x86_64.rpm d2dcf7c46309ce7ef4006d7dbba0c28b4d1a44c2da56ab9936fd71d6ccb608e7 netstandard-targeting-pack-2.1-7.0.102-1.el8_7.x86_64.rpm 7fd06fac7c6ed0309f2bd4fa26ea6bbd890e3be7cb59638a13fe9c46ba9cd7ee RLBA-2023:0084 stalld bug fix and enhancement update The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126494) * Rebase stalld to latest upstream version (BZ#2136559) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126494) * Rebase stalld to latest upstream version (BZ#2136559) rocky-linux-8-x86-64-appstream-rpms stalld-1.17.1-1.el8_7.x86_64.rpm c87a345a98e19f757a1d558cbca24f977cd2fbbdb2017d78e9c02f7567f3b292 RLSA-2023:0087 Moderate: usbguard security update The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. Security Fix(es): * usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for usbguard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. Security Fix(es): * usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms usbguard-1.0.0-8.el8_7.2.x86_64.rpm bead5d977d07d2d41fabef3a978ed0f2989c063e606ea9a758a1faeb5f65e7a8 usbguard-dbus-1.0.0-8.el8_7.2.x86_64.rpm 749989aad3eb094437083a29d3bd008e9931e285c123bece253553ab47ddb502 usbguard-notifier-1.0.0-8.el8_7.2.x86_64.rpm 2bfaaafc8666861af9200e1252999f34c139c92a668575b7f2d1c5bbb0549a0c usbguard-tools-1.0.0-8.el8_7.2.x86_64.rpm dcb2b90d6dadd791ede0fdede5e3dd072b8b11c883bba4b0a38f149f88574108 RLSA-2023:0089 Moderate: libreoffice security update LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2022-3140) * libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305) * libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306) * libreoffice: Weak Master Keys (CVE-2022-26307) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libreoffice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2022-3140) * libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305) * libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306) * libreoffice: Weak Master Keys (CVE-2022-26307) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libreoffice-base-6.4.7.2-12.el8_7.x86_64.rpm 9deebcb58ac4783324552f21a1f2f403c46efaaf2c849b29bbffd55cc149f4b7 libreoffice-calc-6.4.7.2-12.el8_7.x86_64.rpm 45f20bd885d9ea95ad3d38da587efd34ab8566aae1fc16b9edd8b799efe6b081 libreoffice-core-6.4.7.2-12.el8_7.x86_64.rpm 3cbd9785ee4477918182a0d4b8771efcc1d520d53dc900c0318a29804204a9c8 libreoffice-draw-6.4.7.2-12.el8_7.x86_64.rpm da2bf1fe25abbc8e25f9a27f00a70e09d77b385673f280252b6cfeda0cd0eccf libreoffice-emailmerge-6.4.7.2-12.el8_7.x86_64.rpm 5f909c8f53dcab427922a6fc30fabac33790535014bcd5c1e3c1fa3788e293e2 libreoffice-filters-6.4.7.2-12.el8_7.x86_64.rpm 90208aa5a9fb3dff1e62632a77c50cfe9f1c89b014821bf24cb9937006fae00d libreoffice-gdb-debug-support-6.4.7.2-12.el8_7.x86_64.rpm c1057c33b91da23d108669763b6f62c85628bd14806d4ca8360acabfb372c2a0 libreoffice-graphicfilter-6.4.7.2-12.el8_7.x86_64.rpm b2f5c65f1f9e81f470b062510beae2623009f6f0a3e531f6091c54e26cc6bda4 libreoffice-gtk3-6.4.7.2-12.el8_7.x86_64.rpm 31f275dfadd60e75590b981f5e2e3d350ca435eebb744f252af0449475bd3db1 libreoffice-help-ar-6.4.7.2-12.el8_7.x86_64.rpm 03fe1c78cc0fed63f87e2b58b02a94360ccda0a533cd603ce90b28ffd3c057a8 libreoffice-help-bg-6.4.7.2-12.el8_7.x86_64.rpm fdbdfcd0a4a4e575d5f655a7ceaddac1ca11fb33c3e83d5f7c8b913f22d97e6c libreoffice-help-bn-6.4.7.2-12.el8_7.x86_64.rpm d8a96b6f2015428cefa02cfdff90902e5ae27554f0be3164696b09ea50870ce4 libreoffice-help-ca-6.4.7.2-12.el8_7.x86_64.rpm 7179140afd77d3875e0d7c9ecd43e19a654ef96fb595ffca3f59c319a6d320e7 libreoffice-help-cs-6.4.7.2-12.el8_7.x86_64.rpm 3d0747ad197014f6ba2587c7606896fb34d877a51f6f9af6915427c63393a362 libreoffice-help-da-6.4.7.2-12.el8_7.x86_64.rpm 4f0d8defeb48b46dcb66115009dd6261449ac7460fd7bb83b9d0c2e963661e36 libreoffice-help-de-6.4.7.2-12.el8_7.x86_64.rpm 5fd82a98933a3c13395abf683e16582005f6ceaeed874da10a5584b584e4050a libreoffice-help-dz-6.4.7.2-12.el8_7.x86_64.rpm 061daffcf62d23b770309154ebc96c19cc8abb0efae134b87db778fc29b223ee libreoffice-help-el-6.4.7.2-12.el8_7.x86_64.rpm 905d4b9c9ad8867b4ce77b46854e59cb419cdb71aed4156ebd130c8e7320f9b4 libreoffice-help-en-6.4.7.2-12.el8_7.x86_64.rpm 63abd46aff7062d541a9f7e153f8a7b4b5386fd77fb3e9ac6b8c401582bfd79a libreoffice-help-es-6.4.7.2-12.el8_7.x86_64.rpm 1c85f4ffba87630dc09ccadd412dc0ed175478979946ef297a58a1bb656a30a0 libreoffice-help-et-6.4.7.2-12.el8_7.x86_64.rpm f4dbf53da1e2d0d0720616421abbcdcfc883b358d903e580ebed80d16c28a7eb libreoffice-help-eu-6.4.7.2-12.el8_7.x86_64.rpm 775d73a53772925ee49bf373319613ac438a1f1129fdace2c7de5ac5911639ad libreoffice-help-fi-6.4.7.2-12.el8_7.x86_64.rpm bd195ccc3acc49c1d308eec2c61be26235758c7f4d095b92692ce3330fba6121 libreoffice-help-fr-6.4.7.2-12.el8_7.x86_64.rpm e36bbcac8772045a802c2c3da20c842fb38bede9034866b92a0ab60bf8085705 libreoffice-help-gl-6.4.7.2-12.el8_7.x86_64.rpm cf44888c78e8b61c7d611bf573987395e9bb24c769aa5c0a39590aa52db4834f libreoffice-help-gu-6.4.7.2-12.el8_7.x86_64.rpm 0964e9568867d77881795baaabf001b6b1b83cfc545ad6656281f3e7ed2352d3 libreoffice-help-he-6.4.7.2-12.el8_7.x86_64.rpm 2019265a6a8c3f1fb76433e67772bd156628f247a7065ac4ee814f671b3a87a5 libreoffice-help-hi-6.4.7.2-12.el8_7.x86_64.rpm 550c3ba6e15ba8a62da4e5f958ec8d20984b0623a6198eb30e51c6cb17c56bcd libreoffice-help-hr-6.4.7.2-12.el8_7.x86_64.rpm e07ca69bea41a1a569a8401f609c5a54f549388222785ceca143578b8a987bb2 libreoffice-help-hu-6.4.7.2-12.el8_7.x86_64.rpm 32104e85d1d031346f887858c704e16d70190ec07fb7555ddeed1adbf8b4f271 libreoffice-help-id-6.4.7.2-12.el8_7.x86_64.rpm 07a8b6ef05bc1a755c7d3e520d0bbcf97c6ea1e79e81a42f71e5037379b8aefe libreoffice-help-it-6.4.7.2-12.el8_7.x86_64.rpm b71f395d01167807bdbd5002e72533eedcc5fece8194d5e88dd6e938781d36e1 libreoffice-help-ja-6.4.7.2-12.el8_7.x86_64.rpm d838bd3b65267a5ad627fc7dd5c30475a87087eeb8cec473dcff61a652ba883b libreoffice-help-ko-6.4.7.2-12.el8_7.x86_64.rpm 9f16281ca9e6b11a806965017526ee8de81302d5292db4f0a183e61e5a4225bb libreoffice-help-lt-6.4.7.2-12.el8_7.x86_64.rpm df83459ed931fb894b00b7982486dddf4b56b76c53ac4155ec6bb639ebfb2fd9 libreoffice-help-lv-6.4.7.2-12.el8_7.x86_64.rpm d9f30c2d7bbea6f8781a95f323822eba6cf5f131df607db0fb994969487e5950 libreoffice-help-nb-6.4.7.2-12.el8_7.x86_64.rpm 9ca2b4619438b7641e4c9d0abc5953c443b4a9560859f3802df03ac89d8c2bf2 libreoffice-help-nl-6.4.7.2-12.el8_7.x86_64.rpm 656922d1e3e46d135682be6c0217e5838d4e52a47efaf9c53845a4afb206de14 libreoffice-help-nn-6.4.7.2-12.el8_7.x86_64.rpm df201fc5e2502d02a02df4c764d56ff8e0c3278f54a4621f0827c8f5c9cab9a0 libreoffice-help-pl-6.4.7.2-12.el8_7.x86_64.rpm 140c982b96d38129606fe56e2261d8f0ae0ed185370bf7789ccd89d4970d15f5 libreoffice-help-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm a45a07329a4cf98a0764bb99741585c406b1772d8f5be084b4308f8a75cad4a4 libreoffice-help-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm eb226155b12d7226a5f0c0b48eb4a98286b5bbc22c0e57b5284acbc518144975 libreoffice-help-ro-6.4.7.2-12.el8_7.x86_64.rpm fccc471b6ee0475dc03a207ae980e6dd6ed74e0734e60a255a4484ce8966f347 libreoffice-help-ru-6.4.7.2-12.el8_7.x86_64.rpm 390774ed5168088441725a2b5e7eb34e8626d66867b5980c421911831e977e3a libreoffice-help-si-6.4.7.2-12.el8_7.x86_64.rpm 4094a72260b9c4bd81bf99ff29b977e2a5e87677c94fe3d5393de0b6cf3b2c5f libreoffice-help-sk-6.4.7.2-12.el8_7.x86_64.rpm e4bf9168efcfb7d0ecb9ee06356f99c2e75ef4e2efede5cd203f57bec12c4f66 libreoffice-help-sl-6.4.7.2-12.el8_7.x86_64.rpm de5a992db120952cb0f0b613680ba963859f360f0120e7069ca482b154ebe1a9 libreoffice-help-sv-6.4.7.2-12.el8_7.x86_64.rpm e62ba73a3ca1b85f88b7841e433966a4dab2b8df1c97284c8ba9f2e926cf1011 libreoffice-help-ta-6.4.7.2-12.el8_7.x86_64.rpm 249b6a093b879d4cea82077a601fee34f28550ac80614f91bbc477f77b3cde16 libreoffice-help-tr-6.4.7.2-12.el8_7.x86_64.rpm 4bebcd0b5d9c03d0fa2d7ce9183fcfa23734c370e829ba059bdf2f42aabf50d5 libreoffice-help-uk-6.4.7.2-12.el8_7.x86_64.rpm b3f2b9baef677289e1895e22a5d0260d5a96dcd98110ce697ae60367a64c5c77 libreoffice-help-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm aeb00838fb4028809963aa331b5bdd4780cd4ae0aaadd485dcbb5bf9d0868bda libreoffice-help-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm 252db31dae8a5646f2beb4bed1d7d45452adadcd40122ebc7c3860d89db30372 libreoffice-impress-6.4.7.2-12.el8_7.x86_64.rpm 67be3a38ec41a6a2a601c6581065badf857931b4c4913778dd308ba92026a849 libreofficekit-6.4.7.2-12.el8_7.x86_64.rpm b6bdbc45d9331f47f98f51365a3319370c23504399231f50c0621b5a2edd6fd6 libreoffice-langpack-af-6.4.7.2-12.el8_7.x86_64.rpm 988d4bb624e4092d22428ba3c02418a8daf433889d326f9442b2c17432efba12 libreoffice-langpack-ar-6.4.7.2-12.el8_7.x86_64.rpm b7d0ea249c8860ca81b86340caa2f478d74b592db6a65d78c2299cd49392975c libreoffice-langpack-as-6.4.7.2-12.el8_7.x86_64.rpm 9cce1c70933c751dd20d1a544fbaa0478291b6cb12b906b3f199cfa68f27b034 libreoffice-langpack-bg-6.4.7.2-12.el8_7.x86_64.rpm cc813cecf999bcb5328f6c513ae04b04ef3733c601c503b917ef58ec6b1d0e0e libreoffice-langpack-bn-6.4.7.2-12.el8_7.x86_64.rpm d022d597fe34c30fe08a21759530fcd70cdf22ecf6134bb0c49831dd492cdb6c libreoffice-langpack-br-6.4.7.2-12.el8_7.x86_64.rpm b5cc2916adb880104a19c834aa5b78ce82b6d3fdd5bc8db8a4e9fd4547dbb41f libreoffice-langpack-ca-6.4.7.2-12.el8_7.x86_64.rpm 67853fb62255bcf3402bf99bddb7146187f9ffe7ed15359a26171beb96ed0682 libreoffice-langpack-cs-6.4.7.2-12.el8_7.x86_64.rpm ff597264ac48be32cfeb88e4f3f6f0cd2bc4b919e2b8ca72ab4fff490e726671 libreoffice-langpack-cy-6.4.7.2-12.el8_7.x86_64.rpm f167869e5da9c0f90cf7863afd4c3108aeb232d25c24e069477acc6105735b1e libreoffice-langpack-da-6.4.7.2-12.el8_7.x86_64.rpm 71dff527ec52f21588c691391242da382f280eff6d3d2a58aebb5903e576afb2 libreoffice-langpack-de-6.4.7.2-12.el8_7.x86_64.rpm 7fa65109052fc759a641b02af8f0c62872d801f8cc7cc10cd78cf323bce336a0 libreoffice-langpack-dz-6.4.7.2-12.el8_7.x86_64.rpm 0fa381039a2d67ccd8c7b99b8a0e9a6d80cf3a683742a31366ff84b3584d863e libreoffice-langpack-el-6.4.7.2-12.el8_7.x86_64.rpm f835835d16e9840a1965d89fcc2866de00260d0dd60835c10e9cb17e6c5a85de libreoffice-langpack-en-6.4.7.2-12.el8_7.x86_64.rpm 2ec84959ce5836675aa81ad37aca5d28b8aa1d6ff1221605d24b74f61fd0919b libreoffice-langpack-es-6.4.7.2-12.el8_7.x86_64.rpm 34cb6e5d14a5d01f304ec9305da161db14d817c44cc03032235df8997dbf8d4e libreoffice-langpack-et-6.4.7.2-12.el8_7.x86_64.rpm 9d067670e2d1e873b76164c19d4c64883c11ee6c84da0968bf28f3e59ead02cd libreoffice-langpack-eu-6.4.7.2-12.el8_7.x86_64.rpm 5d1041d87c60aa7a925569fdade1d024b6eac454bc6f9a3289a3e659f6ffa5f3 libreoffice-langpack-fa-6.4.7.2-12.el8_7.x86_64.rpm 2daad575be18ab653d9c941c50f93e1ca3d0e58215b02b98a628639649be0ac1 libreoffice-langpack-fi-6.4.7.2-12.el8_7.x86_64.rpm ec659e9d5b7e6cdba759a28a157f1c0df8daaefbd10e091097b73faaf7a6b3f9 libreoffice-langpack-fr-6.4.7.2-12.el8_7.x86_64.rpm edd7b8db2de740f9f6cb4dd98582a662ffbad17c750ddac737d2e5c5e023db9f libreoffice-langpack-ga-6.4.7.2-12.el8_7.x86_64.rpm 851999159c382c1b90712630287801476a7e9d263374523bb77f9cbf6fa81df2 libreoffice-langpack-gl-6.4.7.2-12.el8_7.x86_64.rpm 979da47e05ad699f615140ff8023ea06bf9111f9904f1293803dcf79b2d58384 libreoffice-langpack-gu-6.4.7.2-12.el8_7.x86_64.rpm 1c278eb3f5a666c5ab131a702ec45df4afca8ab843dc482f014a470a755da3ba libreoffice-langpack-he-6.4.7.2-12.el8_7.x86_64.rpm 7a49ecc4b338b44bc9a1735c732fd235c27b44e7975501a176738d47ae5ecaec libreoffice-langpack-hi-6.4.7.2-12.el8_7.x86_64.rpm a8f1719030de272608a23246c6b570baec60ec9226eda53121be1837f7394775 libreoffice-langpack-hr-6.4.7.2-12.el8_7.x86_64.rpm cf01d61302e7a2be6894af3ad56aeef65c0684f293ce33dc5b0299621b4a1928 libreoffice-langpack-hu-6.4.7.2-12.el8_7.x86_64.rpm db1590dc81257b73a5ece23a5a1b5b0d84fbc04358c9f449e5ad6c163d0fe09c libreoffice-langpack-id-6.4.7.2-12.el8_7.x86_64.rpm d25e6f6b4cca141b5c095803714a386db9a3ff4dc7681ffeeb82510a42f313a1 libreoffice-langpack-it-6.4.7.2-12.el8_7.x86_64.rpm c533b032b03631ad895b6b25a6ba2c4c80f2e2b9569f57f105c73bc01d4834ae libreoffice-langpack-ja-6.4.7.2-12.el8_7.x86_64.rpm f80e02f8ef9b9a2622f4331ddce869eed199bf9840bd883b356233c0a3d3d88b libreoffice-langpack-kk-6.4.7.2-12.el8_7.x86_64.rpm e8b0d4061c628d08444a9f5aa8b9335d04e5d5a9e2f7b38454e586f91e673ae5 libreoffice-langpack-kn-6.4.7.2-12.el8_7.x86_64.rpm 270d35513dd77f54c0d1ca36211595616122ff259ac05a2620a3f9925bb9aa13 libreoffice-langpack-ko-6.4.7.2-12.el8_7.x86_64.rpm 9283ba31d93a13b3f55377a470dc1de640fcd206c336eb5e519e51abb81f4cab libreoffice-langpack-lt-6.4.7.2-12.el8_7.x86_64.rpm 0f7c47353e9ab31a8fb5458ba201ec9f94cd1011478fb367ccd68febf35eed3d libreoffice-langpack-lv-6.4.7.2-12.el8_7.x86_64.rpm 7195b5abd97ca239e1d3864c82283abdd8e04881af0b3492ba1ef85cd19a7d54 libreoffice-langpack-mai-6.4.7.2-12.el8_7.x86_64.rpm 2fb567b2c0480151158ef5cc67f7ec04bf74400103609688f21c5622f7b97d7c libreoffice-langpack-ml-6.4.7.2-12.el8_7.x86_64.rpm 7cc4b7f6788ebea37e668fe237832a8a66a6d442421edd8d6229d109d9ec7ae4 libreoffice-langpack-mr-6.4.7.2-12.el8_7.x86_64.rpm 91c115e543b49a5e78530f17c379e25b5cf9c78d7c93d9df2291e374d432a1b0 libreoffice-langpack-nb-6.4.7.2-12.el8_7.x86_64.rpm 581bd3d33b559812190568278625c2c39b4320d8d7fe74a85f01cb5eb87225f1 libreoffice-langpack-nl-6.4.7.2-12.el8_7.x86_64.rpm 20bdfb91d94dc101ec3d9bc2721ffbffd997fc9132119fa27db0b4ec06326769 libreoffice-langpack-nn-6.4.7.2-12.el8_7.x86_64.rpm 3016cb44ef0366306cb0078aac79e7f0a0c0206c575306c9008145d66ee95b80 libreoffice-langpack-nr-6.4.7.2-12.el8_7.x86_64.rpm db77dc0b8ec143e88acdc36da1d1bbb9e4084170010e03e2bf58b79c9d29ed8b libreoffice-langpack-nso-6.4.7.2-12.el8_7.x86_64.rpm 3155dd4c34722016ddd10eeafc9a24e81c1cb879e88b61c8223d3f4b84fdae96 libreoffice-langpack-or-6.4.7.2-12.el8_7.x86_64.rpm f4a92984a0239b5b27e5668681ca50a0f49e356eff6f03432c30d07d4a277e97 libreoffice-langpack-pa-6.4.7.2-12.el8_7.x86_64.rpm a76a68ec57ad97c6ac55c66508b85034731ff9ac6e4ddd68170c74eb1996abea libreoffice-langpack-pl-6.4.7.2-12.el8_7.x86_64.rpm 0e3273e0b23351a66d89d1b92906ef57dfdd8eba202391c7c3a84de0ca41296b libreoffice-langpack-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm c26e0a1df1c5978da0157481215ac413a68f0e0b434334e79d3e87f050e98c56 libreoffice-langpack-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm 76f0e47cdb1a1a74d5bebf594514dab49d7df026e3a38fce97905f0845327560 libreoffice-langpack-ro-6.4.7.2-12.el8_7.x86_64.rpm 392226e87c926f15bccdc29363d14c5eddcdb85d266dbda11f36fd5e9432d5e1 libreoffice-langpack-ru-6.4.7.2-12.el8_7.x86_64.rpm cd343cc7d2863559f675b94dbad89757e754d5461e82120d8175ea044ecf9e37 libreoffice-langpack-si-6.4.7.2-12.el8_7.x86_64.rpm deed82170b53eded2a2aa0c1d60837f073643ec999000c7ce0adc765b3ef6d77 libreoffice-langpack-sk-6.4.7.2-12.el8_7.x86_64.rpm ea1f596b1a278d77e25da670aaeb8216e7cd1b6292844e56fa9ab38d34a59882 libreoffice-langpack-sl-6.4.7.2-12.el8_7.x86_64.rpm cc206c8173612f9bb5b535c3328b54306b4833937c6fafeb21b16eded49a7bf3 libreoffice-langpack-sr-6.4.7.2-12.el8_7.x86_64.rpm b042a537c159401f41ef2e0126653ba8d024b6576dc51ea2a5be99b552591152 libreoffice-langpack-ss-6.4.7.2-12.el8_7.x86_64.rpm 314ab9d62b5f2ef1507ec47263b0814cea690d1d667e7a9fd475e651c2d469e3 libreoffice-langpack-st-6.4.7.2-12.el8_7.x86_64.rpm 19da6a8cae53dddf989aa0c8e80a6dc0cb984705171c1d3620fc7d1679f0ee4f libreoffice-langpack-sv-6.4.7.2-12.el8_7.x86_64.rpm be6a63714af0510293eb3948795f94187a9e00c3776a7c91d56ece689da948a6 libreoffice-langpack-ta-6.4.7.2-12.el8_7.x86_64.rpm bae0263723972988cd74c2a2007794067ab952d28e0fd551388e3ba37d5ec795 libreoffice-langpack-te-6.4.7.2-12.el8_7.x86_64.rpm 0815ac0b02309c801410f56820727d1c28461270a2fd72912b3bae3012ebd403 libreoffice-langpack-th-6.4.7.2-12.el8_7.x86_64.rpm 5937680a0666d69f4da85e0191a0ea83c9d09a8ffe87eb37005bc985539326d1 libreoffice-langpack-tn-6.4.7.2-12.el8_7.x86_64.rpm 9b510f83317401bbdbc8c69e7f4da8f16ebff05609a43e39c3a6daa14d735d2b libreoffice-langpack-tr-6.4.7.2-12.el8_7.x86_64.rpm 44df604dd9e2db643afbdd09cadb46e467e4d5590ca7093c36649c1905c61a1a libreoffice-langpack-ts-6.4.7.2-12.el8_7.x86_64.rpm 16bf5c549b119d19cc564f05ab68486ca081f0e9aaa4532055464e65c079d30a libreoffice-langpack-uk-6.4.7.2-12.el8_7.x86_64.rpm c3bef6a2f758a0d5699fc0be420705186cdbdf81b168b067233ec51269083c24 libreoffice-langpack-ve-6.4.7.2-12.el8_7.x86_64.rpm 23f86455843a306a63e0a33bd3bb1507ca273020fbeecb9773f20d891a0c4576 libreoffice-langpack-xh-6.4.7.2-12.el8_7.x86_64.rpm 692659385202977ef41b5fcbac8e5a15d08f171857881e4b7e705c96a932034c libreoffice-langpack-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm a1ebd7b525df5d4a043a61559927f8395f2b3d0787e939a1017fa08fb851ea92 libreoffice-langpack-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm 1bae9af8241b3121500874b11585917219e7e869436d1812a188c5bc31d7177c libreoffice-langpack-zu-6.4.7.2-12.el8_7.x86_64.rpm ba355fe119f5c58816bcf23497b6641c519847deafc51a29cd896b5768abefd0 libreoffice-math-6.4.7.2-12.el8_7.x86_64.rpm f37a4dbcdf9be4062d951074c8f4c7e1b225db426320fbb23b2eb79d8e09d21e libreoffice-ogltrans-6.4.7.2-12.el8_7.x86_64.rpm 877458794cb0df1f0fb61d3ad42a0438f7598474b1203d1fd62e1ddb55983fb6 libreoffice-pdfimport-6.4.7.2-12.el8_7.x86_64.rpm 3275b3a571322c4ec901e81348a05f9a2904d493752cf9362c1c2c5bec3051db libreoffice-pyuno-6.4.7.2-12.el8_7.x86_64.rpm f21111acc9a9675d026cb4b0f9de7c61626e41263ae84dcacb261213fcb15e64 libreoffice-ure-6.4.7.2-12.el8_7.x86_64.rpm 5d5a232e7d047d4916fff8f25dcd7eb1e006f67ab3dce3360cb13b3bf0176884 libreoffice-wiki-publisher-6.4.7.2-12.el8_7.x86_64.rpm 9e7273ad2d9312b23c505ab5a5012b56a6dfde9950999f0c3b5ee648644072a9 libreoffice-writer-6.4.7.2-12.el8_7.x86_64.rpm 85547a305424608f8050c5276bd51f33c6e06cb67a288d36d1296d3475c2fd76 libreoffice-x11-6.4.7.2-12.el8_7.x86_64.rpm cf0552c2b966545f00c5731c45675c250650b86e64e0ada61e86610347dabeb5 libreoffice-xsltfilter-6.4.7.2-12.el8_7.x86_64.rpm 690cb561854811ecb4df05a9e2ba6100eb826f141cd9f32b5fce436b914b1a43 RLBA-2023:0091 idm:client and idm:DL1 bug fix and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050) * vault interoperability with older Rocky Linux systems is broken (BZ#2148255) * rpm -v ipa-selinux produces warning (BZ#2150243) * ipa-client-install does not maintain server affinity during installation (BZ#2150246) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050) * vault interoperability with older Rocky Linux systems is broken (BZ#2148255) * rpm -v ipa-selinux produces warning (BZ#2150243) * ipa-client-install does not maintain server affinity during installation (BZ#2150246) rocky-linux-8-x86-64-appstream-rpms__idm bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm 615d759274eb3f3f8c28657012cfec65b67d8a47fbf38b897955cec7bdde1495 ipa-client-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm b08c20bbe1ddb56b9a845e76ca57d91289061d67f2956ea7ee44fa3891564691 ipa-client-epn-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm d4104096325d2375fab854ab7c562dd7613429b1c06608829bbf3322d63930c5 ipa-client-samba-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm 62e6bb5cf85e591fa9fef34727767c0d6797b68424c1df291a4e318683d7486c ipa-server-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm e4104c83e28300dd34f62a6690fa552cc6ad508ae449b8fd903612c566f1cff7 ipa-server-trust-ad-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm f1263ee2cc3474f99aaf58d505cdb4fed7528bf191c4536c0d4f8c95b8825ab6 opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm 449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm 7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063 RLBA-2023:0093 gnome-settings-daemon bug fix and enhancement update The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962) rocky-linux-8-x86-64-appstream-rpms gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm 12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94 RLBA-2023:0092 fapolicyd bug fix and enhancement update The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fix(es) and Enhancement(s). * statically linked app can execute untrusted app (BZ#2137251) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fapolicyd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fix(es) and Enhancement(s). * statically linked app can execute untrusted app (BZ#2137251) rocky-linux-8-x86-64-appstream-rpms fapolicyd-1.1.3-8.el8_7.1.x86_64.rpm df7e09dfb8ada037f0b86b5514bc92c5160a6005016fb8f7c293e1960f071ef1 RLSA-2023:0095 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867) * libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) * libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867) * libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) * libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libtiff-4.0.9-26.el8_7.x86_64.rpm 731d996009cf80a502bbdfbbe30647ef6e0bfbdd3f66554f9f48181308f6f50a libtiff-devel-4.0.9-26.el8_7.x86_64.rpm 25376cf67f42de475ae2ef2dcd44e7f27195cd1da1bf8e87927cec11f2a04fb0 RLSA-2023:0099 Moderate: virt:rhel and virt-devel:rhel security and bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176) * VMs hung on vnc_clipboard_send (BZ#2148504) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176) * VMs hung on vnc_clipboard_send (BZ#2148504) rocky-linux-8-x86-64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686 libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45 libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645 libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0 libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100 libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm 35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9 libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm 8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm 3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52 libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm 8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0 libvirt-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm b9ef5d92b48763563bed303770260432928ebcf2644488ae404bb74cc990a15d libvirt-client-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm ce89204be0bd94f46016523a96a5b389b42edfb1f04ef2ba1689bb05a5f911a6 libvirt-daemon-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3c2ee70a5dfdfafc14132ab8c1da3137cd2c36a4b283e33cfcba41a4c8a924dd libvirt-daemon-config-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3bbec6e9b75d574eddd90a32fe68cf134e78eac5bf68d3bba1d7403da60fc624 libvirt-daemon-config-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 7467b42dd7c33d8cdeeb8a170c514ac0fdf35eebd3ab435926003cdcdbf60df8 libvirt-daemon-driver-interface-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 25787b85f42279a7a61c2267e81f2232668dbdecf49cbb5c4d70b8a96bf39d54 libvirt-daemon-driver-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3b6628a226e05e3c523bc8339df005e46743aa3c6763f8155b6160f5e91aa166 libvirt-daemon-driver-nodedev-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm ec35ee6d270ef5590cbc5be2742753e2e6ed38a55d2b41a1abb8473d8ae89682 libvirt-daemon-driver-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3c311b6cbc8d7d7b0be31e792b5c7bb93abd77cd7b997004d28b7d96b73680ac libvirt-daemon-driver-qemu-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 5b20d7d9542e3cd825eb9fdceae64234fdbfe6f62a2b53876f10a7e5ccbdd361 libvirt-daemon-driver-secret-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 623bd9705a5d7e75633710957002c53e941cc33728959c4d4a8f948173e8108f libvirt-daemon-driver-storage-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm b8a434b2b8ff4852d9cdde198f94ec1543a2c667dbd6ad597982940f20855f0b libvirt-daemon-driver-storage-core-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 68f20d69d3aff90fcdd916be2fcd9610030bd42c906f481df249e3e6a42fe8a6 libvirt-daemon-driver-storage-disk-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm fe835c82f15c31348503730b4b4e57b85829152e9c0d8b58dc2a48231b4c942f libvirt-daemon-driver-storage-gluster-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm add36e2a88b056a3fe1ca77c9da9f8029962bd7179cb5e138c02e097697d9c89 libvirt-daemon-driver-storage-iscsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 9186d8c082047bbfa659071f508a90374ca06563ff98973a89659630d4c44d2e libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm fee3b3f22d8c449e4e8e4f319a8f167af737d249942f18b380838caec7e14351 libvirt-daemon-driver-storage-logical-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm e36dcf2ac32139fe7c3ac8b3fb23d3bfa0cecddf1c6be2bf5b35675964d1038f libvirt-daemon-driver-storage-mpath-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm b4894c09aa627a04ace291333e127be2c75f3b31973dfd587cb3782543176b9f libvirt-daemon-driver-storage-rbd-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm a7c64cd57ef47df61152c1c9993f16452b532e64f81ca56d95b872546cac88a4 libvirt-daemon-driver-storage-scsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm d8875d26478fbcea076efa4e89d4f75af2d3f086608613e9f13984c3fd3b6beb libvirt-daemon-kvm-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 3c1c5073aae25e492ab9f6421542564e1dc6b52bb005d39a865e39695355476b libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb libvirt-devel-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 69d009e43bf2e2c7c755d75a87e473493860fac49398b681c245fe4f9681cd9b libvirt-docs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 663c0e30efd09e486901471d7d97cd20e7bc3e247e31a12b50628c52ed3719da libvirt-libs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 718445c64a09e6ac9c9212279808804c8a25a2b826f130e9baf9c4c8a40f6928 libvirt-lock-sanlock-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 136bb6f44e439667a04e2ab2748e53990861904b2c7ad6dc2d0686a24af9bb63 libvirt-nss-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 88f45182a3be869343f5dbe202488c5b25250b5f9ff44755a152877868175cd2 libvirt-wireshark-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm 1a86899f54ca4946dc2aeca213014b6bfb7549e1fbda3bf63aaacce2c38da254 lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0 nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255 nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm 21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319 netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm 95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2 perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776 ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm 5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70 supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm 9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838 swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9 swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm 105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm 63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4 RLBA-2023:0102 nmstate bug fix and enhancement update Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * nmstate verificationError on OpenshiftSDN (BZ#2128555) * kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698) * Addresses configured at different order than specified at state (BZ#2149048) * fail to create many veth interfaces (BZ#2150705) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * nmstate verificationError on OpenshiftSDN (BZ#2128555) * kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698) * Addresses configured at different order than specified at state (BZ#2149048) * fail to create many veth interfaces (BZ#2150705) rocky-linux-8-x86-64-appstream-rpms nmstate-1.3.3-4.el8_7.x86_64.rpm 9963e8fdf78582885c9e319141a036c2be07928e6fa6fb28aa3fafe17ea0fda6 nmstate-libs-1.3.3-4.el8_7.x86_64.rpm b5fff4e8d7d1b685e45fc80c8ca93c92e1a1a469c94f58e707044b71ad0f8fab RLSA-2023:0113 Moderate: postgresql:10 security update PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for postgresql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms__postgresql postgresql-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm b5778e3c960ecbf1c282ae148a86bfeb5a8f7703cbb13259a35734462e5154f0 postgresql-contrib-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 312cce0ec240fd7f0cf098d08c895c5d07e85d3d503acce17782878be5f0b533 postgresql-docs-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 9573d11bb8b959f146b64a9e99357def762484c8db8863e2c5db2cdcd2b59ab6 postgresql-plperl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 8824a8921b5af548c5bba5be9934a9bdda71a115ef6f2e29b40db5dfb9733cf7 postgresql-plpython3-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 2d7b8151757f6b5457e7abed902a33208f721b8e109592daabeab886094c796b postgresql-pltcl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm a169e67733e21d3c80e7fca6a54ac834ec2b89cd37a4c4681f92c9e67660d860 postgresql-server-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 67d43533117445da9b60e89fb6e107491d9d3948bb6280032cea8a8097bd7e46 postgresql-server-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm bb1d784e73d49c3aa92583d77247412b2002d6bea658258db9fc8471cbd2542d postgresql-static-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 360192b1246b3462f2c05b04991a80ca8b16e1a736b3e672e5ecae64f7e44168 postgresql-test-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 37fff25b576ac9319660475eb135c592f227c4fbe1ea142cf59f497d46d03efd postgresql-test-rpm-macros-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 736329addee977b43c340be5e022888d76f657f36187ee6671446e8ea27f32f0 postgresql-upgrade-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 37cdc4fb9262b144f50b09476d2650147bbcdca92b540b55359e5b00ead4f660 postgresql-upgrade-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm 577e4c656a2c95372939bfe9b2e0902a17a5ec2e8e1a12d40ddd84947e680398 RLBA-2023:0115 container-tools:rhel8 bug fix and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294) * The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171) * FailingStreak is not reset to 0 when the container starts again. (BZ#2149775) * SIGSEGV: segmentation violation on s390x (BZ#2150416) * SIGSEGV: segmentation violation on s390x (BZ#2150428) * buildah: ubi8 sticky bit removed from /tmp (BZ#2152017) * podman: ubi8 sticky bit removed from /tmp (BZ#2152027) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041) * podman gating test issues in Rocky Linux8.7 (BZ#2154403) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294) * The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171) * FailingStreak is not reset to 0 when the container starts again. (BZ#2149775) * SIGSEGV: segmentation violation on s390x (BZ#2150416) * SIGSEGV: segmentation violation on s390x (BZ#2150428) * buildah: ubi8 sticky bit removed from /tmp (BZ#2152017) * podman: ubi8 sticky bit removed from /tmp (BZ#2152027) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041) * podman gating test issues in Rocky Linux8.7 (BZ#2154403) rocky-linux-8-x86-64-appstream-rpms__container-tools aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d33e11f32b7ca8bb1ab9de7144786d8b949b688760adc1785e2fe70d5f39168a buildah-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpm 9f0c8864b500eadd5916215775f4378bbad990f39cda2b4247d11721b0db555d buildah-tests-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpm 457b0e8e2753f67ab411239d353bfb70f9cbe5ff92064182824159d43231bebd conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036 containers-common-1-44.module+el8.7.0+1122+04a7498b.x86_64.rpm 6354760e20840a090eec3a3222a796c67849c5fe6910c3fda36aafedb764f763 crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570 libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8 netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 119f90778569a22466b4a90fa278b1af63d137005aaf3aa5945f28a5514bec92 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c podman-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 74f931fd657a10723ac15ef27d2397fd89faca721ad7fe60c194623d8a199c84 podman-catatonit-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 9e61420bc7d316ea9a7177590cb1c40f1cefeef5a32867bf5f3efc68f5b78bc9 podman-gvproxy-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 83da4ead1d4252fa4e7a371dcfe027d2c9238e66df135ba4e4085660f990a9c0 podman-plugins-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm b960dcc969cd8fbdc34056dab7aaaa0c952f6e1276b4320a5fac779f7f76bb9d podman-remote-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 17133a616cd92572e037cffb207203389c6dae38052742912719b1c678834dbf podman-tests-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm 71ec468e01f86958f0ea70ce32eb9b514c56b445b8a0ef370fc4817aa1c66fa1 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm 264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856 skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm b2dbacf676bb36b7d618c125bba63b03b16206500f903f8ce4b76e368f16dd26 skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 8d4dda0fee2dc95c05a961422237e3ab97a7f32f0371cd7dc91c447a09ce5b0e slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm 1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04 RLBA-2023:0118 gcc-toolset-12-gcc bug fix update GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix: * __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131) For more information about usage, see Using GCC Toolset linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix: * __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131) For more information about usage, see Using GCC Toolset linked from the References section. rocky-linux-8-x86-64-appstream-rpms gcc-toolset-12-gcc-gfortran-12.1.1-3.4.el8_7.x86_64.rpm 03e13ea95319e3d645ea2f2775cc0ccea2621e466ff5c74dc010e167a98048ff gcc-toolset-12-libquadmath-devel-12.1.1-3.4.el8_7.x86_64.rpm 338c60ca232485761495e5da958d652b5330b1ccd65d3e261b5cdc9f5762fce1 gcc-toolset-12-libstdc++-devel-12.1.1-3.4.el8_7.x86_64.rpm ee54399f0565380b7b194f11584e5d6ebdd7101e200810af5c47bade1dc57be3 gcc-toolset-12-gcc-12.1.1-3.4.el8_7.x86_64.rpm 9b5f7a5010bc4cb9dabfa48d27f209c3f6e963269738c66b6f08326099b0b2b2 gcc-toolset-12-gcc-c++-12.1.1-3.4.el8_7.x86_64.rpm 781f245ccae0add23839d4278b321cf5b9d0ae2e5b331bb91855c52aa1947ca9 gcc-toolset-12-gcc-plugin-devel-12.1.1-3.4.el8_7.x86_64.rpm 2baf7899cb43579f8e5cb74f042fae21115f7efc0b92d5299d67139aa34d7f85 gcc-toolset-12-libasan-devel-12.1.1-3.4.el8_7.x86_64.rpm a586e52094f104dc0a73fecf7e362f0ac2ac152cf6ebddffc4fda259e67caee4 gcc-toolset-12-libatomic-devel-12.1.1-3.4.el8_7.x86_64.rpm 66c0661ce6dba20c42cb9fa1cf04c1822b105a5b7d6ff0f6df06d2c4b617c397 gcc-toolset-12-libgccjit-12.1.1-3.4.el8_7.x86_64.rpm 9d16c50238884ed4b02b99e704d75852304956efd5727bb61c37336de641c021 gcc-toolset-12-libgccjit-devel-12.1.1-3.4.el8_7.x86_64.rpm 41b25f295df072de2e028e63b8f80b0988197a44b02f7c977384f8f1ac902c74 gcc-toolset-12-libgccjit-docs-12.1.1-3.4.el8_7.x86_64.rpm 76c1ec66d911cfa17ec5fa210e59646b66681be32b85f704b1a1bd36d341aa3d gcc-toolset-12-libitm-devel-12.1.1-3.4.el8_7.x86_64.rpm 9801969984b980d98355a12aa4f3ac935473f916ebaaba28e876b9d499a10aa9 gcc-toolset-12-liblsan-devel-12.1.1-3.4.el8_7.x86_64.rpm d09572b0ab246d1b0e908639d8499c93b9e5c75f4c6918829cdc4c927fdb074b gcc-toolset-12-libstdc++-docs-12.1.1-3.4.el8_7.x86_64.rpm 4042323654ab887b49ad764815f849518606ab569f15867dd48761efeae307c7 gcc-toolset-12-libtsan-devel-12.1.1-3.4.el8_7.x86_64.rpm 6a1892832e34258a7f2d07f12f091240d29e0ed1eee3a433d738f8a4ca43e005 gcc-toolset-12-libubsan-devel-12.1.1-3.4.el8_7.x86_64.rpm ef5b84a88e6a7c18168f2e18e87c4d42a142826522d4e84f422fa7f8528e887e gcc-toolset-12-offload-nvptx-12.1.1-3.4.el8_7.x86_64.rpm f66d3ad97d0c2fd035b402ab9e21022acf0564d0f18dfb5591ad39d6ca369bb4 libasan8-12.1.1-3.4.el8_7.x86_64.rpm 307361224e4fb47633ef6951e403bd7c322357d3065bfada304232c528b02c74 libtsan2-12.1.1-3.4.el8_7.x86_64.rpm a8195ff5331c531630c0fb049bdd7f2a741caefa72995441f20c09490e3eea79 RLBA-2023:0119 tigervnc bug fix and enhancement update Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Bug Fix(es) and Enhancement(s): * x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tigervnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Bug Fix(es) and Enhancement(s): * x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915) rocky-linux-8-x86-64-appstream-rpms tigervnc-server-1.12.0-8.el8_7.x86_64.rpm cf3ab5e942cc1a5e393cd9e5acc1d0e8ed1397ff53ef65b75081e509de13b400 tigervnc-1.12.0-8.el8_7.x86_64.rpm ff93f0dcd4015fd3f3006b4acb04bd9a67b5a63a1131811eb98155fe8010cc68 tigervnc-server-minimal-1.12.0-8.el8_7.x86_64.rpm a28d235028fbb8d31fc91e6e498973f686176edfabd61b2f47094464c7e042a7 tigervnc-server-module-1.12.0-8.el8_7.x86_64.rpm 27655616e55c29e91a07a8bc0fa7fd8d77df71f03c1232ca7dc95cf1ebd0c267 RLBA-2023:0122 ansible-core bug fix and enhancement update Use python re to parse service output instead of grep Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Use python re to parse service output instead of grep rocky-linux-8-x86-64-appstream-rpms ansible-core-2.13.3-2.el8_7.x86_64.rpm acab7391f2aa87d836824ce414bb373fb1bcfe619db49a8976f24c74e4a988b6 ansible-test-2.13.3-2.el8_7.x86_64.rpm bea3cd7956329c0cf0e6cb9a4a588d1a50d1d838a73e86bae4b2ba1281ded275 RLBA-2023:0125 sysstat bug fix and enhancement update The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity. Bug Fix(es) and Enhancement(s): * There is no option `sadc -f` in sysstat. (BZ#2153422) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysstat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity. Bug Fix(es) and Enhancement(s): * There is no option `sadc -f` in sysstat. (BZ#2153422) rocky-linux-8-x86-64-appstream-rpms sysstat-11.7.3-7.el8_7.1.x86_64.rpm d210af3b0b24e1bf4fc87bb15608fe57d20a25ab637e8d0864e4754ec7e9bc54 RLBA-2023:0126 hyperv-daemons bug fix update The hyperv-daemons packages provide a suite of daemons that are needed when a Rocky Linux guest is running on Microsoft Hyper-V. Bug fix: * Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The hyperv-daemons packages provide a suite of daemons that are needed when a Rocky Linux guest is running on Microsoft Hyper-V. Bug fix: * Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255) rocky-linux-8-x86-64-appstream-rpms hyperv-daemons-0-0.34.20180415git.el8_7.x86_64.rpm b91f33dc859fed5149f7b43190a8faa33098b35a50f6c5b132f836f261dceea0 hypervfcopyd-0-0.34.20180415git.el8_7.x86_64.rpm ca77af9b558f062a22f512e0ed57c043f3f00e20980dcfd13165d6ee8f23458d hypervkvpd-0-0.34.20180415git.el8_7.x86_64.rpm 61994e50a0a399493965113fcfa8751c50af20eb85daa469a447ac7de4a598f4 hypervvssd-0-0.34.20180415git.el8_7.x86_64.rpm 2224846553a41b8b982cec8989b766d76875fc6cc4b0c6186becd0f71b406bdc RLSA-2023:0171 Important: dpdk security update The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Security Fix(es): * dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dpdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Security Fix(es): * dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms dpdk-21.11-2.el8_7.x86_64.rpm 22ca5300970c260c52b0ac7bbb1867cbba7b37cfacc18d0345188740cf1486a9 dpdk-devel-21.11-2.el8_7.x86_64.rpm 669089120d28a19848e177ff43b5195e44a34fcb44ff8fd94a61c121366f2278 dpdk-tools-21.11-2.el8_7.x86_64.rpm d7744abc8e0a9411d5f0356a5d727b4d04e7644d7e37e524e03c92d676eabf7e RLSA-2023:0192 Moderate: java-17-openjdk security and bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010) rocky-linux-8-x86-64-appstream-rpms java-17-openjdk-17.0.6.0.10-3.el8_7.x86_64.rpm e9e7771e03089060558746cbba588207ae8eb9cc34e47e325025055dc20fc931 java-17-openjdk-demo-17.0.6.0.10-3.el8_7.x86_64.rpm 56ecebee6f99d42d0e8387ea87d0d09981712b6709aed998190cc8bc3b9d3c86 java-17-openjdk-devel-17.0.6.0.10-3.el8_7.x86_64.rpm 04cf59b2a2441495ca5d0f4076bb9cc7b5891649361009470aa723efcd58174d java-17-openjdk-headless-17.0.6.0.10-3.el8_7.x86_64.rpm 74bb8ea1814f2a4229c0720451f2f21cf0c82e14ad5edae44b223dc42ee63b0b java-17-openjdk-javadoc-17.0.6.0.10-3.el8_7.x86_64.rpm 6c6b0e7c4e618fb98c586eee72ef86342a6570e01776db4fcea08267afad09a2 java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el8_7.x86_64.rpm 1d269804aa7f62145a3591d94dfc51416a3776e123868e1e0cf26671965f99af java-17-openjdk-jmods-17.0.6.0.10-3.el8_7.x86_64.rpm 116c46fa6b3ab8119f821a2051d1d261baec9e2f69fc04d5b6706f8ad5a6ee2b java-17-openjdk-src-17.0.6.0.10-3.el8_7.x86_64.rpm 66123b657e97f8e17488451422f7665b99684c4c7fac04d453b90f99d36e485a java-17-openjdk-static-libs-17.0.6.0.10-3.el8_7.x86_64.rpm a50a6f999802c4e741f2b8a2e0387de74a5dc76f1fcfe70abced24fe988b7cee RLSA-2023:0200 Moderate: java-11-openjdk security and bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797) rocky-linux-8-x86-64-appstream-rpms java-11-openjdk-11.0.18.0.10-2.el8_7.x86_64.rpm 18caaa5e464fc13acdb83da92d7c3b53e8db27105452dd287ca7e09e19fe73ac java-11-openjdk-demo-11.0.18.0.10-2.el8_7.x86_64.rpm 707064838c229e1146437aa01c8c3ccfed3f8d69b0d25a27f268cab3c08e4c3e java-11-openjdk-devel-11.0.18.0.10-2.el8_7.x86_64.rpm fda01db703e1d2bd2ed4aea3246fffde8fe63cda80f7721463e2f408cebd765c java-11-openjdk-headless-11.0.18.0.10-2.el8_7.x86_64.rpm 54403a144e1cab8e5928f3737dcf8a0a4bd030b13e533c6e40c1a34cb355b1fe java-11-openjdk-javadoc-11.0.18.0.10-2.el8_7.x86_64.rpm 0e874d5fb7bd8dab939a6d1aaecb4fd1b19be7bd04db32a0dbdef2f891f3ffb5 java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el8_7.x86_64.rpm 73c7ec6923bedeb6894a69ed0d6c0b2aeab5491140cee92596c1101f1a88e661 java-11-openjdk-jmods-11.0.18.0.10-2.el8_7.x86_64.rpm be5f0e58cf493c61ce58e2bb1bfa51e602d9eb28dd93a40bc1e8e448a5ce9dc1 java-11-openjdk-src-11.0.18.0.10-2.el8_7.x86_64.rpm 7ba5c173af6b4e35d477dc83f7807c4edd9bf0e7955ba4c08add6361c69ebd36 java-11-openjdk-static-libs-11.0.18.0.10-2.el8_7.x86_64.rpm a649cac5b71ff161fc487f3d548fa87d8b4d4fdc52f6408f04c222b9214dde86 RLSA-2023:0288 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms firefox-102.7.0-1.el8_7.x86_64.rpm 12dca0ca292da0d77916e0a6f49faa74bf5100d6cbc63ea1d71d0a6c8d00e4d0 RLSA-2023:0379 Important: libXpm security update X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) * libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617) * libXpm: Infinite loop on unclosed comments (CVE-2022-46285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libXpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) * libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617) * libXpm: Infinite loop on unclosed comments (CVE-2022-46285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms libXpm-3.5.12-9.el8_7.x86_64.rpm ab919e52846cb18cae305efedecf9d19fc6b679f6ccf024467ca77f763bd289c libXpm-devel-3.5.12-9.el8_7.x86_64.rpm f8bb3f4c75ef5a7e0d73e6d9774990eef9da575028c0e36cdcad25389c127c96 RLSA-2023:0446 Moderate: go-toolset:rhel8 security and bug fix update Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144545) * crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for delve, golang, go-toolset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144545) * crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313) rocky-linux-8-x86-64-appstream-rpms__go-toolset delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm be45db0ede57b9a9918c621811a3aaffb944f36ae3770ac645652983d9c3e4a7 golang-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm 8603fffe30255d5b874e1ace361b73ff274824c1be47c5464935479de82601eb golang-bin-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm cfb35da59fa55edb3068ce3421338462b997fb411f465feeb7911c2bab26eb24 golang-race-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm 2368396421ed2c5be2dd5c94f8ab071b2422e9602e160ed5c0982611f5938b05 go-toolset-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm 6e6d2cb6025b922df55b69d54f8b40a5881b26e5c467f75f896e3bf93165e6d7 RLSA-2023:0463 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms thunderbird-102.7.1-1.el8_7.x86_64.rpm fe994e04fe4e95089fae7ddca1706ebccc59912375901c75c119d626178200ca RLBA-2020:4718 aide bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for aide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms aide-0.16-14.el8_5.1.x86_64.rpm cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa RLBA-2021:1808 clevis bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for clevis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms clevis-15-11.el8.x86_64.rpm 7b1661586fc311cdbc1e9f476968c2dde04253a852c5f527d9d2435114d1eb11 clevis-dracut-15-11.el8.x86_64.rpm 0fb789c732ce81f56014c82ff1a145d917fdff04ff72eedb6cf78d365318a96a clevis-luks-15-11.el8.x86_64.rpm afda820f581b0fdfffd83e4c84c834ec3413291db1061d07b3d0f197bea52eda clevis-systemd-15-11.el8.x86_64.rpm ac473976855ebcdb18d17dd0fd52173ba7991cba4e2dcf2878ff04deed4c6a76 clevis-udisks2-15-11.el8.x86_64.rpm 85e206ef9a26491b946ac8aac5497e1c37f2e370ce1311ea4b609f1219a4c519 RLBA-2021:1934 mod_auth_mellon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_mellon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpm 4e2af6902d8948be02387c6a9ce5db3423f38ce4f60913a06e463b6ce72e7b87 mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpm 7b1ffed1c79ced0755d2f174d7e67f5d933ad0cc601c2c11f0010cadb54fdc3a RLBA-2021:4247 abrt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms abrt-addon-ccpp-2.10.9-21.el8.rocky.0.x86_64.rpm 5ee629b2dfe6da1292ba48a1ddcadb9a5fdfb979fdd83099bc50cad4641d1cc7 abrt-2.10.9-21.el8.rocky.0.x86_64.rpm 4ca848af1c32062ac9b90bae1cd4a1c01d6a865d1dd63826b88c30a3adf6998e abrt-addon-coredump-helper-2.10.9-21.el8.rocky.0.x86_64.rpm 112aaf826cb796f829d006f3eaefcd3233ee4ce96668fa543ba7c8b3f0dbe07a abrt-addon-kerneloops-2.10.9-21.el8.rocky.0.x86_64.rpm 94a71406aead2da319c9552db798d8a7806fc8f5cc3164b69ca2718d894dfb6a abrt-addon-pstoreoops-2.10.9-21.el8.rocky.0.x86_64.rpm 2f6a3f38e08fceca19cff8c252cf4b141e3be530480a2521f90ec2d2578fa2c2 abrt-addon-vmcore-2.10.9-21.el8.rocky.0.x86_64.rpm 366cb174ca0120fbd00f243b5bd83dd9052096d51db307805079e8cb3a90d110 abrt-addon-xorg-2.10.9-21.el8.rocky.0.x86_64.rpm b3dc7d6e6e4a33c4973231ff25e888cb32371846962411641d3460b438f7ec69 abrt-cli-2.10.9-21.el8.rocky.0.x86_64.rpm 334b657d7240155d9864880cf4cef67b74efd775d4227f276e67bad5dec4fd1c abrt-cli-ng-2.10.9-21.el8.rocky.0.x86_64.rpm 4d168d7ebe5a74cbd850cc605756c2d86e5aa82a2af8aabec1d3a2e339d78e79 abrt-console-notification-2.10.9-21.el8.rocky.0.x86_64.rpm fcb189060ef963e226a2b8923b9fe76394e4991d0e254becefe1f389a707ba56 abrt-dbus-2.10.9-21.el8.rocky.0.x86_64.rpm e7d2887ba2fd8cdc93e57060c72fd46a288d9716236da90ab8713d9029b71a3d abrt-desktop-2.10.9-21.el8.rocky.0.x86_64.rpm c78976d5bf0c77e0b77154aad0ac4090d567bc9cef6100cbadf993a36920c2b2 abrt-gui-2.10.9-21.el8.rocky.0.x86_64.rpm 2c4ae5e3e0f6adcc902dae5eb2446d2cec7acbb0fb9678f7b8e8da3cd234d586 abrt-gui-libs-2.10.9-21.el8.rocky.0.x86_64.rpm a6d1295d2465947ced80cb78e665d6776c5c0286d03a2587267fa8e94ca986c2 abrt-libs-2.10.9-21.el8.rocky.0.x86_64.rpm 27e4e0818f02c70f3e48301bf8207987a4ed22b6677152a9a81a392adcb43668 abrt-plugin-machine-id-2.10.9-21.el8.rocky.0.x86_64.rpm 791ab7a14fa6a55bd2a4399b1825a67fdf918128e55e375c67994ed5d34e26f4 abrt-plugin-sosreport-2.10.9-21.el8.rocky.0.x86_64.rpm 7a63914d9526e7d6100c91fa14aef1064ca9ea59725be17d18d94fcbf9b1a607 abrt-tui-2.10.9-21.el8.rocky.0.x86_64.rpm dbc9d102f654163ec08b5d34381c36b2b9b12c9edb72615d472bdef0d638865c python3-abrt-2.10.9-21.el8.rocky.0.x86_64.rpm f8ffcab298928db5b191a820fb31b01a3843521f4372ff711fcbbe9fe51ade67 python3-abrt-addon-2.10.9-21.el8.rocky.0.x86_64.rpm 2626a7d26f1a525796bc5a4a2a26634a579357a36c1d69f8df797153454dc8cf python3-abrt-container-addon-2.10.9-21.el8.rocky.0.x86_64.rpm e1d2344320275136cb943025c4df9bcbd51f5feb97bdce9015ce06fb38849021 RLSA-2022:7070 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.4.0 ESR. Security Fix(es): * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.4.0 ESR. Security Fix(es): * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms firefox-102.4.0-1.el8_6.0.1.x86_64.rpm aa4a64a6c0ff90a5258aa86aeeac315fdcb81a784e8308fc90dd393415542e94 RLSA-2022:7190 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Security Fix(es): * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Security Fix(es): * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-appstream-rpms thunderbird-102.4.0-1.el8_6.0.1.x86_64.rpm d93cc63434e71cb0382a5d749f1d03ebb223967aac8e90377764b005d8b0b483 RLSA-2023:0208 Moderate: java-1.8.0-openjdk security and bug fix update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595) rocky-linux-8-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.362.b09-2.el8_7.x86_64.rpm f3f3e5d43c714c292338655d64120f56e0458bd17d277521d2e63a069d2649e2 java-1.8.0-openjdk-accessibility-1.8.0.362.b09-2.el8_7.x86_64.rpm d9963e64a08609dd914326a9f0fc3feb67b7f54635a609ba8212afac72ad52f7 java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el8_7.x86_64.rpm 3a6f8d6c9bb0e787948318bbcdac0c69249056b296abce7237c977bbf1befe2d java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el8_7.x86_64.rpm b2ac3e7305bc865c7225ee004394e2ddc8fdacf8b804ca0f5ff14d4b0ba074a0 java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el8_7.x86_64.rpm 4033ab8d78a462dd4edcba2a5908b47dee03b2a8b112eaa6f1f46d55c333cae5 java-1.8.0-openjdk-src-1.8.0.362.b09-2.el8_7.x86_64.rpm 58b5c066c073e979b3277b0f56a0925d40762970e99bfab0d4f51de97d4e09f5 RLBA-2019:1957 python3 bug fix update Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) rocky-linux-8-x86-64-appstream-rpms platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpm e061be87d99f859fe7cac6853a43d7957ecc17ea0ded870b5850a4f24224df14 platform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm 588192663a8a3e778eadad56f14130aef027f3871a811e207c8c7a8771ac9649 python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm c70ef43afe7f308fb8412fe1fe36a7c555cc62e2ae5a26ff9afa96618997353d python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpm d5c856183b44e0e8769cc862ad7cc38d3d220ae3238d6bb3213baa7c6c0618db RLBA-2022:0315 glusterfs bug fix update Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges. Bug fix(es): * Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593) Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glusterfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges. Bug fix(es): * Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593) Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages. rocky-linux-8-x86-64-appstream-rpms glusterfs-api-6.0-61.3.el8.x86_64.rpm 4245c2155884aaea53a2fc2f47de6963d11dc63c14e860a4fedd4c8711ccfcc5 glusterfs-cli-6.0-61.3.el8.x86_64.rpm 74338514784fd16f87af53856fe909b14bf953837b22c2077051132190540f6e RLBA-2022:7739 sssd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms sssd-idp-2.7.3-4.el8_7.1.x86_64.rpm 3c6c95405c3b4e996b6bf4f2cc6485b989ea323907be522fad24fe0c3956679c RLBA-2022:7832 python3 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) rocky-linux-8-x86-64-appstream-rpms platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpm e061be87d99f859fe7cac6853a43d7957ecc17ea0ded870b5850a4f24224df14 platform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm 588192663a8a3e778eadad56f14130aef027f3871a811e207c8c7a8771ac9649 python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm c70ef43afe7f308fb8412fe1fe36a7c555cc62e2ae5a26ff9afa96618997353d python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpm d5c856183b44e0e8769cc862ad7cc38d3d220ae3238d6bb3213baa7c6c0618db RLBA-2019:3504 bacula bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bacula. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms bacula-client-9.0.6-6.el8.1.x86_64.rpm c346095d229f1528a36c8a82ceb7da20dba9df90e898cfeed6675b8f84030554 bacula-common-9.0.6-6.el8.1.x86_64.rpm d74736d715f0460f6e99bbb53a8b294d73322d79b44f72aff61cf67b6fd9368f bacula-console-9.0.6-6.el8.1.x86_64.rpm 328188f833994e665854f6e9dac0318f0d5b3b173cf61e99c9e90db263d83f1f bacula-director-9.0.6-6.el8.1.x86_64.rpm 223f0598bccfe7f7f701accdfb7ab1319b8dd5e2cb0fba0f3af8c019116e29d5 bacula-libs-9.0.6-6.el8.1.x86_64.rpm c807cfdfb40d327febd118a75b5b28cbecbca8a646b5a374043b48c0f29d51d4 bacula-libs-sql-9.0.6-6.el8.1.x86_64.rpm c72d1f9187711a8d0a2db2d266bfcb3becd60a04f626f95604e68ed4bd9fef60 bacula-storage-9.0.6-6.el8.1.x86_64.rpm 086250c48ad4da8f952c482078834afc9e206ed6a51d07011e34cca7c7994f72 RLBA-2020:1362 .NET Core 2.1 and 3.0 bugfix update This is a bugfix that fixes some issues in .NET Core 2.1 and .NET Core 3.0. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet3.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This is a bugfix that fixes some issues in .NET Core 2.1 and .NET Core 3.0. rocky-linux-8-x86-64-appstream-rpms aspnetcore-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm 03b09603d78a15dc7eba4508d4f9834f441d2a3b832b9f005870a5142c1da8dc aspnetcore-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm 80d6ad709313d91d603c9381cf205260c7bcd17bf47ee5bde3dc1576e762d8ff dotnet-apphost-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm 80b4decbb49a7acf692aa1a600e111e3f4ef7bc71cbe210da7e5ca674b84e559 dotnet-hostfxr-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm e7fe9237eddaf12854c060c75672919cbb6e254d1db07b90aba09261a939ee71 dotnet-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm 24ae1890686f4b846d5a6de6bcf5901f72e998785e38b444c716b76be73fbfac dotnet-sdk-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm 1e1712cf06699de75847284e234a4fc543a981e1d29adc4126d70c1d18be53c8 dotnet-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm cfd5643b251f02203de9ae5c584d349f43645b586ae8d4438b6507ac21c1e8b2 dotnet-templates-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm 98baacba1ce69bc37424dc56bacf75b27d3dbdeff537c94f5912c02fe6724ea6 RLEA-2020:4672 autogen bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autogen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms autogen-libopts-5.18.12-8.el8.1.x86_64.rpm e75151160d3fc3958dce91ffb51953b00e93a8cb3cb5a43b7f93bf59fad00ca0 RLBA-2020:4734 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms libblockdev-2.24-11.el8.x86_64.rpm 5da174eafaf69af62408a4815a01f3dc246ef681fcc8e7014b0fce0403a674cd libblockdev-crypto-2.24-11.el8.x86_64.rpm 2d4d820490c96a4d9c5c75b7cb3ae1520b579e609356fa336cd7fe4800f9f23d libblockdev-dm-2.24-11.el8.x86_64.rpm ddb1077966da4cd352a7e5054ecbd6393c5294c45a10185f794f19e1f5213924 libblockdev-fs-2.24-11.el8.x86_64.rpm 1ad19562185e8206dc5175b37b20453977bbeeaf4e69c90f0c2701f6a3297be8 libblockdev-kbd-2.24-11.el8.x86_64.rpm cb09b43aa55feab2e48ba005abfedfb8e8bb0170aaa731daeeecea050036b1d6 libblockdev-loop-2.24-11.el8.x86_64.rpm f99218c09d4e71cb3da31faf10c85a3e4e324fa30a2a499104bb554ee7ae9394 libblockdev-lvm-2.24-11.el8.x86_64.rpm 5987c9cd3365981b4e3f0c03f572adbedc4e6e2a27909cbc164c3f2f1b518235 libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm 95c137f79bd41a9f791c48be71008650e3aa7354ab5ac0d6cd54b5bc961cf294 libblockdev-mdraid-2.24-11.el8.x86_64.rpm 40841584b5e8ba50c0316fa6a41a6bb20e470fe8486cc8868bfd1fbf47b55186 libblockdev-mpath-2.24-11.el8.x86_64.rpm 6c11510d841ff0405a0630e37d1ed79d9f741fe85a18a6dc366a4daf7c6165e7 libblockdev-nvdimm-2.24-11.el8.x86_64.rpm 8f5f06d54c67ec053c3268a228e95c91c46741a9976adb23df6f7627ea27989b libblockdev-part-2.24-11.el8.x86_64.rpm 979ebb94b393928e80524a055ced8c32914e3bb69fdbeb7548d61e86048b49d6 libblockdev-plugins-all-2.24-11.el8.x86_64.rpm fd8cdb42a8c71a3313807d62340daaaa650588184e86a039197d94a44b31d7e8 libblockdev-swap-2.24-11.el8.x86_64.rpm 1a319f5063476b8af2207e8d0d8b8564ad66412886b4cf3c337e069c443b5c23 libblockdev-utils-2.24-11.el8.x86_64.rpm c954d6b891f0140d997e1f3106e9cc023ee920288c017910fed598501e321ee1 libblockdev-vdo-2.24-11.el8.x86_64.rpm 3397635712651d00661b4f91563eb6aaaec753824b97fb4e8de64e6a17d9de49 python3-blockdev-2.24-11.el8.x86_64.rpm 00fcf1707621b8ff4a0de879d5e401b5b738a05783621ec8e85c4bfef705300f RLBA-2021:1864 initial-setup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for initial-setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms initial-setup-0.3.81.7-1.el8.rocky.x86_64.rpm b0679fe50c82447897f0c44b29a54a9a9687350456cd7ee3cc275ad7190c2efc initial-setup-gui-0.3.81.7-1.el8.rocky.x86_64.rpm 93a078d2f9570a23ba553f45d203254502708391e176eab4ebefb876761e70b1 RLBA-2021:3240 .NET Core 2.1 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * BUG_TITLE (BZ#XYZ) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * BUG_TITLE (BZ#XYZ) rocky-linux-8-x86-64-appstream-rpms dotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm a4d8e71402fc6bd36ccae8ba4395eb873b0f3c784db09d3084e6ca440cda925d dotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm cbfff6de30501753f7e3e22633e6bb2b79f127fe1aa3852be5f49569a0197f4c dotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm b01ae5a57232950f63cd3847d35e22abbbb6ed9546f798908e4f2c4f5e491649 dotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm c366fad3118e4a8e74178c05148f40faaf4f058e720a4bf78926f6713b259deb RLBA-2022:7462 anaconda bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for anaconda. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms anaconda-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm 14306fbc0585ea126092684577dd78c997a03dda55f075c5e860447729b820ad anaconda-core-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm a72b8c6d78e2df066d85d66436287bbe54e8681c738df026216680fcef5620a3 anaconda-dracut-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm decf0a6c4cf9205f0d5b7cf816b59d941dbf6989e5918b3fc267de57407d8869 anaconda-gui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm b489cf953ec8e843d54407de768f8a265835e8ece54f30de57de15722dfee29f anaconda-install-env-deps-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm 62f966ca820588e7047171e4cce1ac7bd5b15f0da633f9fd83afc77b9fe82ff5 anaconda-tui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm bebe596166ed2e9ce70c6108d011b8fab5e168af9a5b1e61c0ba387755736b14 anaconda-widgets-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm ef49cafda3feb4032b7c9d025ebc15ada7809a5c0e0394b0094ecfcf039a4dfd RLBA-2022:7573 pacemaker bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pacemaker. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms pacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpm 3140cfc42a7891db48ccd246e8e9cbbbf6bd63470ca182d69d41b638bf54d33c pacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm 98c2f138e3b705ee8a47cb1649347a579fedee8fe73edff425f2e45b9d22e96e RLBA-2022:7635 openscap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openscap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-appstream-rpms openscap-1.3.6-4.el8.rocky.0.2.x86_64.rpm a9c8fcf39e5a3c78777fd13e99ab9e9068ef7bc27f2e6a31d44a653e8a82af4e openscap-devel-1.3.6-4.el8.rocky.0.2.x86_64.rpm 797332aa46d047b77da8e2aeed59d299e90093423d0b5cc36537180d4c0bc7ec openscap-engine-sce-1.3.6-4.el8.rocky.0.2.x86_64.rpm 096db4413ec320ccc6b4b90a8e61a5e060e6bd03fb54a67eb454f348812a6dc0 openscap-python3-1.3.6-4.el8.rocky.0.2.x86_64.rpm 2029d8040215779088eda229a66dd9d8c62f21a263e1c2347a228f4f41dc0312 openscap-scanner-1.3.6-4.el8.rocky.0.2.x86_64.rpm b7434cd2d2fa7a294c62d1ffe0573d2c156d108cdab0f98d30c02253cceef8cd openscap-utils-1.3.6-4.el8.rocky.0.2.x86_64.rpm 2fb8149ec7f11aec5578c45ba7e146d7e149bc57faa6822371a661cd0acb6bb6 RLBA-2022:7831 osbuild-composer bug fix and enhancement update The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients. Bug Fix(es) and Enhancement(s): * osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osbuild-composer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients. Bug Fix(es) and Enhancement(s): * osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532) rocky-linux-8-x86-64-appstream-rpms osbuild-composer-62-3.el8_7.rocky.0.1.x86_64.rpm 8262e7655a6fcb6b2d662e008a04b7dd6cd220d068a5b5cc6bf988c18aab8ae1 osbuild-composer-core-62-3.el8_7.rocky.0.1.x86_64.rpm 94dc3d530421be596cf771a39fae7c08cb7e0b07ef95c95904f6ced4fc08ecb6 osbuild-composer-dnf-json-62-3.el8_7.rocky.0.1.x86_64.rpm e2bb916e89a9eb86f7d8bcdf96038cf6085cf44f3040692cecb55cf4a96131df osbuild-composer-worker-62-3.el8_7.rocky.0.1.x86_64.rpm 77c71158f924058584b2df864b8224a5e5f39b0d1a0361a9f87bac257a257184