RLBA-2019:3337
perl:5.24 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl
perl-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
e83074c6d1b50c55bc3c15d5da135053bee0f6f3ff53fa0a2d6f1f8fb787a7eb
perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm
69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6
perl-Compress-Raw-Bzip2-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
285386224d4aa4525a133a6a6c4b479a06db450c6a76e2a8f5ed0009abd37dc6
perl-Compress-Raw-Zlib-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
fed8bc594c15c41171ff9ff943c9dde016664afd8b97b19241cb6ce9665fbde6
perl-core-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
d20f7d7462ee2663c847590332337ce4103f31c021c59e4911fc750389ee62e0
perl-Data-Dumper-2.161-5.module+el8.6.0+882+2fa1e48f.x86_64.rpm
ff07ac2ea84d231b230395335bf20e610d754b1a4c0c3dacaedd8bb86d91d36c
perl-DB_File-1.842-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
8bc4d236b809bc1ef3d87c8219c6bf5fd62320104fa54e0298cfc2af9a8b9e85
perl-devel-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
f0b3d906c537e8ada3ce00380d0db5fd2df04fafa02a969d7659f3196b5df7b2
perl-Devel-Peek-1.23-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
bd584a99e03a5acc7bc60c935bc43a8943d2debdb23c63d1c2058e3cb704fc52
perl-Devel-PPPort-3.36-6.module+el8.6.0+882+2fa1e48f.x86_64.rpm
d7269e7ae9af14bd81f9c6e981dcd4b81a07759111ce4705e62cdddf1f80210a
perl-Devel-Size-0.81-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm
7f0c0405c0c9a1a9076ea4cead8daedb86a8b06d940f39f0cb48ee943c2de1b7
perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm
457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91
perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm
4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3
perl-Encode-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm
10ff1f22fe59a1c62d0215cebe4436d920b31d0135be7ee841d8b977c607f125
perl-Encode-devel-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm
f61f2d035346d60eb831ea5660545fb9051fb1959b1160602adeab91772510ff
perl-encoding-2.19-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm
229ce0ac9b24ddc49cbdcb788fbc64849c999ed1d744b49a405c76499f5a4acb
perl-Errno-1.25-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
da0174efbb99d46acb9cc7ecabe0c10c1a5a875af8040c820755de40eed4dcca
perl-Filter-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm
da4649b1e9d6198f6cf271a2a12b413213360f8c23195b56cf04c1c46605b767
perl-interpreter-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
aadf024cd62728f0b5d6cf682f154052bb5061e2104ef310edbfe694fad7b9a0
perl-IO-1.36-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
e50d1ac803c655e12334a2819eb42033fdfb4cee41dc7a59c973347a423f6711
perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm
d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524
perl-libs-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
53051c9ca3d71fb202526a756dc8d9f240a0cf5b5477be5e3a8102d1ee19bd03
perl-macros-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
22489b71c4137851c982c6f9c1217fda53481c70eb8636a1f9a0f45382140372
perl-Math-BigInt-FastCalc-0.500.600-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm
77bfeccfb00e64cdf5142dd9006801f920e846f3b2e568afac2f3c36712bfbab
perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm
ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3
perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm
658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f
perl-PathTools-3.63-368.module+el8.6.0+882+2fa1e48f.x86_64.rpm
2693dc95ae0325e1a3d4a3060f240cd5c33d5b034375fbb20fdd8e5e96e9bfba
perl-Scalar-List-Utils-1.48-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
fc1755cf3306991660dc714ed4428f42d5055e65ff409ebdb9ed01e0451f83c7
perl-Socket-2.027-4.module+el8.6.0+882+2fa1e48f.x86_64.rpm
4957d55fb4afbc9b8bfd53e52932fcbc61472182ba93e76e000be9141cdf261d
perl-Storable-2.56-369.module+el8.6.0+882+2fa1e48f.x86_64.rpm
b40848f3bfc8f7f78cc797f0d2b9387f6686e1e4bdd543774bc1039d32221718
perl-Sys-Syslog-0.35-398.module+el8.6.0+882+2fa1e48f.x86_64.rpm
aeb828691fd72e80c959c29712d6989e47e7a4ee532113ef5d8af2a4d668493e
perl-tests-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
f728f0cd0b1d5e021a6e8d7e6a27c49f2d8a2c900ed7ef44e4afa1537dd4bafd
perl-threads-2.21-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm
1e401a335988d10338dd37fc210ca1d6f9b38bca6aa896eafb69c2f8603ae9b1
perl-threads-shared-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm
a3c6831646ca262f9aedaa0ef74d51f7f4ade5e3d62e235582b1cddda68f75bb
perl-Time-HiRes-1.9753-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
d24075c8ff8a0eaf7d28f5a430bfc91d96b7f1875d7ff046bf93a3d263ef775e
perl-Time-Piece-1.31-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm
587332904508887dd5a957a4e1fca0c7b4e52dc8b2218c0a9dc393932442eaf7
perl-Unicode-Collate-1.20-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
6bb30ea26f566eba828e5f687184ce837c8022ed48283249cb18f0ca335c981c
perl-Unicode-Normalize-1.25-1001.module+el8.6.0+882+2fa1e48f.x86_64.rpm
1de5e218c8b65c6fc046e64f0d8bb05a338d949f95ac08a80b186db0e8dd98ad
perl-version-0.99.24-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm
0c78542fc30ceb5037a15225340896dfd25299c82a912dcfc025d9fa1638202b
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
RLBA-2019:3522
perl-DBD-SQLite bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-SQLite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
RLSA-2019:3553
Low: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gdk-pixbuf2-devel-2.36.12-5.el8.x86_64.rpm
b8c8dddf847d45a247134741a359ee1bacb5f9ba572049535b170e93aaa535f0
gdk-pixbuf2-modules-2.36.12-5.el8.x86_64.rpm
4214f8cd9b483725dc3fe2413aa4b3d09eb9af33258c25da75aa099c7f2d2b90
gnome-desktop3-3.32.2-1.el8.x86_64.rpm
ff7c272d2f8933f9583907ae692b65a3913d5beca8984b42c653d0b4b7200dcb
gnome-desktop3-devel-3.32.2-1.el8.x86_64.rpm
aedc70d3417a92959036b96aa11ef6789b39e7fd39254469cce07643fb66fcb5
libpurple-2.13.0-5.el8.x86_64.rpm
adf778e01f5416a5dd127aca8da244dde19f30bca81ab690f5e0d4b6e6bbb558
pidgin-2.13.0-5.el8.x86_64.rpm
3884e426334ed867c8a62430e84cb727129b779cac36a5a160cef24189c0d7d9
RLBA-2019:3621
libidn2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libidn2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
idn2-2.2.0-1.el8.x86_64.rpm
1033e6e8663d25b8a67fe1bc623022b9dbe46c3677bdd57ff7479dcb702a478f
libidn2-devel-2.2.0-1.el8.x86_64.rpm
ea3c362189034cf785e27fe49c99adfad0d9ab6ce3b64cca0d1f83ecdf4182a1
RLBA-2019:3634
blktrace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for blktrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
iowatcher-1.2.0-10.el8.x86_64.rpm
0e31b9e5b1600fe8941c67d4afda394165313bf883ee0768e631d4b6bce031d1
RLBA-2019:3667
mtr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mtr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mtr-gtk-0.92-3.el8.x86_64.rpm
faca355f3c563059601dd8095f35d64f15265083e44d83f1fd6422a5113e5f52
RLBA-2020:1759
newt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for newt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
newt-devel-0.52.20-11.el8.x86_64.rpm
d5f84c2c76587117c782bcc6b998816c981f9d7102facebab9febcea01982c89
python3-newt-0.52.20-11.el8.x86_64.rpm
ae6af49eb197e57b1fef79a1ebf0057691e4c62c80abd173dc4392ce787b23ae
RLSA-2020:1766
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
baobab-3.28.0-4.el8.x86_64.rpm
56f8a2293c11e3f19dc2cb0d4ca2dec49a6ef365db7e2962024faedbb6bc3a59
clutter-1.26.2-8.el8.x86_64.rpm
0a20b879448dc466b4b6969e4ea17f96e4260f34f75586dfb3bb4ef311f1eb04
gnome-menus-3.13.3-11.el8.x86_64.rpm
06cbc8d95bf63fee450c6c8368cb9fd644756a71a24abfadeedc40a59a32da94
RLSA-2020:4451
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dleyna-renderer-0.6.0-3.el8.x86_64.rpm
2f9749efc99a8d58051088a6503a0cc20f300275bfd73733af25a7108587b0a8
frei0r-plugins-1.6.1-7.el8.x86_64.rpm
ecd0c1309283d96d8cbfd04092ae07b3fc18f873e531deabad44ecc116dbe33d
frei0r-plugins-opencv-1.6.1-7.el8.x86_64.rpm
4af320468f53f2f48fd47dfb7759901d8bcd03d00c3c231cdb7e7f11f0e082a4
gnome-remote-desktop-0.1.8-3.el8.x86_64.rpm
6895a3d7cc1c05ec83c19af4e9de9542861f0aabf4c81e5c4bb4943c57ea89a7
libsoup-devel-2.62.3-2.el8.x86_64.rpm
be82aed5a0a8ab97cca222b4749954ac549602e571e98fbb2615e98ce6aae810
pipewire0.2-devel-0.2.7-6.el8.x86_64.rpm
c78cbf37db63fc70418f2625e614ed86a97722d745f773fc359538437039e65b
pipewire0.2-libs-0.2.7-6.el8.x86_64.rpm
a4e2934410c2f4b95acbd95e11e13b62886604d616a4df3b7f394ed3105fdffa
pipewire-0.3.6-1.el8.x86_64.rpm
693e54ebbca5683ff27b042d8c41a428e0d7b33fa0790ab1b0a574cb58bf4cc0
pipewire-devel-0.3.6-1.el8.x86_64.rpm
419cd82f2ec598818f9d4671fed3aaae7c7d70c77fa732cb07532f94309f328a
pipewire-doc-0.3.6-1.el8.x86_64.rpm
5fdf2f45560524bf4131d5e97307ae3dc3a57aeed287d9de4789d21e1d6958cb
pipewire-libs-0.3.6-1.el8.x86_64.rpm
f528472a4a2050271a728b61135788b4aa9abe64bf36fbe4eabbb6e40ce1e687
pipewire-utils-0.3.6-1.el8.x86_64.rpm
3fa26eff88f75628c7a3418e414bc1d6a17a268a07087b1f3a0569a8fe1d4583
potrace-1.15-3.el8.x86_64.rpm
4d635d9ca868a260a7ca30e12118d032ae73ea7cf08876d96119fd7731d2be33
python3-gobject-3.28.3-2.el8.x86_64.rpm
dadec73f4be5ca582edcf9d723fd75b27e725b5602f764879a675dbf675716dd
tracker-2.1.5-2.el8.x86_64.rpm
6b3aee540738b212cb7f1b9f4115a3a387d3f79626c6b3b2698d20d13bc83d9a
vte291-0.52.4-2.el8.x86_64.rpm
a25068629ad725d7630d121f24036dc4804b215ae3014e4f224b81e5efd8d2ee
vte-profile-0.52.4-2.el8.x86_64.rpm
b2c7f7eb37729c285c8c7c5902b408241b8cf8b25799e28f2849bb9797234cb5
PackageKit-1.1.12-6.el8.0.2.x86_64.rpm
443bb3ffdb7c33e79a5b8e187cb8a84e60bbac288ac1e01fcaca47fc80096c09
PackageKit-command-not-found-1.1.12-6.el8.0.2.x86_64.rpm
198e466a067517d90a9c2cb6aaeaa448879c7188287b015b2942639872238a21
PackageKit-cron-1.1.12-6.el8.0.2.x86_64.rpm
3068fc76ed2e84514a2a0cf4e3b46d4cec51982130b86620574bdceac6bc08e7
PackageKit-glib-1.1.12-6.el8.0.2.x86_64.rpm
802c4bc3ac43e64a4169ba2208ef40301af21de468efd95c01362c82e768f23f
PackageKit-gstreamer-plugin-1.1.12-6.el8.0.2.x86_64.rpm
3625ed7fbde9cb61d319a0eb8fd18761084fcf4e552d2e8deed1ac387146a410
PackageKit-gtk3-module-1.1.12-6.el8.0.2.x86_64.rpm
165aaa0afa3c75cb66d40c66c9eed8dd7a34744eb1908775aaa5a3e96e56f89b
RLBA-2020:4557
zstd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zstd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
zstd-1.4.4-1.el8.x86_64.rpm
3a5bea3f29f92bd1b4865f129ac8807a20201ccfb7d807b8e6e5a7a77174a2ac
RLEA-2020:4727
new module: perl:5.30
This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl
perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm
69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6
perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
ed229dccbc0b92ac2a641e672a1b62281cb7887ad180cf0eb7bf70a72d8190e8
perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
70b3d3861ab9c1695c9bd398d4bd822fed4f52f843ccb34d987b1c72fb6f6190
perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16
perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm
847b4fb0ddf80554f9db4f306d9b404f77ff15198af23e1afe2abf866e91117f
perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
1da6e17c67943d6d69e57ebd15f72bfa43b6015870fdd338c76b117b2be9f67f
perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm
11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f
perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm
457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91
perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm
4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3
perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
7acf6021827fa52dc9a1fcebcb239d23d9096de93e0a6132f0fe4fd541f3f1f2
perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
4189d9a4acaa4add86f0991f50f74e444b59afb872b205e444480c428e247eaf
perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
5e8ac50accc1d9281fedfb67c5f38066ac8d9e1237e1d7cc7fbef1e973fb89fb
perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
c8ba40590e844230d1f154071d9e092cb479fa4993a8352a0d9c7b3ed9764e01
perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm
d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524
perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217
perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm
ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3
perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm
658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f
perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf
perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
19c9476b75c247420525ff36ad321453c46d0262305cad01bfd0eea652a70093
perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpm
b60d7dc5e566fbe0b9282e1f90b628d86d87f6e7c091290737cddea24d9bdc1b
perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpm
b7f894a292d6278b60fb5754d1ed5ad9d199c8f84d140f47dbeb260d6a3eaa35
perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359
perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
2e5b2999050f52a5be6078a7024fa2d8696471958b37582c6ae57f869b22b247
perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
e95a1149d05da0bdfc99db4a561b0ffee93dd2d670951b8bf9e9f0bcd867473c
perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
c32bff30e752a3efa107b8a0d0a6758e720770d895c642fbd8434f86f54ef46e
perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
329b8a55fd6c40d52610e15f55037edc8395d682ed5ceca6611930c6ec0c80fb
perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
641de0fcef19c0f7ab506f797d92584ac6c17d3f1335d5fa6fb0d515c8220612
perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm
96805b92a1012403138db9d46d761fcafc05517684b5ff73a5ccfbf75edb0d59
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
RLEA-2020:4767
perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
RLEA-2020:4802
perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
RLSA-2021:1586
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
atkmm-2.24.2-7.el8.x86_64.rpm
b04306a0fbc6f392a135fa1923e314ee71148dd95394002cb9278d2cf35040be
cairomm-1.12.0-8.el8.x86_64.rpm
f87200fc6c9098a97e7000b991c9d9b55665c936adf071461e857da01b6b74c3
chrome-gnome-shell-10.1-7.el8.x86_64.rpm
d0c4998aaddb8c3b81afc3826beb1b1e046a0767269163fecbe4bb7e209ef64d
dleyna-core-0.6.0-3.el8.x86_64.rpm
8061d05aa41fc9d4379e9882c88fe0d7081d8a18b3bcc3c928614261aa3b3cf7
dleyna-server-0.6.0-3.el8.x86_64.rpm
da0bab305997b9906a2357a21e93c7f5bb7cd0334a55b0a537d60491a150113a
enchant2-2.2.3-3.el8.x86_64.rpm
85cd0e04908d96550e8e132a527695d74d85113baa3ebb07847801a06a646554
geoclue2-2.5.5-2.el8.x86_64.rpm
74c8c4eee50054f5f23588b01d6486d847555ffade12edee2422223b9543b101
geoclue2-demos-2.5.5-2.el8.x86_64.rpm
9ccc5a181d474a2681fc432a1b8dffcf57a3f03485f9f702337da7ad5135e089
geoclue2-libs-2.5.5-2.el8.x86_64.rpm
8e9470a09160870f9d81a3f3a63f4ac445970737779a3c05f08af39fab2f89dc
geocode-glib-3.26.0-3.el8.x86_64.rpm
a2e669a2b25bfed174353e7921009a37f044f5d4db70248414a05d728205f242
geocode-glib-devel-3.26.0-3.el8.x86_64.rpm
1f0f79da8cd8327846386294463ce07a7fecd6fb4aa0b17bf8cb2585d7399dd4
gjs-1.56.2-5.el8.x86_64.rpm
f2a3b03056695cd41cae4b0d078ad602c7b0478af1df7dcfce54b99b01517480
glibmm24-2.56.0-2.el8.x86_64.rpm
75d1f9cc2d4c44096a680f2f2922177cde0cbb3124b337ab13ec48a73aa859f1
gnome-photos-3.28.1-4.el8.x86_64.rpm
7c19b9128c3f6031cc1c96e50aa0f16ebd9e0108f52342e2259c56496875db0f
gnome-photos-tests-3.28.1-4.el8.x86_64.rpm
ca37177d2e0689a5d6652ae7a39f4baba08c61e8f7d77b45cf2f8fedb5581055
gnome-terminal-3.28.3-3.el8.x86_64.rpm
dd27a423551804084221da7392ac0128cfd64447b1147140a83bbe5d8780d2f9
gnome-terminal-nautilus-3.28.3-3.el8.x86_64.rpm
285192366764466557fc62eab78f3de9a4462c2b166572ada7060510de416cf2
gtk2-2.24.32-5.el8.x86_64.rpm
babbb096fbe18354be01a584983de5d2c26d69f318ee964c48850b9dbbb1b1ff
gtk2-devel-2.24.32-5.el8.x86_64.rpm
33f6d0a0e7a5edf62e556cc364580a4e3e01d970f8e9d5f7cc4f3cb02bc8497c
gtk2-devel-docs-2.24.32-5.el8.x86_64.rpm
68284375144a790dad399ac3abd677d59349c854fa20760690e5618807376293
gtk2-immodules-2.24.32-5.el8.x86_64.rpm
df0d38789261a7af178f3b8914ec84cb0abc2c393372d4674320dd7d86431ac6
gtk2-immodule-xim-2.24.32-5.el8.x86_64.rpm
3c5dc65defe122704e59969bc2fbb7b17202f6e637c349669d367ff117b86fe6
gtkmm24-2.24.5-6.el8.x86_64.rpm
362aa1bf60d328749b4765fadd1febf5e43e36edf21e8ea03d90a0b6a38b1182
gtkmm30-3.22.2-3.el8.x86_64.rpm
871356ba2f4cc9a426dd1429a748237a8ab4c0b32ce61d0f1b22fb39500e0e24
libdazzle-3.28.5-2.el8.x86_64.rpm
6da46d51e00482965cf6bba9ac1f4cc1aa89a61ba645d343d273dcdece579971
libepubgen-0.1.0-3.el8.x86_64.rpm
4955abb3033684450018aac873107bb4e9e62a8e2835ce4e5b6cafa75f59dcbd
libsigc++20-2.10.0-6.el8.x86_64.rpm
8f1c1f4b47c7fac19f15cc3815077b0677a1fb2c2cd1e7d5631370cf28ab07bd
libvisual-0.4.0-25.el8.x86_64.rpm
770b1865cb2580cdf75ee48ba979fb912bc4a48fb2fd8af2d69f554d923a2c85
OpenEXR-libs-2.2.0-12.el8.x86_64.rpm
35f0d3fb2d52c671f9a86824a4d524d53a29d16e5437852eb12cfc10bc69f47a
pangomm-2.40.1-6.el8.x86_64.rpm
0fb7b384cfe916c06b91f28b6abe87e16822b150af8a8bd096007a104d698b5c
soundtouch-2.0.0-3.el8.x86_64.rpm
8f2d071970bdb85bcf2fc23f0d9fb7c327ab2f3aca90ea16159ad3a405fe8b8c
woff2-1.0.2-5.el8.x86_64.rpm
c4a5f23fe56dbbd6b222b45b19fa6b1e0728a4d5d2e7c9af366cdd609481be2e
gnome-boxes-3.36.5-8.el8.rocky.0.1.x86_64.rpm
c9b9679109843e21773525b39e990d4d6cee077d89c79cc31d8bb53a10b14af4
RLBA-2021:1591
libxslt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libxslt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxslt-devel-1.1.32-6.el8.x86_64.rpm
b370f997b6f3aad5205c0a37e646e8a5356adaea60e125bc1af7a4a73347e6fc
RLBA-2021:1612
avahi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
avahi-ui-gtk3-0.7-20.el8.x86_64.rpm
ccf168c311e9d313b7b68399b583f1f4ae322744ab63e76c923e6b846d8e19d6
RLBA-2021:1681
vhostmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for vhostmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
vhostmd-1.1-5.el8.x86_64.rpm
003e5c788d60a86ba8f5a61d9f8baeda9f80c03ce584c50c316e7322e2bdd333
RLSA-2021:1702
Moderate: brotli security update
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for brotli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
brotli-devel-1.0.6-3.el8.x86_64.rpm
d512ea0ff25f717bb9e8c779990e2ed42751637be036c574cc56c324b62b8dd2
python3-brotli-1.0.6-3.el8.x86_64.rpm
4ea1dcb3f2f40a6dab1c067a811163f1a07143e54a8e473c40c213c1cb8cf19e
RLBA-2021:3594
libdb bug fix and enhancement update
The libdb packages provide the Berkeley Database, an embedded database
supporting both traditional and client/server applications.
Bug Fix(es) and Enhancement(s):
* [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100%
(BZ#2001972)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libdb packages provide the Berkeley Database, an embedded database
supporting both traditional and client/server applications.
Bug Fix(es) and Enhancement(s):
* [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100%
(BZ#2001972)
rocky-linux-8-x86-64-appstream-rpms
libdb-devel-5.3.28-42.el8_4.x86_64.rpm
4038cac5a947df780f43ad543f735f1c0307a106ae02b1ac518fba0349d5bdc9
RLBA-2021:4353
lm_sensors bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lm_sensors.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lm_sensors-sensord-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
6fe3b62dd82076b44d2d79404bf82e491136151bd16c837331b3eb0df01fa795
RLSA-2021:4381
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-autoar-0.2.3-2.el8.x86_64.rpm
ec104b742f1ee24ed3b790f8bcf2e9c3624d835c37d4f046226737569af9c0b5
gnome-calculator-3.28.2-2.el8.x86_64.rpm
bfc480d1f9e922cdeebbd6056672a2a349776204c6be7a6240a5eea1a623de39
gnome-online-accounts-3.28.2-3.el8.x86_64.rpm
128fe18ab8bfd55fcf3d048764c08baa784e475c43e05bee007663ed65266f64
gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpm
2424a681b21ec3cc257eb8117d833e143b766ced3bb3f0d80fc6580ebe78b52d
gnome-software-3.36.1-10.el8.x86_64.rpm
2a9f077aa8113e2a4c4c3788d5258918fd7aaa4a97a3b5696d604e849fd23c5d
gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm
440c33ca267b2f26215df09174ce6574a2bb5113fe6d7c740eba3f1133c93af8
LibRaw-0.19.5-3.el8.x86_64.rpm
df151c39f20ea9815d46aff810e74f2c837a34fb755909c23d2e159714999d90
vino-3.22.0-11.el8.x86_64.rpm
3ba0c279a775b11f29b6dbeb5daa462d4bbe721a3bc0f541dcaa8b0c25555ec1
gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm
12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94
RLEA-2021:4405
libmodulemd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmodulemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-libmodulemd-2.13.0-1.el8.x86_64.rpm
261911bd0c62a94982ee44638a391b2a47f18434e2b5371ea8c76a5b0ed4bdb2
RLBA-2021:4412
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mvapich2-2.3.6-1.el8.x86_64.rpm
dd351b8868ff7bc80fae9dae488eaa189dc9c7f6eb396d4e79d210376ff9bf6b
mvapich2-devel-2.3.6-1.el8.x86_64.rpm
0c0305bbe23485eb35b434972dac29fbf0eee28f6cf4b726fd6bb9c34c46612e
mvapich2-psm2-2.3.6-1.el8.x86_64.rpm
825a16773f805807387cf6b32d8cac59df358d8d44fd6f312a9c78aae72eb3a7
mvapich2-psm2-devel-2.3.6-1.el8.x86_64.rpm
3526d362751e05cfb2f706200a3b03012ac93d07562a638d34f87fb6468ef04d
qperf-0.4.11-2.el8.x86_64.rpm
8e2a2d8a488101682d7495de161c2083b8fb3f12ef9828c7fb4c12324df5c7cc
RLBA-2021:4442
lshw bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lshw.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lshw-gui-B.02.19.2-6.el8.x86_64.rpm
e8bad6055146ad48980556830eaceb61a86e42c3b36955ccac1f2e4fbd8a287c
RLSA-2021:4451
Moderate: gnutls and nettle security, bug fix, and enhancement update
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)
Security Fix(es):
* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)
* gnutls: Use after free in client key_share extension (CVE-2021-20231)
* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nettle, gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)
Security Fix(es):
* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)
* gnutls: Use after free in client key_share extension (CVE-2021-20231)
* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nettle-devel-3.4.1-7.el8.x86_64.rpm
e139494f5eaa94ff5410adc22013d4c5b3888d875e78089bb1c3a35be09c2933
RLEA-2021:4488
hwloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
hwloc-gui-2.2.0-3.el8.x86_64.rpm
27e4f5230cad7b62e5ce72e640fbae7afd9c48d35b72bc3e0e94084ceca508b0
hwloc-plugins-2.2.0-3.el8.x86_64.rpm
18903b95ff7ea05265d1fcf969c3dfde7a1191f277bdce76ad93925c6ffb9ce1
RLBA-2021:4501
emacs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for emacs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
emacs-26.1-7.el8.x86_64.rpm
78f6e6a1910c95a773be74c70dce446bf600cd63cf289b56547447085b7eaa53
emacs-common-26.1-7.el8.x86_64.rpm
9c89bc8eb9a0cfe9f514a9100c41cd602d12f928497ad6e810b29a84587d7d7a
emacs-lucid-26.1-7.el8.x86_64.rpm
f689279f4d76738af86a78b6e546214a695034ea695edabba93c53d4f9b24592
emacs-nox-26.1-7.el8.x86_64.rpm
a30a83b2f2aea300c30dc0cd3d5fbed857699495fca57cdb57209e84cb8886b7
RLSA-2021:4510
Low: lua security update
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for lua.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lua-5.3.4-12.el8.x86_64.rpm
49a648c94ed0da6494fd0e3b518c5c2e7d08f0f888b7de85f22f6577e4bccecb
RLBA-2021:4516
usermode bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for usermode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
usermode-gtk-1.113-2.el8.x86_64.rpm
050b67bd0709281a9191f8e9be7b6849456c6d0bdcd06951ce44090e2aa686cb
RLSA-2022:0658
Important: cyrus-sasl security update
The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols.
Security Fix(es):
* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for cyrus-sasl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols.
Security Fix(es):
* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
cyrus-sasl-sql-2.1.27-6.el8_5.x86_64.rpm
66fcc6223022b9410b104521f3eddc569f87487b818bd807a28a0feff071b741
RLEA-2022:1954
perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-DBI
perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm
e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
RLEA-2022:1956
perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-DBI
perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm
e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
RLEA-2022:2014
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mpich-3.4.2-1.el8.x86_64.rpm
74148fa6cc16f87b94559df63f245c2a028481b343e0ff625cb7065bc1dc2b80
mpich-devel-3.4.2-1.el8.x86_64.rpm
4bc763f8f86364ff81a5973199876e168cc9dbe0d36cfcc53c68baccd623c492
mpitests-mpich-5.8-1.el8.x86_64.rpm
d0714e70449d9184851da372b81afb64dd1d73b5fd01fc558eb260f3df0ba756
mpitests-mvapich2-5.8-1.el8.x86_64.rpm
bb8e7188cd01962e4e666416accabb8cc8cfde090ade2e3ffbfa4f9c9f885988
mpitests-mvapich2-psm2-5.8-1.el8.x86_64.rpm
7530a1544a8c5c220c7d4241216eed9507f270f46d4b5d5e5f09ce4fb5af6541
mpitests-openmpi-5.8-1.el8.x86_64.rpm
93e0650f54ef76aeb8fd9d533661c9ff699f6ad106c176fe56ff0e4e6d01d043
openmpi-4.1.1-3.el8.x86_64.rpm
e7af704f8d835ca6f51c90949305ecb44501c84337b1370a7829eaf1920e4f0a
openmpi-devel-4.1.1-3.el8.x86_64.rpm
22c66b5c2b99405d401d82a2d9f4bef3510964a36f5db51af4e10bcf3d107a64
pmix-2.2.5-1.el8.x86_64.rpm
52a6205c21965646bed592eb3d3bd2a87e15d3ce4891f4802ded71cb14a277cc
RLBA-2022:2023
net-snmp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
net-snmp-5.8-25.el8.x86_64.rpm
ad38b78a6c4715dab4f8426336d833075bf2ab0bd0ba552047020432da88ac74
net-snmp-agent-libs-5.8-25.el8.x86_64.rpm
bdc3346d124753f657fcbd61969966bc3062a70bb05071378bd56bd30ec6a84f
net-snmp-devel-5.8-25.el8.x86_64.rpm
8913a90a7e732bf28f2abcaf3861708bd4191691278b13e1388b469ffce39b42
net-snmp-perl-5.8-25.el8.x86_64.rpm
91b0132109c0ff1363158041fba5d5f248c91b99b0fe497940bdca04a48be150
net-snmp-utils-5.8-25.el8.x86_64.rpm
371193495c7e5caf863d812317dad5a133f49a919c2a09df9d13a8e963011ce6
RLBA-2022:2027
json-c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for json-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
json-c-devel-0.13.1-3.el8.x86_64.rpm
4486495d3b2d376b0571c35f1830566455e0678698c6dd475e449b99d38f53c8
RLEA-2022:2029
libseccomp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libseccomp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libseccomp-devel-2.5.2-1.el8.x86_64.rpm
6bea64b05e30226d2db6ed7221e8c7c0cef4165cd07a72c0435a00c0e9b8b81d
RLEA-2022:1869
new module: perl:5.32
This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl
perl-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
7cbe324defaaf158029c8bb85417396a131c0562ba68f15912cf6caba39ee383
perl-B-1.80-471.module+el8.6.0+879+823e3012.x86_64.rpm
3fca367721228806c0535072913fc5da50b6146cf6c3fdf23488abf7f48afd23
perl-Compress-Bzip2-2.28-2.module+el8.6.0+879+823e3012.x86_64.rpm
45cb6b8ae71c45500be114d6512fab9cefe7922454e574573c69a6d6df255285
perl-Compress-Raw-Bzip2-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm
26b44886c1ecc20b683eaa0d86e61c0e21007111a78fcadb8e8fa1c0dad9866b
perl-Compress-Raw-Lzma-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm
87107b833c9c8adeceddd6218a9af0cf5da0c4e3ce4b8ae46252548a5fd12aa2
perl-Compress-Raw-Zlib-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm
0a950bf8d5334642a3b3aca7ec0e8068af88efa404c283e6814cf645f06b7011
perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm
11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f
perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16
perl-DB_File-1.855-1.module+el8.6.0+879+823e3012.x86_64.rpm
294048e1443911d2c7fcbbe3957f8a40c992ba094174731a0af80b6fea60067c
perl-devel-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
a0a14581d495ad3aa604f136657b00b5e07e01f9a31430180ae996750851129a
perl-Devel-Peek-1.28-471.module+el8.6.0+879+823e3012.x86_64.rpm
76702e124b8837aedb53a200606bd97531fddd70a479d523652f4b5c4eeca3df
perl-Devel-PPPort-3.62-1.module+el8.6.0+879+823e3012.x86_64.rpm
eed2c853112750b1147a0318e8021dac109449701971f8a2fb0fdfb59a7bbe27
perl-Digest-MD5-2.58-1.module+el8.6.0+879+823e3012.x86_64.rpm
8b3bea86b235d1cdcb0d28912e7201458f04994558c6516adb8b52d141e5bbca
perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm
4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3
perl-DynaLoader-1.47-471.module+el8.6.0+879+823e3012.x86_64.rpm
cffb954b308ff49275e64194b68e33cbb3da9deb92bd27b40a803d63b90d45e8
perl-Encode-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm
77253b724ff748e21fa428d8f4bb5c67bdf52705f7c53b07ce812513e55f91ee
perl-Encode-devel-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm
8a265047be5f34848b19cb882a8fd3ad39c11ee8cd53bca3632633c9b8b5392e
perl-encoding-3.00-461.module+el8.6.0+879+823e3012.x86_64.rpm
f03d602b657d6686a6e5e9881babc4686eb5f902b469c44d86c8583c4371209a
perl-Errno-1.30-471.module+el8.6.0+879+823e3012.x86_64.rpm
76658c7a3779fd65500ab4f9c6f6b203481d8bad79e2f5a10fd288046a53e22b
perl-Fcntl-1.13-471.module+el8.6.0+879+823e3012.x86_64.rpm
b13ed0199de86c0afa7cb56b07fe89968febe4bd713514dcd8f0d1926a0d9b61
perl-File-DosGlob-1.12-471.module+el8.6.0+879+823e3012.x86_64.rpm
e1ff76d84cbc0debbbb36d08abe8ba711e2e162bb46abd049e2768aa08f4905c
perl-Filter-1.60-1.module+el8.6.0+879+823e3012.x86_64.rpm
26ad0484430812ddabc5f1998e2c262481b7116b396d68669c2b8465d11d6c54
perl-GDBM_File-1.18-471.module+el8.6.0+879+823e3012.x86_64.rpm
256a011b9c3d1714752273382e297e474e8b39caf3e9de390f1612eb0006762e
perl-Hash-Util-0.23-471.module+el8.6.0+879+823e3012.x86_64.rpm
7a82010f9481e8348bc8f4d3420a4b36b6603388325bb039ba977724ad5cf627
perl-Hash-Util-FieldHash-1.20-471.module+el8.6.0+879+823e3012.x86_64.rpm
b61d92583075cb764edcd00571874a66ad6b8604b34c062acac7f18e0ec459b4
perl-I18N-Langinfo-0.19-471.module+el8.6.0+879+823e3012.x86_64.rpm
2623e457fc54df6cdf59e7cb367600debfb9e9dd4ed80c9c1168afca8907e3ab
perl-interpreter-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
4624784fafbb106fa3c2ede801be0a3ab3287d8dd65e8b86e5322b9956a953ee
perl-IO-1.43-471.module+el8.6.0+879+823e3012.x86_64.rpm
d88ffbb0fb6a54b382944fd9b4f64cec99cfa3dcb25bffd44d8c53e9c9938085
perl-IPC-SysV-2.09-1.module+el8.6.0+879+823e3012.x86_64.rpm
b50105e5a0de165d0d60f55df6a89a56adde83f940977893ee6d2d4fd3b19b41
perl-lib-0.65-471.module+el8.6.0+879+823e3012.x86_64.rpm
4bc4e1fc0465b77d6f1458a5bf2929b3af9d7b6ee094966a08f60501c873c801
perl-libs-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
2c72efd56a0c43f88b948f2baa76d8967cdd727e28eea76520e748bb889fa448
perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217
perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm
ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3
perl-mro-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm
866fc141c8bcc8aab318c0c4455b6615b17b0ea8a09d68dc8f1aa5fea05fa79d
perl-NDBM_File-1.15-471.module+el8.6.0+879+823e3012.x86_64.rpm
0f3c32d42439f2aa209820ddd83fbb58fc8f69ddc1547c211dd10fdef981d7e9
perl-ODBM_File-1.16-471.module+el8.6.0+879+823e3012.x86_64.rpm
a5dc7f814ed12d914d2fdf89cf69337225d723522c430e58964541d63907e076
perl-Opcode-1.48-471.module+el8.6.0+879+823e3012.x86_64.rpm
68fb12de43afe023752218b8f161dd9d1cea74734108b1c50358f6528cfbe999
perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf
perl-Params-Util-1.102-2.module+el8.6.0+879+823e3012.x86_64.rpm
1619c60e20f21d259c619d3e4140efe4ab69e095a33ea26e5a6114fa2efa5bb8
perl-ph-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm
071c53fc3b1508ea0794c71615a8a105b02d194653b3f4fabdd3c45871a7807c
perl-POSIX-1.94-471.module+el8.6.0+879+823e3012.x86_64.rpm
ad0bfffeb0f0371d2449ef8b63e0e96481b4d14217ed73fbb6f2f7ba8bbe3b7f
perl-Scalar-List-Utils-1.55-457.module+el8.6.0+879+823e3012.x86_64.rpm
834d2180a77a193a02d3eb6ea02c76e87b89cbbeae8d246fcb8e1eae50891f3c
perl-Socket-2.031-1.module+el8.6.0+879+823e3012.x86_64.rpm
b784bd497c1513d31623f76cfcdbcf7190d2501f1929d2dff53ada8a2bfd60c7
perl-Storable-3.21-457.module+el8.6.0+879+823e3012.x86_64.rpm
e66945a1abd7ed97d71e9f176facb28f76f70e85cb7586af58414ecb080fb0a5
perl-Sys-Hostname-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm
b3aebb55c9c25f8ab97d6957108e80ad2c2998ce1dc69dc5cdebf3e6eabb71b5
perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359
perl-threads-2.25-457.module+el8.6.0+879+823e3012.x86_64.rpm
f0478b6cb7f9e5493a8c7d233a817484589962f6164334f6813a306d2e52a9a7
perl-threads-shared-1.61-457.module+el8.6.0+879+823e3012.x86_64.rpm
a3c7d91fb51aa3a9ec804723d69b05cb86288e78ced03ac361521aa3f76624a7
perl-Time-HiRes-1.9764-459.module+el8.6.0+879+823e3012.x86_64.rpm
2a2d4011516f4a020d24de2d2706513be6f04b8608954a84d2a2f71d7b8a59d7
perl-Time-Piece-1.3401-471.module+el8.6.0+879+823e3012.x86_64.rpm
fc5ea636309c25ade4a9ce4be19732b102da1ce61a4e4b910a9192f35b79b867
perl-Unicode-Collate-1.29-1.module+el8.6.0+879+823e3012.x86_64.rpm
819e4e179ecf1b3b45beb9755217e03e5219f1c0e4aa808a7bd27d0495070697
perl-Unicode-Normalize-1.27-458.module+el8.6.0+879+823e3012.x86_64.rpm
5696de7c803145cae3ecd568451295cda3c8b9d4949f9991702f8e1aed5fff18
perl-version-0.99.29-1.module+el8.6.0+879+823e3012.x86_64.rpm
22908f36f713a9de7e1bad7bc3233b722dff2557f49d067ad93bb5d66b43a02f
rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl
perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm
b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-DBI
perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm
e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL
perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpm
e5aef8c6bbdd4a6de57484cce458f522a95163174acbbc8eda2dfa4f705aabf4
RLEA-2022:1955
perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl
perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm
b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-MySQL
perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm
4908aae2c12baad59a27792299a97531242483e857b5b4279f5c1f3577561320
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-SQLite
perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm
8ef1750722a4af50b752d0a03b17fb7366250cc9a31c6d88e1d966f15daa4fc8
rocky-linux-8-x86-64-appstream-rpms__perl-DBI
perl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpm
e0a15ab24680aff67f6c8ae8faea960a6462142b7d945b028b7b1322e0a08c47
rocky-linux-8-x86-64-appstream-rpms__perl-FCGI
perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm
262d96608428d89d165a82326f964dc6e5c51e7091867f3faaac0e63090228d8
rocky-linux-8-x86-64-appstream-rpms__perl-IO-Socket-SSL
perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpm
e5aef8c6bbdd4a6de57484cce458f522a95163174acbbc8eda2dfa4f705aabf4
RLBA-2022:1999
trace-cmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for trace-cmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
kernelshark-2.7-10.el8.x86_64.rpm
e28b68cf43f4d1c02ab2a79c4323b7cd47289064f3e0036785f08d09925bec02
RLBA-2022:2018
perl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
perl-5.26.3-421.el8.x86_64.rpm
de27f706ec48d1157ea764e5e00b210769f25773b79ada5edc315add5a410cc2
perl-devel-5.26.3-421.el8.x86_64.rpm
7e84a978e37a73520535dce1fd70aa2db75274b0339e6e0e13383a4814660292
perl-Devel-Peek-1.26-421.el8.x86_64.rpm
5f8937a9d898a252a7ac81d9c52cef2840e4c63dd6452c1f52002b84a1d0a764
perl-tests-5.26.3-421.el8.x86_64.rpm
07f7486385c9e9cfb78b7ccc40cd13bfc78054671398a882d19236eec1e9bee4
perl-Time-Piece-1.31-421.el8.x86_64.rpm
18005c88512126fa7401c38a030b01a053ef2c7bda411aaafcc4d4ef2e66a99c
RLSA-2022:2031
Low: libssh security, bug fix, and enhancement update
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651)
Security Fix(es):
* libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651)
Security Fix(es):
* libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libssh-devel-0.9.6-3.el8.x86_64.rpm
7cb2b675798815b1a1bf842d17c69edf8dfc941ece898b2d471e235161e0cccc
RLBA-2022:2061
jansson bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jansson.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jansson-devel-2.14-1.el8.x86_64.rpm
35b0b0591cbe5cddaf91736f2d564e332cdf3332321e88c020eebb9ac5d20053
RLBA-2022:2079
setools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
setools-4.3.0-3.el8.x86_64.rpm
92e03aafb9f6d19f1725d8ee7cc9f0f61be095ef701a093ce0dad91809314afc
setools-console-analyses-4.3.0-3.el8.x86_64.rpm
21696c7309cba8e7e944a8cc8c7d73ec33dd729f1b00467eba2c754176eb6132
setools-gui-4.3.0-3.el8.x86_64.rpm
12f3002986a110dd30f171b09700f9ab4427dda79355903c09d830fc3b0d6446
RLBA-2022:2091
postfix bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for postfix.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
postfix-cdb-3.5.8-4.el8.x86_64.rpm
63e360386cb151bf0a338d57a3e52cf4bc3eed8372013fb802e70a9b0c7504f5
postfix-ldap-3.5.8-4.el8.x86_64.rpm
10b1d1dba27b6cb581629867dee9bbaec38b6e795d071165898782f6cae741da
postfix-mysql-3.5.8-4.el8.x86_64.rpm
5486249aaeb70a5d9aa2f11e6b10fdc8a6cf31e5a208baa06d1beda213601306
postfix-pcre-3.5.8-4.el8.x86_64.rpm
6a00c9e929bf2c21d174ebd36d666db74a4625c0398817a107b712f7b76d19e2
postfix-perl-scripts-3.5.8-4.el8.x86_64.rpm
977cba0e36d8bcef037636fe5fd9302f7396f029efe3dd501551695e3d5d5863
postfix-pgsql-3.5.8-4.el8.x86_64.rpm
ac275db2c2062f885ce5ce04d6f80171e41a654b8f51bb8970d21c7a87a369d0
postfix-sqlite-3.5.8-4.el8.x86_64.rpm
11433addb8f58c2f4c0169e995941ae25e7a02406013239b5deee3abbe2b1bf5
RLBA-2022:2097
cryptsetup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cryptsetup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cryptsetup-devel-2.3.7-2.el8.x86_64.rpm
b5e72ac21ea1b38f767fa1ebb0598d0d69418f86eb274f8ab0b47d28808cbb0c
RLBA-2022:2099
sysfsutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sysfsutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sysfsutils-2.1.0-25.el8.x86_64.rpm
d6e32caf879b2d8d4f33f1257ab6a2d391d5d1d9db2e29329471eda80d0adf9d
RLBA-2022:2117
gpgme bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpgme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qgpgme-1.13.1-11.el8.x86_64.rpm
25d6f8ccd77cf48a02d86239ef91981a7f93a3395adea817cdee2d296996d9a3
RLSA-2022:5813
Moderate: vim security update
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
vim-common-8.0.1763-19.el8_6.4.x86_64.rpm
58fb2fd64740f3dddd0465d725779b9a92382096a451b38a3d13e598fb537a65
vim-enhanced-8.0.1763-19.el8_6.4.x86_64.rpm
555bf2c9cb7a631f91195a2c477713668210b2dfcb82c5dc5258fe411bfb7e4c
vim-X11-8.0.1763-19.el8_6.4.x86_64.rpm
138b57307d0b6d219d4739841ec0d118256c885f6357c4052400276513f5dc63
RLSA-2022:7105
Moderate: gnutls security update
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
gnutls-c++-3.6.16-5.el8_6.x86_64.rpm
57818cdd7188acbf57263517b2a9e81d7d283bb0e0e87c280c58d831933c9ad4
gnutls-dane-3.6.16-5.el8_6.x86_64.rpm
1738781e0a92c8c890bf53efc9ee95b8055d9ad51ea408e5f0e4d22d6dce3643
gnutls-devel-3.6.16-5.el8_6.x86_64.rpm
ee433690b3583469d732499e6419ae573fe88152d0417def1fc4814ce35dcc54
gnutls-utils-3.6.16-5.el8_6.x86_64.rpm
6a0485d3cc9fa5cb3c26e88cd5a1affb2b377a1c599ad886be3aa58fe9fe957d
RLSA-2022:7108
Moderate: sqlite security update
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Out of bounds access during table rename (CVE-2020-35527)
* sqlite: Null pointer derreference in src/select.c (CVE-2020-35525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Out of bounds access during table rename (CVE-2020-35527)
* sqlite: Null pointer derreference in src/select.c (CVE-2020-35525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
lemon-3.26.0-16.el8_6.x86_64.rpm
7378a4f1edf1a34321ee4e735db4302fdc3c780cc7df9fe235f263ee50817ca6
RLBA-2022:7115
rpm bug fix and enhancement update
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523)
rocky-linux-8-x86-64-appstream-rpms
rpm-build-4.14.3-24.el8_7.x86_64.rpm
677b722768bb6fbb4b9479ffad9cb7f69aaaa06718686d75d66dd87a8081f0f5
rpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpm
321b320ea3f4f0e28d68daf77bd6f004329e48700273b0f6138519ccd7474e6e
RLBA-2022:7684
glibc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
compat-libpthread-nonshared-2.28-211.el8.x86_64.rpm
0d987ddaee5aa093feb72296aa630e0cab8c6b86dda5e560652ae561cc06b113
glibc-utils-2.28-211.el8.x86_64.rpm
8decd744120cef26bc1ee1253cd7d56326391b14fbf896c9249a3330b4b5f015
RLBA-2022:7688
gcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cpp-8.5.0-15.el8.x86_64.rpm
28cf4357b326dc03b53023b4a3368c4dac6ac058c850d3e787302436f3e90b84
gcc-8.5.0-15.el8.x86_64.rpm
a775ba87b97355a442098c6ff1381f92521a2ba8201e9af62c1fe1167490a78d
gcc-c++-8.5.0-15.el8.x86_64.rpm
d9ce7589fafa13e929ad62b8db7507844a842e23bdf006915ddd19e4b9f2740b
gcc-gdb-plugin-8.5.0-15.el8.x86_64.rpm
164d664e573149c79415039b67dfe110bf69fef0030f857136f1d46d1dbd8580
gcc-gfortran-8.5.0-15.el8.x86_64.rpm
c65a3cbe3a87e0d181ccfd4305331422e6427090d59b25daa4621e8b483e05d9
gcc-offload-nvptx-8.5.0-15.el8.x86_64.rpm
6b134ae3ff20d035c857122d2dcbf3cb0ccf85813cf896eda6dc13f4e1fa605e
gcc-plugin-annobin-8.5.0-15.el8.x86_64.rpm
789b09dfb84ce5000de464228a4f376343415861749430f694002a3c364bcc60
libitm-devel-8.5.0-15.el8.x86_64.rpm
a4cf4b140dd638ab5bfdf21c2608b7231cfd72dce246016dc2624224b4fca265
libquadmath-devel-8.5.0-15.el8.x86_64.rpm
5402ec862817511fe5b2a6cfefcdd46404f0220cc3405028288e1b9026c0c48b
libstdc++-devel-8.5.0-15.el8.x86_64.rpm
5fc96d87ea16dc1a72c61f7e81a4c7b4cfa9ffebe0eff215639c442e1cd945f0
libstdc++-docs-8.5.0-15.el8.x86_64.rpm
3358d2c9007ea4e04e326a1c43841dca505bb2e566a72224ec1944194e231b84
RLBA-2022:7693
binutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
binutils-devel-2.30-117.el8.x86_64.rpm
b756947caed110dbd7309c580685a01e1b32c56ea253ce72dd8f0b8665096be2
RLBA-2022:7698
samba bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
samba-vfs-iouring-4.16.4-2.el8.x86_64.rpm
293bfdcd38d29e1c5d2d0b3bae70d030335b5930798fd40776a937e377d0d278
RLSA-2022:7715
Moderate: libxml2 security update
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxml2-devel-2.9.7-15.el8.x86_64.rpm
4b107cd7b8a27df7a1c9af249ff0a61e749290c282fca5c1230b4f274d9e9b73
RLBA-2022:7716
cups bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cups-2.2.6-50.el8.x86_64.rpm
1517378cb5ed82be222d6499d7a4ee724e680a9ce66821a62ea7822e84ea6993
cups-client-2.2.6-50.el8.x86_64.rpm
1e739decd05133d57837a8eb165a9cfc3f2d6c816b175d28e5c23d22b9e96d78
cups-devel-2.2.6-50.el8.x86_64.rpm
702da979d61c4ed0202ee91e3c3a9a431641fae9eb13cf0f535ef6eee757fa57
cups-ipptool-2.2.6-50.el8.x86_64.rpm
7f2b504aa5392955ce26dbc5ef7da19d7f23803476ccaecc6cc189898e44f674
cups-lpd-2.2.6-50.el8.x86_64.rpm
ac704b6073e258756580693de27b42288f30b9ab2cff142d04e6fc33c2416f50
RLEA-2022:7719
subscription-manager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
subscription-manager-migration-1.28.32-1.el8.x86_64.rpm
ab1ac527e986bf52f691534aabef8e7f8b830e3837f84e44bd82417439a31f2f
RLBA-2022:7735
bluez bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bluez-cups-5.63-1.el8.x86_64.rpm
7f4571280a8f4a40728e6956e10da82c26377c28e1c620d69a17cbb83667dfaf
RLBA-2022:7738
authselect bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
authselect-compat-1.2.5-1.el8.x86_64.rpm
b0e97bad8179ed01ff00f73175d7a65a51ceb824d4d546ced7d0068260f4cff7
RLBA-2022:7760
ndctl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ndctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
daxctl-devel-71.1-4.el8.x86_64.rpm
157d2afbb8abdd8d1fe02d06a46606c5a4548ebaa4b21d49702ac2baa6d54181
ndctl-devel-71.1-4.el8.x86_64.rpm
4b2034b6068692d1caaf0c99575a263c397a0edc309bf1ddd3dd8859c6ca4a32
RLBA-2022:7763
openssh bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openssh-askpass-8.0p1-16.el8.x86_64.rpm
46b9b55d7c2a500abe0b2012b4844cd340f9994350d092c7b837c44f8516239d
RLBA-2022:7769
dbus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dbus-devel-1.12.8-23.el8.x86_64.rpm
95cd8f0b705189258d6c9be2b274457fb77617a3b94d2ce50df2dadb4b4d6d8b
dbus-x11-1.12.8-23.el8.x86_64.rpm
63a0db5acdf451a16ddcb6158cd211af4b0d57064d8353f6c617efea50aba460
RLBA-2022:7774
sanlock bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-sanlock-3.8.4-4.el8.x86_64.rpm
e5ec992a8929df979daba0e9cf56ace4d4e7bbf916dc1fe4dcae37fb1603eea7
sanlk-reset-3.8.4-4.el8.x86_64.rpm
5d99904b88d20974973b30e16d118ed1f4fba2b9138897bdf392eb00fe62c107
sanlock-3.8.4-4.el8.x86_64.rpm
654cebaf1bf1b42cb78225bc15ce12bb9282ff53e06627ec0b7f9ed469e03a00
RLBA-2022:7776
libverto bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libverto.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libverto-libev-0.3.2-2.el8.x86_64.rpm
c0f58652b59ca82763860f53f288449c6707c61e769ada7010454abd0603865a
RLBA-2022:7783
util-linux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-libmount-2.32.1-38.el8.x86_64.rpm
ea9c81249ea546c2a79b65edb54694a9a0e1bab7d51cb9432d6ef8089dfe6439
RLBA-2022:7786
libselinux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libselinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libselinux-ruby-2.9-6.el8.x86_64.rpm
2a5b7dbd02c5776cd8ec453af6971a94c486325d05f86cb877979095a9c7daf6
RLEA-2022:7797
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
eth-tools-basic-11.3.0.0-1.el8.x86_64.rpm
b737a706ddd7eb66e5ec36939762facfca9ef1024c5f54e0861dda61bf1e6cf0
eth-tools-fastfabric-11.3.0.0-1.el8.x86_64.rpm
ba86e4ca08507ace4effef1704dd98444dd4643b1b92b29f28379a6fae833e22
fabtests-1.15.1-1.el8.x86_64.rpm
c7ca517e48ea1f77adc9bc0ee2f7176adf2c331b90d7ccf92f850022f31a1a7e
libvma-9.6.4-1.el8.x86_64.rpm
2b31ad656b5a84b2568145bcc11ce61a4ff6d2c555caf0ff5f2d2a0b954e061e
mstflint-4.21.0-1.el8.x86_64.rpm
fdcb52a33b993aa19181e3d0665a467ea8405cb7ff88078fa8b169511dcac099
ucx-1.13.0-1.el8.x86_64.rpm
1d7ec0c05bb2563c4c5fbc6f4d38778b1bfc2667387ec7c0cd88a81df070bf58
ucx-cma-1.13.0-1.el8.x86_64.rpm
272cd740693dbf9243e665dc84f3fa92a5dc2a2a974ccb283a311f58466d569e
ucx-devel-1.13.0-1.el8.x86_64.rpm
31c1637913be8ef679e273b472264cfd6741e6ce50e6835c744b10a78d846471
ucx-ib-1.13.0-1.el8.x86_64.rpm
dce07ebbd90ca1f8d20853a2fb42c0f8fbf512bc633c68e309fc985c11e4a1c0
ucx-rdmacm-1.13.0-1.el8.x86_64.rpm
4a10f4601d8e5fe574fbc8fb996f06985521aa807c39a58c30465e57489e8d14
RLBA-2022:7805
policycoreutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
policycoreutils-sandbox-2.9-20.el8.x86_64.rpm
b6dcb5c056adf4f355f2fb41e46feb691faf5c3bd2ba26e5afef9538c6ef1871
RLBA-2022:7819
rpm bug fix and enhancement update
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522)
rocky-linux-8-x86-64-appstream-rpms
rpm-build-4.14.3-24.el8_7.x86_64.rpm
677b722768bb6fbb4b9479ffad9cb7f69aaaa06718686d75d66dd87a8081f0f5
rpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpm
321b320ea3f4f0e28d68daf77bd6f004329e48700273b0f6138519ccd7474e6e
RLBA-2022:7825
bind bug fix and enhancement update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272)
rocky-linux-8-x86-64-appstream-rpms
bind-9.11.36-5.el8_7.2.x86_64.rpm
21abee84a89028d14ce98980aa383f28918bde55413fbd9e0cac50b19fb800df
bind-chroot-9.11.36-5.el8_7.2.x86_64.rpm
c0145d2d72c77b41ddd899f6cfbe5f616b0b9dff9c142767a31144375e78e082
bind-devel-9.11.36-5.el8_7.2.x86_64.rpm
09a84b9fa5fad18116b216c46c47aed57687a4836220f1efe46ccfab229322be
bind-libs-9.11.36-5.el8_7.2.x86_64.rpm
91e2c3e97c80d3bf7889b9a54a56b5023f0f836b5ff90fa0d9d89c57daaa7dc0
bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm
1076cfd8cf8a54db16a2bd8ad4afac3af11af0c7b64efca9f099001be25abac7
bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpm
e92594606ed4e209aeee470bdbbb0f914407eaacbaaf51287dd0b87d2c11f9e2
bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpm
ff6eeac2c720aa70d0833d6f67674797320f7a604bd0e89d7e3b104dc218a09d
bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpm
ac101cab9169d403cb52c7102ccd5464f7bd937c8433402506275a1888b2f367
bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpm
f4b183526a9aa05136adbb5e85f751d999d7890304108ba2398bf1d7c6c15684
bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpm
dbe7c50b37b95e2cd134a1985e23e9c31573b20a06870e7e81280c52f78a7cf8
bind-sdb-9.11.36-5.el8_7.2.x86_64.rpm
0c54ec1aa90b2dbd9db277762b9c87e5c203662c7e9fb4e4f339fd5d0e508127
bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpm
4b1f0cbc1fb7fb538f4dfaffd41e20b56067054ab12452ead829aaeadfeba5f1
bind-utils-9.11.36-5.el8_7.2.x86_64.rpm
32150af88921ca072ecb2c37e21606693effcba9264fbe9b9acf52fe11a5df5c
RLBA-2022:7828
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Host ip changed when start vm (BZ#2132285)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Host ip changed when start vm (BZ#2132285)
rocky-linux-8-x86-64-appstream-rpms
NetworkManager-cloud-setup-1.40.0-2.el8_7.x86_64.rpm
1759b995a9e30a6e3237ce2e58473e1a0bdcf88663abb49967dad49a8f94ae5c
RLBA-2022:7829
sssd bug fix and enhancement update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544)
rocky-linux-8-x86-64-appstream-rpms
sssd-idp-2.7.3-4.el8_7.1.x86_64.rpm
3c6c95405c3b4e996b6bf4f2cc6485b989ea323907be522fad24fe0c3956679c
RLBA-2023:0085
net-snmp bug fix and enhancement update
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es) and Enhancement(s):
* backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es) and Enhancement(s):
* backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764)
rocky-linux-8-x86-64-appstream-rpms
net-snmp-5.8-25.el8_7.1.x86_64.rpm
8e7570faa67317a9a726d1323277d9efd27a9b291c3dc345c18f7e741cd39ce5
net-snmp-agent-libs-5.8-25.el8_7.1.x86_64.rpm
739c2a903c800b8afd884b0b67a5aa02683a5f6cb145b1b5aeaecc5f8ec5ea2c
net-snmp-devel-5.8-25.el8_7.1.x86_64.rpm
6d6a6b021a77c170e8ef0b1df2c46d6c59e77305469232d38f5068d443116691
net-snmp-perl-5.8-25.el8_7.1.x86_64.rpm
cfec9b175bfa5cb9978309ef54574d767d0fff689899780ac3cea2f171a332de
net-snmp-utils-5.8-25.el8_7.1.x86_64.rpm
0b85a6937805187a8507ac0e374a11d2414b5008fcc92e2d94fc27bd23ff541e
RLSA-2023:0096
Moderate: dbus security update
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
dbus-devel-1.12.8-23.el8_7.1.x86_64.rpm
f3459cfbe2e627daed858265868a5c0c4d657e939594cc0e0269423090018cd8
dbus-x11-1.12.8-23.el8_7.1.x86_64.rpm
a998c811a937fd7398a0f7821ff5272a8da1b1cb4be7e2733caa1c68055cdef5
RLBA-2023:0098
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* crio occasionally fails to start during deployment (BZ#2132281)
* DNS servers are not sorted according to priority in resolv.conf (BZ#2135733)
* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891)
* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* crio occasionally fails to start during deployment (BZ#2132281)
* DNS servers are not sorted according to priority in resolv.conf (BZ#2135733)
* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891)
* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429)
rocky-linux-8-x86-64-appstream-rpms
NetworkManager-cloud-setup-1.40.0-5.el8_7.x86_64.rpm
02a5132a0d3b86743d4f6f24d1f74aacfcdf566b45967ef872f4e09c8d01b466
RLBA-2023:0105
util-linux bug fix and enhancement update
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252)
rocky-linux-8-x86-64-appstream-rpms
python3-libmount-2.32.1-39.el8_7.x86_64.rpm
f614fd2c1fc6b957438d93fada12ea568af9ca25305eb3b3025579c4b897e852
RLBA-2023:0106
gcc bug fix and enhancement update
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075)
rocky-linux-8-x86-64-appstream-rpms
cpp-8.5.0-16.el8_7.x86_64.rpm
023d14d82ff5f25ecc443509a50d3ea5ef0f42fee1805ef8c3d4bec535324e20
gcc-8.5.0-16.el8_7.x86_64.rpm
5b8aace21801f6e6702d6c33e3279dfd9fe894f28d3450236090d075f4509aa2
gcc-c++-8.5.0-16.el8_7.x86_64.rpm
57eb119d1affce29d7c09427b3d2427ef18ed75513c2e9e178f2833b3f6bbdf1
gcc-gdb-plugin-8.5.0-16.el8_7.x86_64.rpm
d3b4ec734d470f1c9d7465a9319b2b2d2eac0002a8d8fadd8e578f63c60e77d7
gcc-gfortran-8.5.0-16.el8_7.x86_64.rpm
e67137a484d7cca1e388ff92031924bf979e485c85c75ab4887ab93f91cecfa9
gcc-offload-nvptx-8.5.0-16.el8_7.x86_64.rpm
9c79ffc7831ffcac7bb2fa8dab7b9a47e1cc4c8f75bd62f174b68cf0baccfef3
gcc-plugin-annobin-8.5.0-16.el8_7.x86_64.rpm
4c251a06c8b5032d7bb6b3bd3cb637cce6e8f6698e6c76460d436498c2c1b8f7
libitm-devel-8.5.0-16.el8_7.x86_64.rpm
b786e7d6210051d4d18a5208fb0ee426ffd6287b49252f502c69c4137320234c
libquadmath-devel-8.5.0-16.el8_7.x86_64.rpm
47a32750c89cf5e9cdf6a43a4c93556542997c14c8cf9cd83c2f2f97131b93cf
libstdc++-devel-8.5.0-16.el8_7.x86_64.rpm
4967a6b2121388225a306e92f6de0f0208a07f614cf7fa5083c87ed433170fed
libstdc++-docs-8.5.0-16.el8_7.x86_64.rpm
a7ef4e076abca80ffad691972f006805d09d37c90bfb3d3c661ff096344f2a3c
RLSA-2023:0110
Moderate: sqlite security update
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
lemon-3.26.0-17.el8_7.x86_64.rpm
47817f17935b6af44be335b39a44b5a6d0772b6ea2d78d245d549a8e56c01d41
RLSA-2023:0116
Moderate: libtasn1 security update
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtasn1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libtasn1-devel-4.13-4.el8_7.x86_64.rpm
0d55122e296074efde594a2ff30970b1cfe31086b7273908aa34d2b1059ae1a2
libtasn1-tools-4.13-4.el8_7.x86_64.rpm
46d0db87e2f9d5aa78b591286d07345cb18efaefc4c93756852468c7801fe040
RLBA-2023:0120
authselect bug fix and enhancement update
The authselect package configures authentication and identity sources from supported profiles.
Bug Fix(es) and Enhancements:
* Change the default password encryption algorithm back to sha512. (BZ#2151229)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The authselect package configures authentication and identity sources from supported profiles.
Bug Fix(es) and Enhancements:
* Change the default password encryption algorithm back to sha512. (BZ#2151229)
rocky-linux-8-x86-64-appstream-rpms
authselect-compat-1.2.5-2.el8_7.x86_64.rpm
0dcb5ee8ac4d74314203eda35bca1ed32982ff799e837977f92a580e6892c52b
RLBA-2023:0124
sssd bug fix and enhancement update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883)
rocky-linux-8-x86-64-appstream-rpms
sssd-idp-2.7.3-4.el8_7.3.x86_64.rpm
e3a0ab19cdf0ff2dec20c7e33f97069bae225df8c11a5b01a4d193b524c15bab
RLSA-2023:0173
Moderate: libxml2 security update
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libxml2-devel-2.9.7-15.el8_7.1.x86_64.rpm
f779a0f9675a3365dffafa0e432c44e9166dec2ce6164f1d3baf17bde23f2bfd
RLBA-2019:0973
container-tools bug fix update
The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Users of container-tools are advised to upgrade to this updated package, which fixes several bugs.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Users of container-tools are advised to upgrade to this updated package, which fixes several bugs.
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:0975
Important: container-tools:rhel8 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675)
* [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669)
* [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675)
* [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669)
* [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689)
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:0981
Important: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases.
Security Fix(es):
* python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)
* python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164)
* python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases.
Security Fix(es):
* python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)
* python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164)
* python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
RLBA-2019:0987
mariadb:10.3 bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
Bug Fix(es):
* Altering table's column used in primary key causes data corruption (BZ#1702602)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for Judy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
Bug Fix(es):
* Altering table's column used in primary key causes data corruption (BZ#1702602)
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLSA-2019:1529
Important: pki-deps:10.6 security update
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037)
* tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014)
* tomcat: Open redirect in default servlet (CVE-2018-11784)
* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037)
* tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014)
* tomcat: Open redirect in default servlet (CVE-2018-11784)
* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
RLBA-2019:1970
authd bug fix update
The authd packages contain authd, a small and fast RFC 1413 ident protocol
daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd.
Bug Fix(es):
* authd authentication fails with ERROR:NO-USER (BZ#1730802)
Users of authd are advised to upgrade to this updated package, which fixes this bug.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The authd packages contain authd, a small and fast RFC 1413 ident protocol
daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd.
Bug Fix(es):
* authd authentication fails with ERROR:NO-USER (BZ#1730802)
Users of authd are advised to upgrade to this updated package, which fixes this bug.
rocky-linux-8-x86-64-appstream-rpms
authd-1.4.4-5.el8_0.1.x86_64.rpm
2cd8989ff633196026606258fc42d248b1ff003662ee845a9e9f197af077da1b
RLSA-2019:1972
Important: ruby:2.5 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
RLBA-2019:1954
python27:2.7 bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757)
rocky-linux-8-x86-64-appstream-rpms__python27
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
RLBA-2019:1955
satellite-5-client module update
Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5.
This update fixes the following bugs:
* A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450)
* Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5.
This update fixes the following bugs:
* A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450)
* Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445)
rocky-linux-8-x86-64-appstream-rpms__satellite-5-client
python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
571a4ec8b5b17116dc1105367bf344d2d5e99d7f64cdd139abed68156604ec5f
python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
711ac546b34b0800ad9a428df43abb16d49657037165d9346094b2ef7b1d4838
python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
12bed1b1726516134b87a833019a03971acdd2647ee20d835a508123e93e6e28
python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
eaa1b2f91389b2137df2afee36b21556592e777c9c5fea50173ae7d325c4c803
rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
c6ebd58dbc04bc16d86ad30394c59c6252992b6a9b7c05322b1245927b6a78d3
rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
32e4a7d4235da0cca307470b72205611adf539711e176d057fb8deb1e08a5641
rhnsd-5.0.35-3.module+el8.3.0+178+27415451.x86_64.rpm
7f2a23b3dd1997439a3c6e06b639d153a960ce6f0224be8bba18423a69050124
rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
9e363cfb7f6d2dc976c53838116bfafcb58be49f3f261af1ab1f64df89111d9b
rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
bd1750ce82956377455e3b6de5ac8700eb1a34405d6d6568794da3e97330abe5
RLBA-2019:1956
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470)
* Performance Problems with Podman on systems with IO load (BZ#1724522)
* podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470)
* Performance Problems with Podman on systems with IO load (BZ#1724522)
* podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270)
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:2511
Important: mysql:8.0 security update
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs.
The following packages have been upgraded to a later upstream version: mysql (8.0.17).
Security Fix(es):
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834)
* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805)
* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592)
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814)
* mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503)
* mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752)
* mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536)
* mysql: Server: Connection unspecified vulnerability (CVE-2019-2539)
* mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636)
* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826)
* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737)
* mysql: Server: XML unspecified vulnerability (CVE-2019-2740)
* mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780)
* mysql: Server: DML unspecified vulnerability (CVE-2019-2784)
* mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795)
* mysql: Client programs unspecified vulnerability (CVE-2019-2797)
* mysql: Server: FTS unspecified vulnerability (CVE-2019-2801)
* mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819)
* mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for mecab-ipadic, mecab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs.
The following packages have been upgraded to a later upstream version: mysql (8.0.17).
Security Fix(es):
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834)
* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805)
* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592)
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814)
* mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503)
* mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752)
* mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536)
* mysql: Server: Connection unspecified vulnerability (CVE-2019-2539)
* mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636)
* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826)
* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737)
* mysql: Server: XML unspecified vulnerability (CVE-2019-2740)
* mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780)
* mysql: Server: DML unspecified vulnerability (CVE-2019-2784)
* mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795)
* mysql: Client programs unspecified vulnerability (CVE-2019-2797)
* mysql: Server: FTS unspecified vulnerability (CVE-2019-2801)
* mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819)
* mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mysql
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
RLSA-2019:2512
Important: subversion:1.10 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
RLSA-2019:2593
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLBA-2019:2717
python27:2.7 bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bux Fix(es):
* python-wheel needs to remove or disable their crypto implementation (BZ#1732326)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bux Fix(es):
* python-wheel needs to remove or disable their crypto implementation (BZ#1732326)
rocky-linux-8-x86-64-appstream-rpms__python27
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
RLSA-2019:2720
Important: pki-deps:10.6 security update
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
RLSA-2019:2722
Low: libwmf security update
The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick.
Security Fix(es):
* gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libwmf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick.
Security Fix(es):
* gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libwmf-0.2.9-8.el8_0.x86_64.rpm
4f37891f78181ba5c63beed49787b5dc6576856fddadac0da20d190f25c58590
libwmf-lite-0.2.9-8.el8_0.x86_64.rpm
af3108a84c555c5b19277f7f16ab43f0f3b406c601be1b7b8c4364e33f17c633
RLBA-2019:2723
container-tools:rhel8 bug fix update
Bug Fix(es):
* race/corruption: podman failed to launch containers (BZ#1741110)
* podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* race/corruption: podman failed to launch containers (BZ#1741110)
* podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163)
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLBA-2019:2724
container-tools:1.0 bug fix update
Bug Fix(es):
* [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707)
rocky-linux-8-x86-64-appstream-rpms__container-tools
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:2799
Important: nginx:1.14 security update
Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage.
Security Fix(es):
* HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)
* HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage.
Security Fix(es):
* HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)
* HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
d77c1f61ff7c954fca0a2fac6b5d215deb913be94829d83e7669a94326341d88
nginx-mod-http-image-filter-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
af1755fac641c16ca7dbfd78ecd5853b85189fe2a9013a80d6cc15c790c20758
nginx-mod-http-perl-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
68ffe1514e55b20afe3fd0d9de5651c799941543bc015e44f9524e30a665639d
nginx-mod-http-xslt-filter-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
337667809e6b461078276949229dbf337915a06945bd083743501c0247d7f9f5
nginx-mod-mail-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
b154bd4e42e272dbb325d06f7eae09abb9feb4038299f6dce1fc95b9c918ffd4
nginx-mod-stream-1.14.1-9.module+el8.4.0+542+81547229.x86_64.rpm
19a19fe758d472c9c8b471a8ae875482372f340f668184510ff7121d0832d5e8
RLSA-2019:3335
Moderate: python27:2.7 security and bug fix update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
Security Fix(es):
* numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446)
* python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740)
* python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947)
* python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
Security Fix(es):
* numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446)
* python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740)
* python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947)
* python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
RLBA-2019:3336
nss-altfiles bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nss-altfiles.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nss-altfiles-2.18.1-12.el8.x86_64.rpm
9c32bc933f3ad0cc751246893ab76d85f3839afe2d70f6f2d945dcc97019ad85
RLSA-2019:3345
Low: virt:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755)
* QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)
* QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755)
* QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)
* QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLEA-2019:3361
gedit-plugins bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gedit-plugins.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gedit-plugin-bookmarks-3.28.1-8.el8.x86_64.rpm
8ee55f18c9ef924892aa658c08c4ee530cb746cc53c55b406995db7d500bb9e9
gedit-plugin-bracketcompletion-3.28.1-8.el8.x86_64.rpm
56c21923ee5a336aee82c875144d0ed34336611e97bd0f14a90debe433afb39b
gedit-plugin-codecomment-3.28.1-8.el8.x86_64.rpm
ab8bb5e0f23e617cbf0492b714c384c8a84f133e2cc91215268d1e3b40e4f485
gedit-plugin-colorpicker-3.28.1-8.el8.x86_64.rpm
6e2a9fd2d5b7c4c15b5f143635c1cccd1ddd3328d7114d91dab524b2183a7ba4
gedit-plugin-colorschemer-3.28.1-8.el8.x86_64.rpm
8c76c2706aadb7d8b94da6c1f6aaadc265bc54af15fdfd111debeba11653a961
gedit-plugin-commander-3.28.1-8.el8.x86_64.rpm
cef1bdf4601e1a18dacd7489b8ae0a6eaba6a88bd6faeb00ff34d33372205869
gedit-plugin-drawspaces-3.28.1-8.el8.x86_64.rpm
32093993ce0f43cbf5808c19504f7f54f6e2dd2e0c3ec55b896b27a83000acc9
gedit-plugin-findinfiles-3.28.1-8.el8.x86_64.rpm
c9e327e321b30c1277553b9fb078f61b0b0faecef864462ace636eae756c0cad
gedit-plugin-joinlines-3.28.1-8.el8.x86_64.rpm
3099b3395a9f8da5b15e20da5eba3fe5a71ba310c7d8a1868d24c932f9d5ce90
gedit-plugin-multiedit-3.28.1-8.el8.x86_64.rpm
444af7dbedaa40019c503f13d0a82f74f7b7d87bf687190a04be717de6fc51cc
gedit-plugins-3.28.1-8.el8.x86_64.rpm
60987cdc33bea0a8464f6f351a7cef7d2dda4b464c7addc316b1cf7128af31ab
gedit-plugins-data-3.28.1-8.el8.x86_64.rpm
d56b807f59f8559097c097eca3cc8124ca9c4dc9c4c4c7051bfa0d92501163a2
gedit-plugin-smartspaces-3.28.1-8.el8.x86_64.rpm
a95cfd63cf7ad33d989da3aff0583f8ba5005be4c34fe4421a82bc9e4d0421d0
gedit-plugin-terminal-3.28.1-8.el8.x86_64.rpm
8e2cbc6e55d8695c8538ab32cb61d05b2c9d9f29c69a1df115f0d2a76559db4f
gedit-plugin-textsize-3.28.1-8.el8.x86_64.rpm
387df64b03c799e437a87611a9740bdb794d4c4ff16e8437ff4d0a82d7eb1247
gedit-plugin-translate-3.28.1-8.el8.x86_64.rpm
1687bf81b496c1c398996db23046a9fb27046ec197dec3f4df82e944ce32af1a
gedit-plugin-wordcompletion-3.28.1-8.el8.x86_64.rpm
0e61a5476f5485156b60fb3d04687f88b52364a34aa52ab9ab09334a54c6729d
RLBA-2019:3373
criu bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
RLBA-2019:3374
php:7.2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475
libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372
libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5
php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482
php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68
php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm
52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b
RLEA-2019:3375
new module: php:7.3
This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729
libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61
libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d
php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5
php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc
php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7
RLBA-2019:3382
python-gevent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-gevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d
rocky-linux-8-x86-64-appstream-rpms
python3-gevent-1.2.2-4.el8.x86_64.rpm
97d0e59dbd8e57beffd16895bf906d7cf06d02ee9a310e79860fef6ae78cd9bb
RLBA-2019:3384
ruby:2.5 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
RLEA-2019:3399
alsa-plugins bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-plugins.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
alsa-plugins-arcamav-1.1.9-1.el8.x86_64.rpm
549d5132d498ac5385320ac8bb8df3e3e618f43e615cf453f7350ef4a304b5d4
alsa-plugins-maemo-1.1.9-1.el8.x86_64.rpm
42044dad79db97f15ca117d0850fc457c00d7728c3129af779d8f7a161fc1caf
alsa-plugins-oss-1.1.9-1.el8.x86_64.rpm
b5d262787692b35ebf7476e839e7977589f580726407602f525a7456cc7dfffd
alsa-plugins-pulseaudio-1.1.9-1.el8.x86_64.rpm
ddbee7fff19b4e1f87929dd688047339a3ad7e3fd2a6e917f417508020a6b8e7
alsa-plugins-samplerate-1.1.9-1.el8.x86_64.rpm
3b3898b0e2e748f3614d076dab4f9bcf392581a8832c8777312edfbea2d3e8ad
alsa-plugins-speex-1.1.9-1.el8.x86_64.rpm
025cce6f35fcd4e0b04e329c51e37d7af2de086e39b30f3d7ae59921b186c683
alsa-plugins-upmix-1.1.9-1.el8.x86_64.rpm
df4a2a71c782fae44e5f349a87ef63190682d47f8499c204e75f1c8d88f3d9de
alsa-plugins-usbstream-1.1.9-1.el8.x86_64.rpm
d47e53bbb122ecc904051a02b5ba3d693b8446573f58660a615f617937d6716a
alsa-plugins-vdownmix-1.1.9-1.el8.x86_64.rpm
37b572f3cfb040633527f9b6ab083de2952e2f7615a6f656dcb43dbf18050ba3
RLSA-2019:3403
Important: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLBA-2019:3406
python-gssapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-gssapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-gssapi-1.5.1-5.el8.x86_64.rpm
8e40257c5b6d46b869e64fc234db0c7d78fd4659ed191df14c0d5ac45d905daa
RLBA-2019:3411
lttng-ust bug fix and enhancement update
This update fixes two issues in lttng-ust and subpackages.
There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed.
lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lttng-ust.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This update fixes two issues in lttng-ust and subpackages.
There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed.
lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux.
rocky-linux-8-x86-64-appstream-rpms
lttng-ust-2.8.1-11.el8.x86_64.rpm
69324bb766990259ee748c0fe4b146ee919478fd8c828cb2c6b48a1126c49a08
RLBA-2019:3412
X libraries bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libICE, libXt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libICE-1.0.9-15.el8.x86_64.rpm
2568b940439e3ab124234560251c5ccf3b82969b9a489a8c944919c1de9893e9
libICE-devel-1.0.9-15.el8.x86_64.rpm
12362899f5263ddce92e808a63b5e86c6f3f3c16e43faa39b71b053f3e8862f0
libXt-1.1.5-12.el8.x86_64.rpm
30df272fc4623a96e973ef361cbc6ea2eff0b5645b34f274c4a58f0ab968d6d0
libXt-devel-1.1.5-12.el8.x86_64.rpm
d41ae80a927a31d8f6111dce855f27ced876a991dcf1bbe1b796d3450ebfca3e
RLBA-2019:3416
pki-core:10.6 and pki-deps:10:6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
RLEA-2019:3420
enscript bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for enscript.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
enscript-1.6.6-17.el8.x86_64.rpm
8526cca5224af50c658f7c1e04b192c7722cce4595458a7c2f2c95527cc6b565
RLEA-2019:3425
compat-libtiff3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for compat-libtiff3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
compat-libtiff3-3.9.4-13.el8.x86_64.rpm
1304c7f70782eaa2903ca449db76e1811e0d37c90afd71ee8b511df4d4dcc164
RLEA-2019:3426
libpng15 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpng15.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpng15-1.5.30-7.el8.x86_64.rpm
8ce7dae0d8ef80a5d1feee1ebece3bec3bdef3d185d0a6b64289b01c145b2cd9
RLBA-2019:3439
new packages: gcc-toolset-9-dwz
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-dwz-0.12-1.1.el8.x86_64.rpm
5f8261a71f62b3fb4e1472718b81b1189652e72710d37df6eb38296b5b543f4b
RLEA-2019:3443
new packages: gcc-toolset-9-elfutils
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-elfutils-0.176-5.el8.x86_64.rpm
2eef2ff31d574cea7416d85d9399fd82c8b3e59387c4cc33be87f3912f42bac9
gcc-toolset-9-elfutils-devel-0.176-5.el8.x86_64.rpm
e9e08f5165c99f3c1de380b7918ba1e60a284640d92d0869620aeb062f85394b
gcc-toolset-9-elfutils-libelf-0.176-5.el8.x86_64.rpm
846436e017c2d77367ada9744eff3c9f589343f9e85fc042fc83f498aa0db80a
gcc-toolset-9-elfutils-libelf-devel-0.176-5.el8.x86_64.rpm
be68c4f4732af6e419a828278bdc346e8d00ef69295efe40729edd8bfb19736a
gcc-toolset-9-elfutils-libs-0.176-5.el8.x86_64.rpm
47517201979ac2449b61ab24f82ff5904364fd163721a72aa6350f054350f99e
RLEA-2019:3444
new packages: gcc-toolset-9-valgrind
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-valgrind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-valgrind-3.15.0-9.el8.x86_64.rpm
1eb88892de938b9d4e1bd78a8014cb802c1ef6e412959a38ed7757136db4b731
gcc-toolset-9-valgrind-devel-3.15.0-9.el8.x86_64.rpm
95aa574532e5bcb97b0a73165ef1e2f77270161acba2b4a782ad0429520302fd
RLEA-2019:3447
new module: ruby:2.6
This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm
2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a
rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm
b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df
RLBA-2019:3449
new packages: gcc-toolset-9-dyninst
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-dyninst-10.1.0-1.el8.x86_64.rpm
6df02dd5b151ecb1e4cdd9025b16fa9e921ef15a6b03533e3b46a215bbea8bb6
RLEA-2019:3454
new packages: gcc-toolset-9-systemtap
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-systemtap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-systemtap-4.1-4.el8.x86_64.rpm
5a6dc6ffb6a37f157aefbfc02164b38c1db6325000e9968867e0a2ebadbbe3af
gcc-toolset-9-systemtap-client-4.1-4.el8.x86_64.rpm
8897e248306da3821d112e1f692c5a635f62ef7983b7330756e3f08191eaae13
gcc-toolset-9-systemtap-devel-4.1-4.el8.x86_64.rpm
0c9dccc40c8aafdffe1122b6060de0f59e5dcaf65027260845dfea524393ccc9
gcc-toolset-9-systemtap-initscript-4.1-4.el8.x86_64.rpm
982d1e1a8db7e14221ed71f6352bc1a52d4c835eb3a84ffb3d7d058b90f3f975
gcc-toolset-9-systemtap-runtime-4.1-4.el8.x86_64.rpm
a48dea3a6f266f31d24387aafb49b337b57c384d96b5348a2d530351f68d3662
gcc-toolset-9-systemtap-sdt-devel-4.1-4.el8.x86_64.rpm
f9953a98d5629774e66ec9c7a23eb9426387406cd2842bfd12664d450c3653f0
gcc-toolset-9-systemtap-server-4.1-4.el8.x86_64.rpm
ec1a0beb49da172370b38ab991bafed35d2e35f057c903ccc37b54fe40d3d2b8
RLBA-2019:3455
new packages: gcc-toolset-9-ltrace
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-ltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-ltrace-0.7.91-1.el8.x86_64.rpm
8417a0a4f057afbee21e8ce44573a85c6059affeeafb4b3fc63436b4051706c8
RLBA-2019:3457
new packages: gcc-toolset-9-gdb
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-gdb-8.3-1.el8.x86_64.rpm
c402ca12acdc3aba7cec6add66be4ac51a0694e46377830c2194f80f85e37cc6
gcc-toolset-9-gdb-gdbserver-8.3-1.el8.x86_64.rpm
ff3d9a1c2d55a09a49b304e680107d73e0941c45a26d32d0d12c94f8f1e7afb2
RLBA-2019:3462
libcdio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcdio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libcdio-2.0.0-3.el8.x86_64.rpm
6a060a4f1db6ba186a94e8a733dc16045b90352200136898005ef516101c1c1d
RLBA-2019:3465
hplip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hplip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
hplip-3.18.4-9.el8.x86_64.rpm
b6ddf49b9620356330be16bd3aadce81e022fd52b3eaeb466332cb0f18bc1dfd
hplip-common-3.18.4-9.el8.x86_64.rpm
b2d6d0450a7b58bf970fc13cb5d3792e37ce0111c9ff99b135d3409471a8fe71
hplip-gui-3.18.4-9.el8.x86_64.rpm
561f58c36b5e5c98848e6b9025edfe5b988590166c776805997f0a549efa4125
hplip-libs-3.18.4-9.el8.x86_64.rpm
fcdeb5dbff590b4c154b56471d0f3592b5998eb20cff0e8c279df0b9134b0d02
libsane-hpaio-3.18.4-9.el8.x86_64.rpm
e59779857cfee8069795c2b567e877cbf81c3cb962bfe9ac98d355381471dd41
RLBA-2019:3466
libkkc-data bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libkkc-data.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libkkc-data-0.2.7-12.el8.x86_64.rpm
8932c5300df500745f4e27cc9210313bfa68501c5b8c98b94f336c32d7358a88
RLBA-2019:3468
sblim-indication_helper bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-indication_helper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-indication_helper-0.5.0-2.el8.x86_64.rpm
9ce614765666f2b1844db8b46414736e62a129fbbaa65a0718ecc8e9946158c3
RLBA-2019:3471
container-exception-logger bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for container-exception-logger.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
container-exception-logger-1.0.2-3.el8.x86_64.rpm
226566224f9bbee3c0b7ec102ddc1ce3f4e84fdeded9027ae7c41478e23e1063
RLEA-2019:3472
libpmemobj-cpp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpmemobj-cpp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpmemobj++-devel-1.6-2.el8.x86_64.rpm
391cececabace73d050b8bb563f1315638653716f594e042e4e9cb86f61c4b9c
libpmemobj++-doc-1.6-2.el8.x86_64.rpm
9cd1db8bef466f7b30b35dbf9780d661c62b248ae6b8b37264ce18ffe8d8115f
RLBA-2019:3474
satellite-5-client module update
Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5.
This update fixes the following bugs:
* A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450)
* Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5.
This update fixes the following bugs:
* A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450)
* Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445)
rocky-linux-8-x86-64-appstream-rpms__satellite-5-client
python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
571a4ec8b5b17116dc1105367bf344d2d5e99d7f64cdd139abed68156604ec5f
python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
711ac546b34b0800ad9a428df43abb16d49657037165d9346094b2ef7b1d4838
python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
12bed1b1726516134b87a833019a03971acdd2647ee20d835a508123e93e6e28
python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
eaa1b2f91389b2137df2afee36b21556592e777c9c5fea50173ae7d325c4c803
rhn-check-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
c6ebd58dbc04bc16d86ad30394c59c6252992b6a9b7c05322b1245927b6a78d3
rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
32e4a7d4235da0cca307470b72205611adf539711e176d057fb8deb1e08a5641
rhnsd-5.0.35-3.module+el8.3.0+178+27415451.x86_64.rpm
7f2a23b3dd1997439a3c6e06b639d153a960ce6f0224be8bba18423a69050124
rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
9e363cfb7f6d2dc976c53838116bfafcb58be49f3f261af1ab1f64df89111d9b
rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.x86_64.rpm
bd1750ce82956377455e3b6de5ac8700eb1a34405d6d6568794da3e97330abe5
RLSA-2019:3476
Moderate: squid:4 security and bug fix update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLBA-2019:3487
abrt-java-connector bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for abrt-java-connector.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
abrt-java-connector-1.1.0-16.el8.x86_64.rpm
7e6373b1a4d155667f3d37f19a035af395ef37324f31af8968ce3b237fc85fb8
RLBA-2019:3490
ldns bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ldns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ldns-1.7.0-21.el8.x86_64.rpm
579cbe08fbd4d2870363ad94dcaac1517bfefc02621f94d79ddaf783f0ed9338
RLBA-2019:3492
jna bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jna-4.5.1-5.el8.x86_64.rpm
75e7e9bb4c13e26e4665020f7fe0ea4709ba807c6a4221fe1d9d1bedf7492074
RLSA-2019:3494
Important: container-tools:1.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLBA-2019:3500
volume_key bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for volume_key.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
volume_key-0.3.11-5.el8.x86_64.rpm
962a11cdf4fb9ce68fa7fceb99a1f3b34199320dfb11a7e4c0a1bdd7ff805f63
volume_key-devel-0.3.11-5.el8.x86_64.rpm
df504d9ef85876617735bd3316c16cad07524b2622aeb16b7d7078b7af72c657
volume_key-libs-0.3.11-5.el8.x86_64.rpm
f998500b251c3416e796c60f171bced0eb190acd2c4a0a6c0469fdb6072e4eb1
RLBA-2019:3507
qpdf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qpdf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qpdf-7.1.1-10.el8.x86_64.rpm
174b0828f65c2c71d0d4bf8f883e58b0369b16dfed5aec5c917717a4270026ff
qpdf-libs-7.1.1-10.el8.x86_64.rpm
e36f1b137bf58ed4b21f333b59fbb93b4855cb9045a2c41322320e9cf58ec2c9
RLEA-2019:3557
libtalloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cmocka, nss_wrapper, uid_wrapper, socket_wrapper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nss_wrapper-1.1.5-3.el8.x86_64.rpm
5ba1254970834a881d6be6a64f03d1a5660602f5cc40f351c4d46cb04b36e5d3
RLBA-2019:3623
NetworkManager bug fix and enhancement update
An update for NetworkManager is now available for Rocky Linux 8.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
An update for NetworkManager is now available for Rocky Linux 8.
rocky-linux-8-x86-64-appstream-rpms
NetworkManager-libreswan-1.2.10-4.el8.x86_64.rpm
60d73cbb869b8753e3627cf96d9fc5f175bc8719e912958ac88274852927ac7b
NetworkManager-libreswan-gnome-1.2.10-4.el8.x86_64.rpm
cab52e3f13b05fa3c1211589d2d6550fecb49d5a5dde5581995693d6c85a8294
RLSA-2019:3703
Low: libvorbis security update
The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates.
Security Fix(es):
* libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392)
* libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libvorbis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates.
Security Fix(es):
* libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392)
* libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvorbis-1.3.6-2.el8.x86_64.rpm
2fc30d8b8e41b392adc0ecd2cd63377cc7bba4c2664d9b0437b2c6bdeed5c620
RLSA-2019:3708
Moderate: mariadb:10.3 security and bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358)
Security Fix(es):
* mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510)
* mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537)
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628)
* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739)
* mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758)
* mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for asio, Judy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358)
Security Fix(es):
* mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510)
* mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537)
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628)
* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739)
* mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758)
* mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLSA-2019:3735
Critical: php:7.2 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Critical
An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475
libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372
libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5
php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482
php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68
php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm
52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b
RLSA-2019:3736
Critical: php:7.3 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Critical
An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729
libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61
libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d
php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5
php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc
php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7
RLBA-2019:3785
libcacard bug fix and enhancement update
The libcacard packages contain the Common Access Card (CAC) emulation library.
This update fixes the following bug:
* Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477).
Users of libcacard are advised to upgrade to these updated packages, which fix this bug.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcacard.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libcacard packages contain the Common Access Card (CAC) emulation library.
This update fixes the following bug:
* Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477).
Users of libcacard are advised to upgrade to these updated packages, which fix this bug.
rocky-linux-8-x86-64-appstream-rpms
libcacard-2.7.0-2.el8_1.x86_64.rpm
dcc0805bce58d3f08b032fc8dae90ff8a0c35da6754643c25cd4c8f08acb81e1
libcacard-devel-2.7.0-2.el8_1.x86_64.rpm
68396d58b579bd54d1428654d9811ca4089ef7096677e225e6f868d16de147be
RLSA-2019:4269
Important: container-tools:rhel8 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)
* backport json-file logging support to 1.4.2 (BZ#1770176)
* Selinux won't allow SCTP inter pod communication (BZ#1774382)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)
* backport json-file logging support to 1.4.2 (BZ#1770176)
* Selinux won't allow SCTP inter pod communication (BZ#1774382)
rocky-linux-8-x86-64-appstream-rpms__container-tools
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
RLSA-2019:4273
Important: container-tools:1.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
RLBA-2019:4274
virt:rhel bug fix update
Bug Fix(es):
* Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829)
* [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133)
* Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134)
* [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829)
* [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133)
* Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134)
* [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2020:0279
Moderate: virt:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLEA-2020:0346
new module: postgresql:12
This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822)
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLBA-2020:0347
perl-DBD-Pg:3.7 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
RLSA-2020:0348
Important: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for containernetworking-plugins, python-podman-api, udica, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
RLSA-2020:1379
Important: container-tools:rhel8 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495)
* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188)
* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194)
* fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016)
* buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for udica, python-podman-api, slirp4netns, containernetworking-plugins, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495)
* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188)
* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194)
* fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016)
* buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLBA-2020:1354
gcc-toolset-9-binutils bug fix update
GCC Toolset is a compiler toolset that provides recent versions of development
tools. GCC Toolset is an Application Stream packaged as a Software Collection.
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Bug Fix(es):
* Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default.
To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system.
Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development
tools. GCC Toolset is an Application Stream packaged as a Software Collection.
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Bug Fix(es):
* Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default.
To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system.
Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958)
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpm
c4fd1717fd48949497da91cc88989d24e81fe925bb57e995aac790154d865c41
gcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpm
4664b94c012a43fd9cbb22dbb2b5717b8f1c76453bdd654a0df1ce5c5a1ebe88
RLSA-2020:1358
Important: virt:rhel security and bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711)
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711)
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2020:1360
Important: container-tools:1.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
RLSA-2020:1577
Moderate: exiv2 security, bug fix, and enhancement update
The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)
Security Fix(es):
* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)
* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)
* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)
* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)
* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)
* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)
* exiv2: information leak via a crafted file (CVE-2018-11037)
* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)
* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)
* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)
* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)
* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)
* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)
* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)
* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)
* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)
* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)
* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)
* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)
* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)
* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)
* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)
* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)
* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)
* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)
* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)
* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libgexiv2, gnome-color-manager, gegl, exiv2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)
Security Fix(es):
* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)
* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)
* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)
* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)
* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)
* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)
* exiv2: information leak via a crafted file (CVE-2018-11037)
* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)
* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)
* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)
* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)
* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)
* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)
* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)
* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)
* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)
* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)
* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)
* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)
* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)
* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)
* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)
* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)
* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)
* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)
* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)
* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gegl-0.2.0-39.el8.x86_64.rpm
9da238520faee587b7d4c213e996ed1848c00dd0dd80efe1e497f0e91197e443
gnome-color-manager-3.28.0-3.el8.x86_64.rpm
c24a3854ebc59169cedd0d384f7dff9047c81299d5ab7b13c282dbbd20dd55bd
libgexiv2-0.10.8-4.el8.x86_64.rpm
d6e26f8aea4dfd969f068749aeb11b99ea1a19f85b311d4c2414fc3c1332db43
RLEA-2020:1579
whois bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for whois.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
whois-5.5.1-2.el8.x86_64.rpm
2222561be8aa7f17033cf8dcbf8bd823ac3c8ec61e11da943008ecba6726bc37
RLEA-2020:1587
virt:rhel bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2020:1599
libselinux-python:2.8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libselinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__libselinux-python
libselinux-python-2.9-2.1.module+el8.4.0+532+c114ce35.x86_64.rpm
ae7f81152647d4c05b01209e235a4844d6f51a82e70168bb11966ca43cc776ff
RLSA-2020:1605
Moderate: python27:2.7 security, bug fix, and enhancement update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944)
Security Fix(es):
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060)
* python: Cookie domain check returns incorrect results (CVE-2018-20852)
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
* python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056)
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944)
Security Fix(es):
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060)
* python: Cookie domain check returns incorrect results (CVE-2018-20852)
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
* python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056)
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
RLEA-2020:1607
http-parser bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for http-parser.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
http-parser-2.8.0-9.el8.x86_64.rpm
7cc537d8110104b9e9a9d7e1602fea66bf3f3258e0475cc1327f0f228f339e21
RLEA-2020:1611
input stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xkeyboard-config, libevdev, libxkbcommon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxkbcommon-0.9.1-1.el8.x86_64.rpm
51f79ea9268dae9826ece0bc98c135dd5ca62b08581694ae5401971690fd3766
libxkbcommon-devel-0.9.1-1.el8.x86_64.rpm
bc172de2c44bdbf518ba6558aa8ae7db3ee9779f00a456278fa2247369b6c17b
libxkbcommon-x11-0.9.1-1.el8.x86_64.rpm
d8864abf376820a1a7ac8060fa753486b6a189f1ed3f9287080740dcd89d511f
RLSA-2020:1616
Low: irssi security update
Irssi is a modular IRC client with Perl scripting.
Security Fix(es):
* irssi: use after free when sending SASL login to server (CVE-2019-13045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for irssi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Irssi is a modular IRC client with Perl scripting.
Security Fix(es):
* irssi: use after free when sending SASL login to server (CVE-2019-13045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
irssi-1.1.1-3.el8.x86_64.rpm
52d26652faf272caa1948ed66b71ee827443f8a8a374e99186a5afda8bab7085
RLBA-2020:1617
pmdk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pmdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
daxio-1.6.1-1.el8.x86_64.rpm
1e9c5f2802c05afb6f6a3245e63f9903da9624c37af3844eb7222ac0b402a3f0
libpmem-1.6.1-1.el8.x86_64.rpm
9390e81eff676f6d996eeee96bd8b357eb3bdbfe33e8f58eb992214d836437ca
libpmemblk-1.6.1-1.el8.x86_64.rpm
3542e03b622e8ccab260c766656e20eda1108986d18a417b5c2bfbe87a4ec0e8
libpmemblk-devel-1.6.1-1.el8.x86_64.rpm
54855006772d493e4b01789c8d61a53cfd4e65e0f4892d921b32ba7c7fdd866a
libpmem-devel-1.6.1-1.el8.x86_64.rpm
db5ffdd71e17560f76194194ab8991f101dfc2ebfcc0d0eabe2b5be29431b392
libpmemlog-1.6.1-1.el8.x86_64.rpm
3f6888905e519eba4431e5131c93f483f5d48ee4343069d27de3148e81ddcdca
libpmemlog-devel-1.6.1-1.el8.x86_64.rpm
ada2820ea6d421c33b3a0ca644bf3bda157467e2ca319d29f68a3567cb20f28b
libpmemobj-1.6.1-1.el8.x86_64.rpm
b416032faf71a26ee22012a6a4af0a6f219139dc35140e88a63c1ed54c90bbf7
libpmemobj-devel-1.6.1-1.el8.x86_64.rpm
45c5c07ab0b19824c36f7add9f3cc256a204184da541a850585a1582254a748d
libpmempool-1.6.1-1.el8.x86_64.rpm
baaddd2fa82996cb11985951f91409c99ca26b7f4a2d634d0be44dafe830a74d
libpmempool-devel-1.6.1-1.el8.x86_64.rpm
5f7cdb35109a3a9f82170633093b9ed47479ac3203740096fc15069f645c646b
librpmem-1.6.1-1.el8.x86_64.rpm
6d86d6901893a4d0a6e890ebfa528a2338bb53f74d5a50201bbb41197d48afc4
librpmem-devel-1.6.1-1.el8.x86_64.rpm
462852e411c339993af8ea83ab6e8c9784c100aa9457054148c9acbd361fad7c
libvmem-1.6.1-1.el8.x86_64.rpm
b2efd8c272562f2f2176edb821d32a9545f2da5e2781147d60cd2f1f42bbba04
libvmem-devel-1.6.1-1.el8.x86_64.rpm
f236be66a4a07483f19f9d5541a9dcfa7e3d21e6767b465856e1d499cb5bc642
libvmmalloc-1.6.1-1.el8.x86_64.rpm
6717873d36ea17ccc0e0dd9d33d53c832813b48d36b8d09ff0126deb79f7b578
libvmmalloc-devel-1.6.1-1.el8.x86_64.rpm
3db9411351c74d3ff72af48de27fc594e26c29b8ebdba3e740ad1b4193d46bfd
pmempool-1.6.1-1.el8.x86_64.rpm
161a8ed305488e6003e0e3d5d0b6f6668fcefebe5cc7113ee340eca83bd4fd96
pmreorder-1.6.1-1.el8.x86_64.rpm
eafef0efebf3a85e93f7adce92f394839ddfd0d9652e534201da7c6a9a046030
rpmemd-1.6.1-1.el8.x86_64.rpm
7b19fda765ef96e67ab9a51598f1f3e5b4fc5737e4d02d44cc2c7327a143abc6
RLEA-2020:1618
pmdk-convert bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pmdk-convert.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pmdk-convert-1.7-1.el8.x86_64.rpm
20230e1a1da258f0ca2610927011ed1503d66c644ef86e537f393275835db261
RLBA-2020:1622
python-greenlet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-greenlet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-greenlet-0.4.13-4.el8.x86_64.rpm
b420503c732ab66fa5273c9958e6fec08c6fc41d9fd8a73df9a944a418a89656
RLSA-2020:1624
Moderate: php:7.2 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981)
Security Fix(es):
* php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020)
* php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637)
* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638)
* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639)
* php: Invalid read in exif_process_SOFn() (CVE-2019-9640)
* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)
* php: Buffer over-read in exif_read_data() (CVE-2019-11040)
* php: Buffer over-read in PHAR reading functions (CVE-2018-20783)
* php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021)
* php: memcpy with negative length via crafted DNS response (CVE-2019-9022)
* php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023)
* php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024)
* php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034)
* php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035)
* php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036)
* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)
* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php, php-pecl-apcu, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981)
Security Fix(es):
* php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020)
* php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637)
* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638)
* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639)
* php: Invalid read in exif_process_SOFn() (CVE-2019-9640)
* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)
* php: Buffer over-read in exif_read_data() (CVE-2019-11040)
* php: Buffer over-read in PHAR reading functions (CVE-2018-20783)
* php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021)
* php: memcpy with negative length via crafted DNS response (CVE-2019-9022)
* php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023)
* php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024)
* php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034)
* php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035)
* php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036)
* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)
* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
9fc3e337e32c08e73f2dade4edb3604b4a4c10ed267b1cf2f175b2f209a80475
libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7b212ab4184f0cf855365da753b2db5e6a674f12f69ec76618ccba0ee3981372
libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm
c7b944939ee3822d7328ba5958848310602e2e33a441644589187a352a9ab8f5
php-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
e8c89eb016473a87dee62f6608b3f052a01f3fdaac8a3bee8bf1bc3fb14e4a91
php-bcmath-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
68aeede7037745de7d9c4a87f4e95b412ad312eacd815f5135f0af710719fe2a
php-cli-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
6d2cdcd5dfec65e866d823db778aaebe2b7961d70a07431087e870ea48cf7237
php-common-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
ff4d4ae4646cb95eb1504ef261bfc32509af509b4e5feff09e4340b57044452c
php-dba-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
d33a92302c7879f27e807621b72305de719831de2e40ab27fa36e06e8be54440
php-dbg-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
d3e92a616a1626dd40720fadf951f03eeeb7bbd7e90d6027347edd771f8d0445
php-devel-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
366a440d32dc12d9b7ae610b0c0cae66f62f4ed79877112fadeb0197880d54b1
php-embedded-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
b24fe44153454b0a85ebeff5c454810544eaa702090cc5db737ae0de0c1ee852
php-enchant-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
c6d5229c771398c10a5b5f5ec3f92ce45b68f8fafd3d6df231a96a4235c3809a
php-fpm-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
8217ad0c7d917edf411b295716a0cbddb1a20328708db91287d6f632355a2b54
php-gd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
1e689dca2b676adb347c55fddd778acdbca3aac326b16dd8e6c58a6d908bb1e8
php-gmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
be29f61e1366cd19956e8ef1741c74248ff21641df66d58e20a2bbc3328cb0e8
php-intl-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
6a839a9c155e561efc2b3d8e3d72353bc3f9a61d8a3c4a471ff68f12273ef502
php-json-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
5561451a9dfdb99c2af45d2011a208e3b0337c23591e85fafe8e273523554bc3
php-ldap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
0270a8e9b01f280a9fa939c41f0cca4c513bc4d481099d388b28ba0f4722823d
php-mbstring-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
6e361ea39d2a5e9bf2424fbf4dcf105ef08391350932ae6bfab424a50a98d745
php-mysqlnd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
e848cb92481789dd32bd6e4a12b5ca45bd72dd958bb7251e51e75f96947baf4e
php-odbc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
50301245d22ac3c3d1ebfb6f20b3791924dbe50b49c6854948b48b23734f019b
php-opcache-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
e3c38b730366995ecf4164bdbcdd12547a284d65df7dae39652d4a9f33bee8aa
php-pdo-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
28e87c9a557ba73e0cbc0d1fea7c673fbd02239fd94a3c10531a375f25e48ada
php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
a9c18ca7a2f1abb12980ac6e558e5f46246ea4ed3dba11412b8802ba4253b482
php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpm
7a35ea91d889e75de5c035b797d46797cacefa7249f33492d93643043b769a68
php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm
52b1ffb63b7dbdd94b39b073d67cf924f4f6c7908c2a47d0ed4272d9ca318b9b
php-pgsql-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
febe0f6ea94f80ebf7ef18875ee5c60517089945b109b12ab471a228bb3a8b6b
php-process-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
df61d9b4cac0b42f6e804fa37c1bd38b8f5d853561a52b0cd1065215ace16b1b
php-recode-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
893ae8e57613b51870b3c9c72cbf6fd3ff19071a45b755c69b5e3ef460067f62
php-snmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
ce229765886ed0052080a929dab4c81e0d3a309e6bcecf0c21cd4238e93d9214
php-soap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
897a5df0e71a0d773ae24e1223b73b7c79a9387da99749e6c07290268c7f54dc
php-xml-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
aff53a597cfc74f4c819d3106261135fe4300cf5c64e2d6f8f2e3d0a68b1ee1c
php-xmlrpc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm
190fa61efe99be2f949fcb25f8d456893bf14d38976dfd7c5883efaa2e8ced48
RLBA-2020:1626
ltrace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ltrace-0.7.91-28.el8.x86_64.rpm
328d16d21ea8d28ea824abf0efd162bc4dfd16dcf3191a989d0749ec22d829ec
RLSA-2020:1631
Low: GStreamer, libmad, and SDL security, bug fix, and enhancement update
The GStreamer library provides a streaming media framework based on graphs of media data filters.
The libmad package is an MPEG audio decoder capable of 24-bit output.
Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.
Security Fix(es):
* libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libmad, gstreamer1-plugins-ugly-free, gstreamer1-plugins-bad-free, SDL2, orc, gstreamer1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GStreamer library provides a streaming media framework based on graphs of media data filters.
The libmad package is an MPEG audio decoder capable of 24-bit output.
Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.
Security Fix(es):
* libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gstreamer1-1.16.1-2.el8.x86_64.rpm
74abf0a1fc61255b2dcd15e305266551beb9b2d111f0a52a5aef27c62c873450
gstreamer1-devel-1.16.1-2.el8.x86_64.rpm
73a77d1ce7274051e7cfb6237cbf4c4e4b6421902799183421370fc8f73f140b
gstreamer1-plugins-bad-free-1.16.1-1.el8.x86_64.rpm
111298c70ce191ced925d6c74da4420df2352e57dad7f199c5df2fd788ab7143
gstreamer1-plugins-ugly-free-1.16.1-1.el8.x86_64.rpm
6844c81cb360ab071008ba774447848cbe2ff75033aedbdbec3a0e13474be7af
libmad-0.15.1b-25.el8.x86_64.rpm
1134b11d9467844dc6cf81ddb59914c5b3c335b0fd9ae5d77e49b885d3bda446
orc-0.4.28-3.el8.x86_64.rpm
38d6384654084c9409e6b6e965278d3c023e7a3c0d4cc032fc1472499e4e4188
orc-compiler-0.4.28-3.el8.x86_64.rpm
5bb52ac79454dc2e2576d0f17d4bbd2d089db071a19c99ce1f3ea23989901dbe
orc-devel-0.4.28-3.el8.x86_64.rpm
b06be7958b80375c3aba49acf148d5ed42ad20ab035a4a9d7635ddd25167f78f
RLBA-2020:1633
xorg X11 server and driver bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libepoxy, wayland, libxcb, mesa-libGLw, wayland-protocols, libXpm, xorg-x11-drv-libinput, pixman, xorg-x11-drv-wacom.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxcb-1.13.1-1.el8.x86_64.rpm
f879eab6ae5acfddf7c6aa6cb7192fec725940babca04b33388fb1f0b5aadb5b
libxcb-devel-1.13.1-1.el8.x86_64.rpm
6228a598daace6500dd10a86572eaca31560c6e1003f87f8d831dc66bb2d5750
libXpm-3.5.12-8.el8.x86_64.rpm
d5594de8b7df3e9c907be53eb619f027d1cc1b74cdc8c3b9215cecfaf96bfefe
libXpm-devel-3.5.12-8.el8.x86_64.rpm
0bd3d99a95fd5b421cb25d618c0a5539e776a14de9bb71ddafb679c6273bff4c
mesa-libGLw-8.0.0-18.el8.x86_64.rpm
4a62430944ac2e54cd3aaf28e1fd6b47341090643330a2794f9b5d1f7309b2a4
mesa-libGLw-devel-8.0.0-18.el8.x86_64.rpm
d7bb96bda34dae57b388c1f479c1073696ef6b2a7577ae947df0829d16a647d4
xorg-x11-drv-libinput-0.29.0-1.el8.x86_64.rpm
5dd25511b396ccfe839c16c47bd213c736c4f1c1d53849a99860ba8a3ee483d0
xorg-x11-drv-wacom-0.38.0-1.el8.x86_64.rpm
05c0a87dcd9689fcb21f11141f298146f8931535095c9d33d8ad4156e82350ea
xorg-x11-drv-wacom-serial-support-0.38.0-1.el8.x86_64.rpm
a35a692b1d7acf6bbdcdde09020c793249d65ad0d5f7e6a6446ad388e4956661
RLSA-2020:1644
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540)
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)
* jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942)
* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943)
* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jackson-core, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, jackson-annotations, jackson-databind, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540)
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)
* jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942)
* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943)
* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
RLSA-2020:1650
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921)
* containers/image: Container images read entire image manifest into memory (CVE-2020-1702)
* podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921)
* containers/image: Container images read entire image manifest into memory (CVE-2020-1702)
* podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLBA-2020:1661
xorg-x11-drv-qxl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xorg-x11-drv-qxl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xorg-x11-drv-qxl-0.1.5-11.el8.x86_64.rpm
c9ab74b68da2c0a8021a878d52335943183eb7f0ce1b2d013c5ae7c46de513f8
xorg-x11-server-Xspice-0.1.5-11.el8.x86_64.rpm
6e37bd87969271a978c82782d84c47b3f79eeac1dbb942ebe1cd03ce4d47a6ac
RLBA-2020:1666
gcc-toolset-9 bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-9.0-4.el8.x86_64.rpm
3fb04ea97ffd31864961c227504c19bb08e0962250d78a56643bcbdeae512d6c
gcc-toolset-9-build-9.0-4.el8.x86_64.rpm
112a38a574d673354c64ad19318b927d6330e752518613d4a782c74a2a879b84
gcc-toolset-9-perftools-9.0-4.el8.x86_64.rpm
3b049cd421211ea3db048eb15cb19167c3eb621590fe05eddcbd23ab7de91f98
gcc-toolset-9-runtime-9.0-4.el8.x86_64.rpm
6f042a67a613e193878d9b3501c4c79295fee3e46cf6a1d4852c1a87495e485b
gcc-toolset-9-toolchain-9.0-4.el8.x86_64.rpm
478abaa58914ce5a4e6c16b7d7d2b9877d7dc307a7aeb1461f7e0fd0ff264828
RLEA-2020:1675
new module: container-tools:2.0
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:2.0 module to Rocky Linux 8.
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:2.0 module to Rocky Linux 8.
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLSA-2020:1686
Low: libmspack security and bug fix update
The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.
Security Fix(es):
* libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libmspack.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.
Security Fix(es):
* libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libmspack-0.7-0.3.alpha.el8.4.x86_64.rpm
ffe3213cb432e8c9066e152afd41d5ff306eb626c83ad417f8ff23e7e5f9cb0f
RLBA-2020:1690
gtk-vnc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gtk-vnc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gtk-vnc2-0.9.0-2.el8.x86_64.rpm
2bfff0a24ce4eb6d52ec696e96c58aaf68bf49b081c47993bc451ce8446c24c9
gvnc-0.9.0-2.el8.x86_64.rpm
15fed146b4d63617c6855bffd308d6dd19c47968c01e9fe4d7252715703b341a
RLEA-2020:1692
php:7.3 enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for php-pear, php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729
libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61
libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d
php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5
php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
c488f0dba64ba85b4b9888f0ecef07cac2a26a600dee305c50c4eccbd22f018f
php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7
RLEA-2020:1694
new module: python38:3.8
This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-more-itertools, pytest, python-psycopg2, python-urllib3, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python-asn1crypto, python-py, python-chardet, python-markupsafe, python-pluggy, Cython, python-psutil, python-wcwidth, babel, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
RLBA-2020:1695
luksmeta bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for luksmeta.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libluksmeta-devel-9-4.el8.x86_64.rpm
8de7884362e85eead893c80b480f0aacf04435ead879224f1f271e6784395e70
libluksmeta-9-4.el8.x86_64.rpm
3db29d50509fd273d410b113d96cee5cfc30660aa09b3e31414b92bf4557df8f
luksmeta-9-4.el8.x86_64.rpm
d75fee723d6411a531fca66be33b001c5d990f59d08fcadd80fb104c8c207466
RLBA-2020:1700
libbytesize bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libbytesize.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libbytesize-1.4-3.el8.x86_64.rpm
bf0c4717f287401f9e7ef99509de83cb521164ac666a9f787d5e9d6a6baf58ec
python3-bytesize-1.4-3.el8.x86_64.rpm
669e9ddced50415ef55fe469d58a97e8fdd7cd582162a15135d1705a73bdaa7d
RLEA-2020:1707
spice-streaming-agent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-streaming-agent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-streaming-agent-0.3-2.el8.x86_64.rpm
b0510e805197699ce2ebfff6be3462cd1c6a6ed966ee376d896f0172f5f9ea9d
RLSA-2020:1708
Moderate: liblouis security and bug fix update
Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg).
Security Fix(es):
* liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684)
* liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685)
* liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577)
* liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for liblouis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg).
Security Fix(es):
* liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684)
* liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685)
* liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577)
* liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
liblouis-2.6.2-21.el8.x86_64.rpm
61df0b3c8c29746e62bdb76309ebd73857b125f47213671592f97a63bb5789f1
RLEA-2020:1709
new package: virt-p2v
Virt-p2v is a tool for conversion of a physical server to a virtual guest.
This enhancement update adds the virt-p2v package to Rocky Linux 8. (BZ#1704180)
All users who require virt-p2v are advised to install this new package.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-p2v.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virt-p2v is a tool for conversion of a physical server to a virtual guest.
This enhancement update adds the virt-p2v package to Rocky Linux 8. (BZ#1704180)
All users who require virt-p2v are advised to install this new package.
rocky-linux-8-x86-64-appstream-rpms
virt-p2v-maker-1.42.0-5.el8.x86_64.rpm
2288be0afbe6ef9ca5e037cb6d4508c644dcd34ae82c6aa040519f4f2af90513
RLBA-2020:1713
gcc-toolset-9-binutils bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Bug Fix(es):
* Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default.
To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system.
Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Bug Fix(es):
* Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default.
To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system.
Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417)
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpm
4664b94c012a43fd9cbb22dbb2b5717b8f1c76453bdd654a0df1ce5c5a1ebe88
gcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpm
c4fd1717fd48949497da91cc88989d24e81fe925bb57e995aac790154d865c41
RLBA-2020:1726
ipvsadm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipvsadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ipvsadm-1.31-1.el8.x86_64.rpm
791359c3e500082c6daa7610d495b285c8c4b174be527cd02b90d71e4b59a7b6
RLBA-2020:1737
gcc-toolset-9-strace bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-strace-5.1-6.el8.x86_64.rpm
1ddb53e90fbdfb19a7d0a556723e6394ecd1a16af69878e8637ba86e9e9b341b
RLBA-2020:1741
python-reportlab bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-reportlab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-reportlab-3.4.0-8.el8.x86_64.rpm
89753b1b2534dbc2c44b2cbd5b5ca7c06a1bedafbca56087c63a2ded0d9c2acd
RLBA-2020:1742
gcc-toolset-9-make bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-make.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-make-4.2.1-2.el8.x86_64.rpm
a886becf7389c72de970fa8bb32647d4348c543ce91f55a8c6af16c21aacfe13
gcc-toolset-9-make-devel-4.2.1-2.el8.x86_64.rpm
e0538a389200d2a4f4e1285e12d249d7e2918c94eba5b3bb5163ae3b4641a02c
RLBA-2020:1743
librevenge bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librevenge.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
librevenge-0.0.4-12.el8.x86_64.rpm
e02f71c18ad100ae01818134e706e2e75e6cfa5d4c14189f578205f8d6654593
librevenge-gdb-0.0.4-12.el8.x86_64.rpm
cb084768cf9ad94234a0923a4b6954a47963231f54c4d1259264965b06d50573
RLBA-2020:1745
python-pycurl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pycurl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pycurl-7.43.0.2-4.el8.x86_64.rpm
64ea29c73cbbf33a54abfeebe18880ed90d2b313f5f186a47247ffe3dfe0946a
RLBA-2020:1750
sblim-cmpi-base bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-cmpi-base.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-cmpi-base-1.6.4-14.el8.x86_64.rpm
4fdd9072c8d73b641504b5dbb352d17bc7afce04a11bf0a1233f5662ed08bfdb
RLBA-2020:1754
gcc-toolset-9-annobin bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.2 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-annobin-9.08-4.el8.x86_64.rpm
f82e9f47e52e802b14041b0a2abd8213e3941a33acc643fe94eb9a346f750d45
RLSA-2020:1926
Important: container-tools:1.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* conflicting requests: failed to install container-tools:1.0 (BZ#1813776)
* podman run container error with avc denied (BZ#1816541)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, slirp4netns, oci-systemd-hook, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* conflicting requests: failed to install container-tools:1.0 (BZ#1813776)
* podman run container error with avc denied (BZ#1816541)
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm
a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051
RLSA-2020:1931
Important: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLSA-2020:1932
Important: container-tools:rhel8 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLSA-2020:2041
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519)
* squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945)
* squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519)
* squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945)
* squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLBA-2020:2456
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman: Please backport correction patch for the native container healthchecks (BZ#1834346)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman: Please backport correction patch for the native container healthchecks (BZ#1834346)
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLBA-2020:2457
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman: Please backport correction patch for the native container healthchecks (BZ#1836978)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman: Please backport correction patch for the native container healthchecks (BZ#1836978)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLSA-2020:2774
Important: virt:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)
* QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)
* QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2020:3032
Moderate: mod_auth_openidc:2.3 security and bug fix update
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857)
* mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cjose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857)
* mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107)
rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc
cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06
cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102
RLBA-2020:3036
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably
podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably
podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLSA-2020:3053
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-podman-api, udica, toolbox, runc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm
2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2
RLSA-2020:3623
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810)
* squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810)
* squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLSA-2020:3662
Moderate: php:7.3 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655)
Security Fix(es):
* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)
* php: Buffer over-read in exif_read_data() (CVE-2019-11040)
* php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045)
* php: Information disclosure in exif_read_data() (CVE-2019-11047)
* php: Integer wraparounds when receiving multipart forms (CVE-2019-11048)
* oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224)
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
* oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163)
* oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203)
* oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204)
* pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454)
* php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059)
* php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060)
* php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062)
* php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063)
* php: Information disclosure in exif_read_data() function (CVE-2020-7064)
* php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065)
* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)
* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)
* php: Out of bounds read when parsing EXIF information (CVE-2019-11050)
* oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246)
* php: Information disclosure in function get_headers (CVE-2020-7066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655)
Security Fix(es):
* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)
* php: Buffer over-read in exif_read_data() (CVE-2019-11040)
* php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045)
* php: Information disclosure in exif_read_data() (CVE-2019-11047)
* php: Integer wraparounds when receiving multipart forms (CVE-2019-11048)
* oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224)
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
* oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163)
* oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203)
* oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204)
* pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454)
* php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059)
* php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060)
* php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062)
* php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063)
* php: Information disclosure in exif_read_data() function (CVE-2020-7064)
* php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065)
* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)
* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)
* php: Out of bounds read when parsing EXIF information (CVE-2019-11050)
* oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246)
* php: Information disclosure in function get_headers (CVE-2020-7066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4dc00b2f8d5e6bada6f9ad5ba554d5e2112ab3a91c4e057faf53df75352b0729
libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
80f6f4a53dea381a2d6f44dad4438d68fbb811489225ef092c0c78c4314e3a61
libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0e94ccbfbc316351a43bd2b034c4a0f4404c618a95e95fe8ccb303806facc19d
php-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
81c845ff6e92154312d6dee84eb0a2420f555560c720df74c6ac28f91d6814a3
php-bcmath-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
3521b7280b6bb19c5c33fdb7bcc1d8900222cb720baad4f5aef0a64c24b5f501
php-cli-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66b575dd4de583eaa438e9fa29e1690622da46917506ff101a29d082d28666b2
php-common-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2b818cb38f29eb46323eb7f988e7eec6e57c54dee336cb9ad680624b4e5ae0c
php-dba-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
eacf57de74bb58757840239513992e3e2c48da900db3fae2f4a6fcd9d4e2d520
php-dbg-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
6de3d1723a37e21f09751a1df454ce3db61151f6886e857cd8a016968cbfa887
php-devel-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
a2d8a6b55e603788e61635c41a78bb88fcf23cd638b5b4605e64a793ef1c2723
php-embedded-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
d4a5467b1bf5aaa6eb5977c4e4e8638edc9abdb65a7f0a436fd6d4d142d52ea2
php-enchant-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
8f10ea82c11d1836ec6878a5ec5e307422b5f86900e0f569b9c1700089604643
php-fpm-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
beb88ba847269ee001e886db7f4b23d750c1d0f1f1d3bd7c0d77a8a4c5149fa3
php-gd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
0bcaa3bb5600f7d6bfa85c7bdcf4fc34986413fdf7fab2a5f1dbe536893fbc61
php-gmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
a70d92c3cc81c1afd9df86741429fd58d948e19c4747c2dff43a55d3c1b64620
php-intl-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
16b3429667ecf09b1a359959940540167d31a12777564d7d9c318c5b90961b70
php-json-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e9b6597c148f59d8d6418aad929477baf26e0468f260c937281357b433f16c79
php-ldap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
178899d11efba895402fe773aafaf6510150f300aafb15294947b1d36d35a6c1
php-mbstring-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
999d14ab0851ef0a72da81beb3562166d8a02259f31562f91608eb413ce85a75
php-mysqlnd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
4806123ba0bbd0586a1148b4b791d8041af7caf7ca3e2d5e92001393b23edb58
php-odbc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f934922a6bfcee875fc543c9cb76ce02687b611c717cfae9d9834b97c5bc29d4
php-opcache-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
3b7570d6416f18238605c38113ab52847f2e9d4527b63f20bdbdddb6c54ff511
php-pdo-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
d1a63ef832f6108bdd1e8c746b1b03489f1dca39457ed2cf135016ba277c9c06
php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
85a56209af967872ca09fc40f32e515497f7e97eb311b3437c1f7e30681167e5
php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
66e1abd6f41a8f8ee76542afed5c0338e40ace0d0061f852aa294c65a6316edc
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
c488f0dba64ba85b4b9888f0ecef07cac2a26a600dee305c50c4eccbd22f018f
php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e2502177dea02b55a66a43dc25f2229b91e647ceb8ad72d86758a8996f8b97e7
php-pgsql-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
b4a70ab74593d4a4e8bbcd147d6a9ef37f2ee73ea3d3fc2026cbb723a8410665
php-process-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f090d8f796e208d1da100151ad96fa24e609eca2a9b1ac728000d735ed5ae30f
php-recode-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
7a9b599d8d3a1ed64ebb713be92c2f5648b73b29332460fefbe8a2f2fc76a24a
php-snmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
3a288b202b968f5b0685f88e3794865db8a26fe7b94e7a8baf45420a4cede09a
php-soap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
510d2dc16daea3a229e16d5ebfdcf5e3a5f9c52a722768e98d754e1be4392a8f
php-xml-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
3f13bd0a62eee03261a23f6bcebe607dc20331acae2b7d5623c2cba3ba22b046
php-xmlrpc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
e1b10e75e43aea2c9b6c6bdeda8087c6b7921c25e0e96d17e2dfdfbbd2a38564
RLSA-2020:3732
Important: mysql:8.0 security update
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.21).
Security Fix(es):
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702)
* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634)
* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925)
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725)
* mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580)
* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619)
* mysql: Server: Connection unspecified vulnerability (CVE-2019-3009)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632)
* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620)
* mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574)
* mysql: Server: Logging unspecified vulnerability (CVE-2020-2770)
* mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804)
* mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812)
* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694)
* mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898)
* mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921)
* mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926)
* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553)
* mysql: Server: UDF unspecified vulnerability (CVE-2020-14576)
* mysql: Server: JSON unspecified vulnerability (CVE-2020-14624)
* mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631)
* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651)
* mysql: Server: Locking unspecified vulnerability (CVE-2020-14656)
* mysql: Information Schema unspecified vulnerability (CVE-2019-2911)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for mecab-ipadic, mecab, mysql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.21).
Security Fix(es):
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702)
* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634)
* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925)
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725)
* mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580)
* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619)
* mysql: Server: Connection unspecified vulnerability (CVE-2019-3009)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632)
* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620)
* mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574)
* mysql: Server: Logging unspecified vulnerability (CVE-2020-2770)
* mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804)
* mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812)
* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694)
* mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898)
* mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921)
* mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926)
* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553)
* mysql: Server: UDF unspecified vulnerability (CVE-2020-14576)
* mysql: Server: JSON unspecified vulnerability (CVE-2020-14624)
* mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631)
* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651)
* mysql: Server: Locking unspecified vulnerability (CVE-2020-14656)
* mysql: Information Schema unspecified vulnerability (CVE-2019-2911)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mysql
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
RLSA-2020:4059
Important: virt:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364)
* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libiscsi, netcf, sgabios.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364)
* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2020:4435
abrt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-abrt, abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-abrt-1.2.6-6.el8.x86_64.rpm
f6d3d376330002979b7be8c06e394a42b5848cf49e856c0a27c04f9dc30883bc
libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpm
5e37019a5283ba0e43d7575bb7b92b89500f793ad5c4dbfcfaeb1872a7fc3030
libreport-anaconda-2.9.5-15.el8.rocky.6.3.x86_64.rpm
6194f8ba650bc7585a3e99cd6e7f827286456e62a6bf98ed46c46c35f9d08c77
libreport-cli-2.9.5-15.el8.rocky.6.3.x86_64.rpm
2fcf64301eaafa7fcf3a3c72cfb96f05615b56cfcea521a83561222b72e9db0e
libreport-gtk-2.9.5-15.el8.rocky.6.3.x86_64.rpm
695990373066594c0627a7a762537e5de49d7be1926d8be0a55b461bb20140d3
libreport-newt-2.9.5-15.el8.rocky.6.3.x86_64.rpm
0e3e56dc4087d864dc4d67b86cd2b3bfb8b8b4d6673987717d463e1bb87d26e5
libreport-plugin-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm
227c155b52ec31ca24fa66639452937725607195a4253414a2a46b8a3edf7dd5
libreport-plugin-kerneloops-2.9.5-15.el8.rocky.6.3.x86_64.rpm
3e1fa31840233fa95fb27c9c057cb8f2946d81f8f5c9f332f0fc7e5e09fa1bd9
libreport-plugin-logger-2.9.5-15.el8.rocky.6.3.x86_64.rpm
e6e49176296cc70d772e69e7b17ecf38a8be6d05a03ad52334b2c719701fb9a7
libreport-plugin-mailx-2.9.5-15.el8.rocky.6.3.x86_64.rpm
95ff8fc918313b921b34162c844e297774e9ef5e5ece711a4eff8ddd8426b608
libreport-plugin-reportuploader-2.9.5-15.el8.rocky.6.3.x86_64.rpm
fb9fa978de3e7d265f6c48ffcec76e28d5c736870f398c83580e5660d44e3711
libreport-plugin-rhtsupport-2.9.5-15.el8.rocky.6.3.x86_64.rpm
e05b4bb22fd320eeb356dca5d8c43a3ae011354f0f0e013bb534bbdae18dc170
libreport-plugin-ureport-2.9.5-15.el8.rocky.6.3.x86_64.rpm
28a9a4fe6ac7b2b65c8445bdf30c67d674c6af4fc9f7944492a4136cc8c38d02
libreport-rhel-2.9.5-15.el8.rocky.6.3.x86_64.rpm
76e60d9d32ef100959f7171a0e86253d7842d6c9fb2fea7e27535643aff7950f
libreport-rhel-anaconda-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm
69e5e743a1180cc8a7002d3a8f68cc27e071dc87ed0d18e9ec954c340d43d750
libreport-rhel-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpm
c1de7ebf0c873e1247232573b8d8bb7c07e87fbab03e753c3af3826eab008e26
libreport-web-2.9.5-15.el8.rocky.6.3.x86_64.rpm
e6aa4595fb879aa45e101f8626e3bd4e43d2513948b23b113e7df6e4ade703ab
python3-libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpm
7567494607c825ed5eb4d4c02cda246483d90b5bde0f950cedd06d5d12ac5ceb
RLBA-2020:4621
iperf3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iperf3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
iperf3-3.5-6.el8.x86_64.rpm
b2bdb78d601c91f9a01bf9f229f02f0079bd92ca8bc37f615d720aba79fecb69
RLSA-2020:4628
Low: libreoffice security, bug fix, and enhancement update
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1). (BZ#1796893)
Security Fix(es):
* libreoffice: 'stealth mode' remote resource restrictions bypass (CVE-2020-12802)
* libreoffice: forms allowed to be submitted to any URI could result in local file overwrite (CVE-2020-12803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libcmis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1). (BZ#1796893)
Security Fix(es):
* libreoffice: 'stealth mode' remote resource restrictions bypass (CVE-2020-12802)
* libreoffice: forms allowed to be submitted to any URI could result in local file overwrite (CVE-2020-12803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libcmis-0.5.2-1.el8.x86_64.rpm
85fe680a824f5ec1a3e0dbeb6cd41abd45d672d462dc0fb1dd327095588a7307
RLSA-2020:4629
Moderate: libvpx security update
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126)
* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232)
* libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371)
* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libvpx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126)
* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232)
* libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371)
* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvpx-1.7.0-8.el8.x86_64.rpm
e78ccbde28d9eeb97e5cb37df37ef5a5e55b3de69bf2f6f260570076a2caee1c
RLBA-2020:4630
wget bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wget.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
wget-1.19.5-10.el8.x86_64.rpm
cb1dbb79240c60648916fed72bc3368e5394de1013b4135b54a812a40a279cff
RLBA-2020:4631
gom bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gom.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gom-0.4-1.el8.x86_64.rpm
bb7d6fd74621945051cdfc8a40a93c74bb5a6ef9cf399977b82e20d786c92092
RLBA-2020:4633
swig:3.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for swig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__swig
swig-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm
3a8d046a51dbf4a121fe67a46df74cd599c6f46a150a2eb1aa48c6c4ade3cd45
swig-gdb-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm
e9b828ca9e799c3c02d911fbfb4f430621de393e4361a45ef8bf734889057a10
RLBA-2020:4640
radvd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for radvd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
radvd-2.17-15.el8.x86_64.rpm
7ab537f957b4dd6b3fac3462f1b10cf5905591851c87f4190d6709b982de3152
RLSA-2020:4641
Moderate: python38:3.8 security, bug fix, and enhancement update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416)
Security Fix(es):
* PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477)
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)
* PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747)
* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)
* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-psycopg2, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416)
Security Fix(es):
* PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477)
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)
* PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747)
* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)
* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
RLSA-2020:4647
Moderate: freerdp and vinagre security, bug fix, and enhancement update
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.
The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287)
Security Fix(es):
* freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018)
* freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039)
* freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042)
* freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047)
* freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396)
* freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397)
* freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019)
* freerdp: Integer overflow in VIDEO channel (CVE-2020-11038)
* freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040)
* freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041)
* freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043)
* freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044)
* freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045)
* freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046)
* freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048)
* freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049)
* freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058)
* freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085)
* freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086)
* freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087)
* freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088)
* freerdp: out-of-bounds read in irp functions (CVE-2020-11089)
* freerdp: out-of-bounds read in gdi.c (CVE-2020-11522)
* freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525)
* freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vinagre.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.
The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287)
Security Fix(es):
* freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018)
* freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039)
* freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042)
* freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047)
* freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396)
* freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397)
* freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019)
* freerdp: Integer overflow in VIDEO channel (CVE-2020-11038)
* freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040)
* freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041)
* freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043)
* freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044)
* freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045)
* freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046)
* freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048)
* freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049)
* freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058)
* freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085)
* freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086)
* freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087)
* freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088)
* freerdp: out-of-bounds read in irp functions (CVE-2020-11089)
* freerdp: out-of-bounds read in gdi.c (CVE-2020-11522)
* freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525)
* freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
vinagre-3.22.0-23.el8.x86_64.rpm
b5c618c63d3360974aa20444687651e51c96bd2a84d47844ddc851391fd02d04
RLSA-2020:4649
Low: evolution security and bug fix update
Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.
The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.
OpenChange provides libraries to access Microsoft Exchange servers using native protocols.
Security Fix(es):
* evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for bogofilter, evolution-mapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.
The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.
OpenChange provides libraries to access Microsoft Exchange servers using native protocols.
Security Fix(es):
* evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bogofilter-1.2.5-2.el8.x86_64.rpm
055fb5f5338f3747eb7f7826bf0508cddc02cc4f1f7a1c81b3b37e7f3696219d
RLSA-2020:4654
Moderate: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)
* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)
* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
RLBA-2020:4658
munge bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for munge.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
munge-0.5.13-2.el8.x86_64.rpm
0dd4fe5f637073ab3044226acb9c3a3a8b3d181bc94eb52e3def2535150d7966
munge-libs-0.5.13-2.el8.x86_64.rpm
26722a8ec5e88792ed5728241095a00692fdc93dc6f3165c048aae0983229c28
RLSA-2020:4659
Moderate: gd security update
GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats.
Security Fix(es):
* gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977)
* gd: NULL pointer dereference in gdImageClone (CVE-2018-14553)
* gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats.
Security Fix(es):
* gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977)
* gd: NULL pointer dereference in gdImageClone (CVE-2018-14553)
* gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gd-2.2.5-7.el8.x86_64.rpm
ace2c28939c77d3e0ed768fbcef2ad8414a6892b3eae03712ec12a92825fc45d
gd-devel-2.2.5-7.el8.x86_64.rpm
1839caff25d169b3fc2b29782ecc02e90fe225938deec1b81e8cc3c7a792b1a7
RLEA-2020:4664
memcached bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memcached.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
memcached-1.5.22-2.el8.x86_64.rpm
80ba002a662fb3b041467abdc1520436e0dbbbcf42b160e81b1d5e24a5a82234
RLBA-2020:4665
lftp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lftp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lftp-4.8.4-2.el8.x86_64.rpm
b777ff195179177c9703548dc35156c63f4c56509362bf834d551f3107ce3210
RLSA-2020:4676
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296)
Security Fix(es):
* libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339)
* QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890)
* libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485)
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)
* libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)
* libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296)
Security Fix(es):
* libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339)
* QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890)
* libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485)
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)
* libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)
* libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2020:4678
tog-pegasus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tog-pegasus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tog-pegasus-2.14.1-46.el8.x86_64.rpm
1bed42c08cc37ebc5e1d7c20ef135fa1904ab9939c5101324054e3147eb52c97
tog-pegasus-libs-2.14.1-46.el8.x86_64.rpm
0a14c7352b8954b767c4d33bbba870054489d9bc87317678e48f93d8bdd9c52e
RLBA-2020:4679
pptp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pptp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pptp-1.10.0-4.el8.x86_64.rpm
403c469de3bd6f49b2b1f9c82fe72aa3f6dc887ab32184832f1e9db30ac7c25d
RLBA-2020:4681
ncompress bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ncompress.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ncompress-4.2.4.4-13.el8.x86_64.rpm
2e7cd19238f419b4b9315b96484d11c41393d2cfd6a22c67b52516e5f4a979e5
RLSA-2020:4694
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)
* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-podman-api, libslirp, toolbox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)
* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
RLEA-2020:4700
createrepo_c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for drpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
drpm-0.4.1-3.el8.x86_64.rpm
6dc369a31dfb6ca6aaf6b615aec3d52792d2411c276f8e392da041ab705fae87
RLBA-2020:4704
python36:3.6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python36
python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm
f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d
RLSA-2020:4709
Moderate: librsvg2 security update
The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library.
Security Fix(es):
* librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for librsvg2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library.
Security Fix(es):
* librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
librsvg2-2.42.7-4.el8.x86_64.rpm
be783a46ee945a6822831dc658d7e8bc6bc89ef84dea1ae6b39ef767efeb5147
librsvg2-devel-2.42.7-4.el8.x86_64.rpm
124de649dc6bfedfbbdddea386e9c78653e0d147b2115ac2c0ec02b36a8028b1
librsvg2-tools-2.42.7-4.el8.x86_64.rpm
eb0d175b2e1bb18dd7d8f9b0523238a68623abf4e05e4e022a63ee6442279d03
RLEA-2020:4711
HdrHistogram_c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for HdrHistogram_c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
HdrHistogram_c-0.9.13-2.el8.x86_64.rpm
55353693dcaf1b676fec269cda6ad65641c27dafd2fda21228a820a45b00d14f
RLSA-2020:4712
Moderate: subversion:1.10 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
RLSA-2020:4847
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* bootstrap: XSS in the data-target attribute (CVE-2016-10735)
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
* jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
* pki: Dogtag's python client does not validate certificates (CVE-2020-15720)
* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146)
* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179)
* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221)
* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* bootstrap: XSS in the data-target attribute (CVE-2016-10735)
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
* jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
* pki: Dogtag's python client does not validate certificates (CVE-2020-15720)
* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146)
* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179)
* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221)
* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
RLBA-2020:4715
chan bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chan.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
chan-0.0.4-3.el8.x86_64.rpm
effca9ba587bd1ece96428cc01c299d9d8212f97b71592babf23e1400de6e4ba
RLBA-2020:4717
new module: php:7.4
This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLEA-2020:4724
perl-IO-Socket-SSL:2.066 and perl-libwww-perl:6.34 update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-Net-HTTP, perl-HTTP-Message, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-WWW-RobotRules, perl-HTTP-Date, perl-LWP-Protocol-https, perl-Net-SSLeay, perl-TimeDate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-libwww-perl
perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpm
b0f3902f7b98713346884d6fdffb498a4a40d7023b3e0806f3fff4914dba474b
RLBA-2020:4726
libmaxminddb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmaxminddb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libmaxminddb-1.2.0-10.el8.x86_64.rpm
aeba7e5152314138adb423a1f7d1d58fcbc5dfd9214b3de2f6b35e42da4b9ca5
libmaxminddb-devel-1.2.0-10.el8.x86_64.rpm
5392fc9570da9dc7d4deefff17b11964da9b68d900e35b4321d9cf4638430b0d
RLBA-2020:4738
fio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fio-3.19-3.el8.x86_64.rpm
9e3022392a68cb36d9b816ec9591b91a46bfd5229329c124284ccd8db026be0c
RLEA-2020:4742
userspace graphics, xorg-x11, and mesa bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libXft, xorg-x11-xkb-utils, xorg-x11-xtrans-devel, xorg-x11-drv-intel, libvdpau, libxkbfile, libXxf86dga, libXau, libXrandr, xorg-x11-proto-devel, xorg-x11-util-macros, libXext, libXi, libXdmcp, libXmu, libXvMC, mesa-demos, xorg-x11-drv-ati.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
glx-utils-8.4.0-5.20181118git1830dcb.el8.x86_64.rpm
751056a3ca9f371de399e28f0269347b8b83253401cace95a5420c30714fbdb2
intel-gpu-tools-2.99.917-39.20200205.el8.x86_64.rpm
ca18f49420bd77871652059de37c4ce2712c7972136796a6c4af5bc4c9b5e9ad
libvdpau-1.4-2.el8.x86_64.rpm
f45b5cf54aeb481ff4cf52b101736810c7aebedcc227019cafb14b7414bd8cc8
libXau-1.0.9-3.el8.x86_64.rpm
028141ae18fb41c9ee406307953e600eba388282b0d581c7132db5ff22ace362
libXau-devel-1.0.9-3.el8.x86_64.rpm
7a17dc2ed5eff71b97ec5036d404b3b3f6c3ee26c4a42d9cbcd5e62d10ea9da2
libXdmcp-1.1.3-1.el8.x86_64.rpm
0b69d5c1e3ceba8903038d00820e13e7a4dd63ce095e9b3f45af7fff0893311e
libXext-1.3.4-1.el8.x86_64.rpm
d4b037882da8eb6c588eee822f3227e7caf6ed2e9352ed490f0cd3577ed78470
libXext-devel-1.3.4-1.el8.x86_64.rpm
65c371a1efdad5cf9280b6e62fef1ef155991daea3f026cd5adc0025aff6aef9
libXft-2.3.3-1.el8.x86_64.rpm
2d4a1d4c0c9e61c70936873f0563ed2ac6b468549c3163bf73f91134ff2e9860
libXft-devel-2.3.3-1.el8.x86_64.rpm
5f165daab1a56d5339f5ed6d588e28dc48af44b27470f4f1a4fb06dc1c93d2e5
libXi-1.7.10-1.el8.x86_64.rpm
50085caa63b1a131251449903e9918d847702e5a9b64ed33bd2b72b1ff657343
libXi-devel-1.7.10-1.el8.x86_64.rpm
895888acfd024093b564da21b808c20c3ab93bcee12d604afefbe229f35d396c
libxkbfile-1.1.0-1.el8.x86_64.rpm
34a3b0f4f7966fac35d7f912ff9415d8d4ff858c35f27405e3a4e8f3e55a0dc7
libXmu-1.1.3-1.el8.x86_64.rpm
d6a17b0d20b9d510cde5ea0bfbb3434a7f3878dbf710246fc063ff49a3facd9f
libXmu-devel-1.1.3-1.el8.x86_64.rpm
efe847621d6d3d5a6cea7c0ee04ae377e29a0db2235daca5348c893b989bfdc7
libXrandr-1.5.2-1.el8.x86_64.rpm
6e162f68d0459598f596ee0698a504c795d6c992a807dec0e718efdc8a1e225e
libXrandr-devel-1.5.2-1.el8.x86_64.rpm
e080677e1c0a510493557023b483268b62aaa1788ecf4549d9f0702c0243c27b
libXvMC-1.0.12-1.el8.x86_64.rpm
a90a28f61c0b3b2b4d7f0ccde4a5910b40c0af50d97e32db8251ef8f4fc4a005
libXxf86dga-1.1.5-1.el8.x86_64.rpm
ccfbba780589fce2c706637c19d968f718e57025ca847ca988bd6e08866bb71b
libXxf86dga-devel-1.1.5-1.el8.x86_64.rpm
d9e6d5d4907a21410438713ba87cb8cac1b0845870e85cca30e9bcb625fbbf00
xorg-x11-drv-ati-19.1.0-1.el8.x86_64.rpm
f2044a3ef87c2233a795acfd4e453a204067ac7859154bb8cefa15260d64ea3f
xorg-x11-drv-intel-2.99.917-39.20200205.el8.x86_64.rpm
a753e4380e920df6184f68718e509ab792225037b3e7d17140413873d5481772
xorg-x11-xkb-utils-7.7-28.el8.x86_64.rpm
317f517f2b2624d859fa1ebd0c77f75d2f6707eaa0da526f9e27e815aec27b57
RLSA-2020:4743
Moderate: squid:4 security, bug fix, and enhancement update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467)
Security Fix(es):
* squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520)
* squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521)
* squid: Improper input validation in URI processor (CVE-2019-12523)
* squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524)
* squid: Heap overflow issue in URN processing (CVE-2019-12526)
* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)
* squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529)
* squid: Denial of service in cachemgr.cgi (CVE-2019-12854)
* squid: Buffer overflow in URI processor (CVE-2019-18676)
* squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677)
* squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678)
* squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679)
* squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860)
* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)
* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)
* squid: DoS in TLS handshake (CVE-2020-14058)
* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)
* squid: Improper input validation could result in a DoS (CVE-2020-24606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467)
Security Fix(es):
* squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520)
* squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521)
* squid: Improper input validation in URI processor (CVE-2019-12523)
* squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524)
* squid: Heap overflow issue in URN processing (CVE-2019-12526)
* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)
* squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529)
* squid: Denial of service in cachemgr.cgi (CVE-2019-12854)
* squid: Buffer overflow in URI processor (CVE-2019-18676)
* squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677)
* squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678)
* squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679)
* squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860)
* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)
* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)
* squid: DoS in TLS handshake (CVE-2020-14058)
* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)
* squid: Improper input validation could result in a DoS (CVE-2020-24606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLSA-2020:4751
Moderate: httpd:2.4 security, bug fix, and enhancement update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)
Security Fix(es):
* httpd: memory corruption on early pushes (CVE-2019-10081)
* httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)
* httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)
* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)
* httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)
* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)
* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)
* httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)
* httpd: mod_rewrite potential open redirect (CVE-2019-10098)
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)
Security Fix(es):
* httpd: memory corruption on early pushes (CVE-2019-10081)
* httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)
* httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)
* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)
* httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)
* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)
* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)
* httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)
* httpd: mod_rewrite potential open redirect (CVE-2019-10098)
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLBA-2020:4752
new packages: gcc-toolset-10-dwz
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-dwz-0.12-1.1.el8.x86_64.rpm
a3fc3c8e50ede83b9dd42e816b7e3cb7c4b1bea76a7c27e6b9baa86b7de9aef4
RLBA-2020:4758
libosinfo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libvirt-glib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvirt-gconfig-3.0.0-1.el8.x86_64.rpm
d212dd8e8560f75d901e1e05a8b60dc221083d7c7ae4c6d38f690e611fe15dac
libvirt-glib-3.0.0-1.el8.x86_64.rpm
edbb5ddfe8604df94839c05863fbfec930c76b91cd04651d7841292f1c7be852
libvirt-gobject-3.0.0-1.el8.x86_64.rpm
54ce79c975115c186f7da62e5788ce09fff868e6e1e2de308071f9ee85c029c8
RLEA-2020:4759
new module: ruby:2.7
This enhancement update adds the ruby:2.7 module to Rocky Linux 8.
(BZ#1817135)
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the ruby:2.7 module to Rocky Linux 8.
(BZ#1817135)
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
RLBA-2020:4770
container-tools:2.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLBA-2020:4771
container-tools:1.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm
a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051
RLBA-2020:4773
libgit2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgit2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgit2-0.26.8-2.el8.x86_64.rpm
2fd89961bb66c0f0356457bb232d3aefdb8262b5280b3c0ed3fd6270e690b9c5
RLBA-2020:4776
new packages: gcc-toolset-10-make
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-make.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-make-4.2.1-1.el8.x86_64.rpm
108af38877fcfbe0a978849c72e88cb7dbb60680a1cd2936807fb34fec10d4ba
gcc-toolset-10-make-devel-4.2.1-1.el8.x86_64.rpm
9e4b9b3d7878c6d9b9695660b55998da5d9c1719f04cff1a9e2c9c35e47d478d
RLBA-2020:4777
new packages: gcc-toolset-10-ltrace
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-ltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-ltrace-0.7.91-1.el8.x86_64.rpm
671eb647a6e888e8832655ae9a3ffd566c15053bc6fba88ae9ff4b7b42ba9eb0
RLBA-2020:4779
ibus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus, ibus-hangul.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ibus-hangul-1.5.1-6.el8.x86_64.rpm
4917a3b7d03f8d640150d01cf98454973f9acaaf01d809c3dcf1e965ec7ed59b
RLBA-2020:4792
omping bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for omping.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
omping-0.0.4-18.el8.x86_64.rpm
7c52cea22fe1414818800cf2e4b030ee2b22daac0d2cce173f57aff3f29893cf
RLEA-2020:4803
perl:5.30 metadata for the Rocky Linux 8 module matrix (3/3)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
RLBA-2020:4824
ruby:2.5 bug fix update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
RLSA-2020:4827
Moderate: oniguruma security update
Oniguruma is a regular expressions library that supports a variety of character encodings.
Security Fix(es):
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for oniguruma.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Oniguruma is a regular expressions library that supports a variety of character encodings.
Security Fix(es):
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
oniguruma-6.8.2-2.el8.x86_64.rpm
b0e45f265d039cb2f8e12fd3c85ed1f95eaa44f37978c4a3faf169020907d6e7
RLBA-2020:4832
torque bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for torque.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
torque-libs-4.2.10-25.el8.x86_64.rpm
d8ea26158c65c5e8a729e117ee07c15cbbf864caa1f267f2dbe7bb830f3914a9
RLBA-2020:4834
new packages: gcc-toolset-10-systemtap
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-9-gcc-9.2.1-2.3.el8.x86_64.rpm
9773ebdd8bc8be47124faad82a588ac87521b1ccba5968aee2cadd7f446a7f87
gcc-toolset-9-gcc-c++-9.2.1-2.3.el8.x86_64.rpm
ea925505982b6aef4b57ce7221b18c7c0af4d6cbf79703dbe7f1d78bc68c1897
gcc-toolset-9-gcc-gdb-plugin-9.2.1-2.3.el8.x86_64.rpm
9fdeac6aa41b7aa1d96d66458c0635f416fb181b4913cb987ff94e15f78455b5
gcc-toolset-9-gcc-gfortran-9.2.1-2.3.el8.x86_64.rpm
fbb05fc9585b6e6a98572c78955654f77c0fbc1bf70c644379ded2908f63b3ab
gcc-toolset-9-libasan-devel-9.2.1-2.3.el8.x86_64.rpm
b3a980f8f8533d2c850c6ea94e64fcfb0ea95478ab043b1847309916e306efe3
gcc-toolset-9-libatomic-devel-9.2.1-2.3.el8.x86_64.rpm
a44828c99683dee995ff1dcf9e76dfb18c621e9a37e412eebaef846732a610bd
gcc-toolset-9-libitm-devel-9.2.1-2.3.el8.x86_64.rpm
38f6ffa33a061227cdc266ab1c6e31c4e81465cabe7c167ac1b69ec641d443d2
gcc-toolset-9-liblsan-devel-9.2.1-2.3.el8.x86_64.rpm
5a93eec6b35977c58c875613b92ed09b42bc27cb2eb4904ea10940d44d62c2a5
gcc-toolset-9-libquadmath-devel-9.2.1-2.3.el8.x86_64.rpm
bd26ee22d060d9ee6192c90c62f30dbc3da18d7fc0bf97867b0bdda1073eaa3c
gcc-toolset-9-libstdc++-devel-9.2.1-2.3.el8.x86_64.rpm
570fbb1b45eab5c8de6c14aeeff538333e7371d623995835b217f9610f34d7c8
gcc-toolset-9-libstdc++-docs-9.2.1-2.3.el8.x86_64.rpm
1d38b3f8d8083cf36b97b69d488f9ac7ce837515bb65131f765f41e6eec0467d
gcc-toolset-9-libtsan-devel-9.2.1-2.3.el8.x86_64.rpm
37ce964fb081c4109ae2dbc90a7965e1c56184fb7fdfec030c1ceae70f19515e
gcc-toolset-9-libubsan-devel-9.2.1-2.3.el8.x86_64.rpm
2a65df9b0cbd1661ed2deed9c0b23fe54fba4830823ffde1f5458fad3f95dcab
RLBA-2020:4859
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443)
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLBA-2020:5097
eclipse:rhel8 bug fix update
Eclipse is an integrated development environment (IDE).
The metadata for the eclipse:Rocky Linux8 module has been updated to remove the following unused profiles:
c
everything
To check whether you have the obsolete profiles installed, run:
# yum module list eclipse
The installed profiles have the [i] indicator next to their names.
To ensure the eclipse:Rocky Linux8 module contains the correct metadata, remove the unused profiles and reinstall the module with the java profile:
# yum module remove -y eclipse
# yum module reset -y eclipse
# yum clean all
# yum module -y install eclipse:Rocky Linux8/java
To install the eclipse:Rocky Linux8 module from scratch, use the java profile:
# yum module -y install eclipse:Rocky Linux8/java
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for eclipse-emf, eclipse-ecf, apache-commons-compress, hamcrest, opentest4j, xz-java, google-gson, glassfish-el, icu4j, xmlgraphics-commons, jsch, felix-scr, apiguardian, junit, glassfish-jsp, lucene, jetty, junit5, apache-commons-jxpath, eclipse, univocity-parsers, xml-commons-apis, felix-gogo-command, sat4j, batik, felix-gogo-shell, glassfish-annotation-api, jzlib, glassfish-jsp-api, objectweb-asm, felix-gogo-runtime, glassfish-servlet-api.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Eclipse is an integrated development environment (IDE).
The metadata for the eclipse:Rocky Linux8 module has been updated to remove the following unused profiles:
c
everything
To check whether you have the obsolete profiles installed, run:
# yum module list eclipse
The installed profiles have the [i] indicator next to their names.
To ensure the eclipse:Rocky Linux8 module contains the correct metadata, remove the unused profiles and reinstall the module with the java profile:
# yum module remove -y eclipse
# yum module reset -y eclipse
# yum clean all
# yum module -y install eclipse:Rocky Linux8/java
To install the eclipse:Rocky Linux8 module from scratch, use the java profile:
# yum module -y install eclipse:Rocky Linux8/java
rocky-linux-8-x86-64-appstream-rpms__eclipse
eclipse-equinox-osgi-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm
d2fc4ee364038cff7ca2fd9d5ee324b3c2917c8fe19f9cc2c8567cd2f22d68d0
eclipse-pde-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm
e10fa2a6f9fa5bd832b102474a5e56e30a3f43d529b0c610afb1d4b7bb272091
eclipse-platform-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm
bc48bd19edd1e7cb1f3ec77432a3488c3d0fc897a67b72901bbc18ededf5238e
eclipse-swt-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm
31b6d7f61a6397a5649ab93a070546075d19c7184e8349b5d3925158645bcf0e
RLSA-2020:5393
Important: libexif security update
The libexif packages provide a library for extracting extra information from image files.
Security Fix(es):
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libexif.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libexif packages provide a library for extracting extra information from image files.
Security Fix(es):
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libexif-0.6.22-5.el8_3.x86_64.rpm
e54c3df642c1d98430f783e10d314adeddf2ebab3fdf4a2da274af4a91f9980f
RLBA-2020:5494
virt:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2020:5496
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* update description and summary for container-tools module for 8.3.0 (BZ#1898204)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-podman-api, libslirp, toolbox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* update description and summary for container-tools module for 8.3.0 (BZ#1898204)
rocky-linux-8-x86-64-appstream-rpms__container-tools
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
RLBA-2020:5497
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* update description and summary for container-tools module for 8.3.0 (BZ#1898251)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* update description and summary for container-tools module for 8.3.0 (BZ#1898251)
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLBA-2020:5498
container-tools:1.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm
a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051
RLSA-2020:5500
Important: mariadb:10.3 security, bug fix, and enhancement update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086)
Security Fix(es):
* mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974)
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780)
* mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814)
* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)
* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776)
* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789)
* mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812)
* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009)
* Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017)
* Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021)
* There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for Judy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086)
Security Fix(es):
* mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974)
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780)
* mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814)
* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)
* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776)
* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789)
* mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812)
* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009)
* Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017)
* Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021)
* There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077)
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLSA-2020:5503
Moderate: mariadb-connector-c security, bug fix, and enhancement update
The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases.
The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993)
Security Fix(es):
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922)
* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)
* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Code utilizing plugins can't be compiled properly (BZ#1899001)
* Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005)
* Replace hard-coded /usr with %{_prefix} (BZ#1899099)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mariadb-connector-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases.
The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993)
Security Fix(es):
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922)
* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)
* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Code utilizing plugins can't be compiled properly (BZ#1899001)
* Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005)
* Replace hard-coded /usr with %{_prefix} (BZ#1899099)
rocky-linux-8-x86-64-appstream-rpms
mariadb-connector-c-3.1.11-2.el8_3.x86_64.rpm
7e41a8173ee09b353a8e2052e6802488223928a6d840b765406606930b400d3a
mariadb-connector-c-devel-3.1.11-2.el8_3.x86_64.rpm
9a0ce0a6e724517550bd10188dc247491765bd5ecb774d0b160185951ea4186d
RLSA-2020:5620
Important: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.5).
Security Fix(es):
* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694)
* postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695)
* postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349)
* postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350)
* postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696)
* postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.5).
Security Fix(es):
* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694)
* postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695)
* postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349)
* postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350)
* postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696)
* postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:0507
Important: subversion:1.10 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
RLSA-2021:0531
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for udica, toolbox, python-podman-api, libslirp, oci-seccomp-bpf-hook, slirp4netns, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLBA-2021:0542
virt:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix(es):
* qemu-ga aborts after guest-shutdown command (BZ#1900578)
* Report logical_name for disks without mounted file-system (BZ#1913818)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix(es):
* qemu-ga aborts after guest-shutdown command (BZ#1900578)
* Report logical_name for disks without mounted file-system (BZ#1913818)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2021:0546
container-tools:2.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman exec is fragile in the presence of signals (BZ#1913294)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* podman exec is fragile in the presence of signals (BZ#1913294)
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLSA-2021:0611
Important: xterm security update
The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.
Security Fix(es):
* xterm: crash when processing combining characters (CVE-2021-27135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for xterm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.
Security Fix(es):
* xterm: crash when processing combining characters (CVE-2021-27135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
xterm-331-1.el8_3.2.x86_64.rpm
8629d4e72f706d5517709ad3bda5acb21001ae8d719e4d50edd8e45677061939
xterm-resize-331-1.el8_3.2.x86_64.rpm
15a174cdbba3b93c9dc25350b13385951de4f8bfd22f0732527728a6489d1ab0
RLSA-2021:0705
Important: container-tools:1.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, podman, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6dd42d75d4f30e44823b19c0011e96d12e7a9972c3ca0ef7b95296b7ba60996
containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm
6a01ffb6f9e5a49f1d9a12f96805b972ee1bc063285588823d6ddbe91097f235
containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
2d7b21bc34170a949097b18524d7782c6861ef5f30a25688d01a7cf9d33ab846
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm
2f821bcaa1931a8720ff9287bc99902012b30ed7b49abccfd9fbf0247d32a3d4
oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
25564b8ba026a48fd5d8fd3732e031659959b4f77ab046bf97ce9deebae18db0
oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
58b48c2c5114f34216f7d08bdbbac7c34fba4f4f0bf07cff6de29c9493fdd0f5
podman-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.x86_64.rpm
c2d84d68508ad6a5f13e002fde9bec2a1b8c4b11d90b1ba7a17f20ddaabba31f
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm
da3d39a29dc056a28cbaf89fcfcf16f4a28fed81605d4515be6c790b973a3b4f
skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm
d442cfe02c450c884050053dae511135d68cf824beaf939529edc097081a7afc
slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm
a8907e71606a6cfcd13265ff6388f9073709b7d29a80797e4b8b12d8acd59051
RLSA-2021:0706
Important: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLSA-2021:0711
Important: virt:rhel and virt-devel:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2021:0735
Important: nodejs:10 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.24.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.24.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm
870dbeeaa5f7b37574e9275de98cdf81fe4768b2e22737876605f8fce22d1d4c
nodejs-devel-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm
c3f560c1c3539be8785136e74c3969d7292b4c337141423871baebd523d85d05
nodejs-full-i18n-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm
536c12bcc471e7a975674aa3218f437ff0a4809a85c370211d73636e743586a2
npm-6.14.11-1.10.24.0.1.module+el8.3.0+101+f84c7154.x86_64.rpm
485c30db6030bf7e9220026a983a18c9fc0f551ef4428a43a06bf7e12f40f28b
RLSA-2021:1064
Moderate: virt:rhel and virt-devel:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2021:1242
Important: mariadb:10.3 and mariadb-devel:10.3 security update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32).
Security Fix(es):
* mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for Judy, asio, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32).
Security Fix(es):
* mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLSA-2021:1744
Moderate: sane-backends security update
Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers).
Security Fix(es):
* sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sane-backends.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers).
Security Fix(es):
* sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sane-backends-1.0.27-22.el8.x86_64.rpm
5e51281735365b78c5cbb2bbe580ee627ef9a0ae9ed491a174ac15ed7e1da50d
sane-backends-daemon-1.0.27-22.el8.x86_64.rpm
ceaf43c39768dac95eb46f0c8166d80385b70b64c8f6900324817b15a7aa0490
sane-backends-devel-1.0.27-22.el8.x86_64.rpm
a1898f7f84202652fda3328dd7abd4d6911caf62e4ec05b986b7efaa5aa59d7c
sane-backends-drivers-cameras-1.0.27-22.el8.x86_64.rpm
045035fcd28fbb83cdb665d99a12c262bcf93a7e87a5ab5d99e3bcc0f1bcf762
sane-backends-drivers-scanners-1.0.27-22.el8.x86_64.rpm
ec81145a169e319c4f5c82274b1ea767ccb99c973dbcd485411b6440d7778381
sane-backends-libs-1.0.27-22.el8.x86_64.rpm
c2b80bcdde2d92bd159c033a77ce66cc8d9f95806e9de209b0385687015152f0
RLBA-2021:1750
gcc-toolset-10 bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-10.1-0.el8.x86_64.rpm
b41ee01dd7669723b7e624b20313163c16c5633aa7d28697fb3fa72db8b71591
gcc-toolset-10-build-10.1-0.el8.x86_64.rpm
75a25a624fe30073ba1da3f72beb62f9551eb7c38445413b12b60a277b5b5d4b
gcc-toolset-10-perftools-10.1-0.el8.x86_64.rpm
4c6d56bfe9f684c0ce47de8a93043c9ec80f2a9b7d744437cb2b2483200e4d53
gcc-toolset-10-runtime-10.1-0.el8.x86_64.rpm
1c11a36181256ffb06b52d4113d396f293cfeae3868e24ea1de0aa32c0f4956d
gcc-toolset-10-toolchain-10.1-0.el8.x86_64.rpm
3e9e18f10a85bdd93f24a817f8542eb818dd91aeb8123100575fa003acf19600
RLEA-2021:1755
new module: swig:4.0
The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces.
This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for swig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces.
This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__swig
swig-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm
981d26677e3dda23830d9a31a22c7539f8ebf6475f390baa98cd3bac058bd1cb
swig-gdb-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm
7a5380ac73c17d68a5dc97bb6f0994cc912e393577365c784590b0755da0fa9a
RLBA-2021:1760
libmpc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmpc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libmpc-1.1.0-9.1.el8.x86_64.rpm
4fbf751702394211896af9f253ad2f38c80f603e007a7c9ed2b9c8e5d97f2f95
libmpc-devel-1.1.0-9.1.el8.x86_64.rpm
256386b3cbf600bf2f9652c6ad57f47d5a7eac2125f6839b8348782389e2166f
RLSA-2021:1761
Moderate: python27:2.7 security and bug fix update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)
* python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137)
* python-lxml: mXSS due to the use of improper parser (CVE-2020-27783)
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)
* python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137)
* python-lxml: mXSS due to the use of improper parser (CVE-2020-27783)
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm
6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9
python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
RLSA-2021:1762
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)
* QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821)
* QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443)
* QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947)
* QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092)
* QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707)
* QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723)
* QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916)
* QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)
* QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821)
* QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443)
* QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947)
* QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092)
* QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707)
* QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723)
* QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916)
* QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2021:1765
brltty bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for brltty.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
brlapi-0.6.7-32.el8.x86_64.rpm
e12574dee65b73eb727b9e01f250aa5dda6f37ae78942daf3a7b3093f577bc17
brltty-5.6-32.el8.x86_64.rpm
7a8d74532ca43c68bec2e24920147afd39fbf8f1cb4af2439607de08467a9d96
brlapi-java-0.6.7-32.el8.x86_64.rpm
b6eb6ab93760a709036f0da60c7c2da0b04a2ebc688437f611675024f5e4d852
brltty-at-spi2-5.6-32.el8.x86_64.rpm
7fad2f8c334c754975b00ac6481305ca9cf9a1a80ebe8e12e7a2e32f920fa9be
brltty-dracut-5.6-32.el8.x86_64.rpm
d18672cc32943d29dce0be6c093f255aab4ba4b612dba80c8e7256d32cf0b7ee
brltty-espeak-ng-5.6-32.el8.x86_64.rpm
f8ef16ebeb5f499bb8ba362db96463d6fbc232a14188c3efae23ea6feaae2d78
brltty-xw-5.6-32.el8.x86_64.rpm
57b0c4f00d1a4a54b33808f910b57a29a3d00a6fd935e687a5830cd1249f5ba6
python3-brlapi-0.6.7-32.el8.x86_64.rpm
1f5637a51db2115ff4beaae2634252f34f975843dca3a4d92bf4b820694bb945
tcl-brlapi-0.6.7-32.el8.x86_64.rpm
25f5045a9611b5dadf55e0a53cdda928a83646f164b2959a691e3fcd5b7601e9
RLSA-2021:1775
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
RLEA-2021:1779
libreoffice bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liborcus, libnumbertext.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libnumbertext-1.0.6-2.el8.x86_64.rpm
a297230b7871a750b88dd9575330532e0fc2838a6fd8e7d8029ba41b3fc6e939
liborcus-0.15.4-2.el8.x86_64.rpm
27d2c59c48323cd4c572039cef4f9b81e05942efccc961cd33181196a2d3125b
RLSA-2021:1789
Moderate: gssdp and gupnp security update
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP.
The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928)
Security Fix(es):
* hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gssdp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP.
The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928)
Security Fix(es):
* hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gssdp-1.0.5-1.el8.x86_64.rpm
1140c0c9c62164c69a64b232db2eaca5c7dd1108b68dff7132b272a03c5fc8e1
RLBA-2021:1790
ibus-libpinyin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus-libpinyin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ibus-libpinyin-1.10.0-2.el8.x86_64.rpm
e8de7254d89399e087915d093fef05c3d7cf5c65687022d163dca69a85aeee28
RLSA-2021:1796
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLBA-2021:1799
telnet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for telnet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
telnet-0.17-76.el8.x86_64.rpm
4bf95fac7aa4068028dc381f349f63c0c3778dc88197f1dd53e01ac40a6bd400
telnet-server-0.17-76.el8.x86_64.rpm
f32edb8ceee19d8ba7b45a00c385f9f77c4270bf44afbd8dd286299cee31d95c
RLBA-2021:1801
libgpod bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgpod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgpod-0.8.3-24.el8.x86_64.rpm
4fe6a1855a14fce2d8c15ecfa8f5fbf3bfa75c0e36bb9d520e78153e6b0deb20
RLBA-2021:1802
gnome-bluetooth bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-bluetooth.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-bluetooth-3.34.3-1.el8.x86_64.rpm
4405d99a81e84ec9f506c2d02a2c79c505575f721d5c97f8bf604112c4fea8f6
gnome-bluetooth-libs-3.34.3-1.el8.x86_64.rpm
b61617cb2c800149a772cf9143bb5d8f50961534802606e8513c654dea7ac39c
RLSA-2021:1804
Moderate: userspace graphics, xorg-x11, and mesa security, bug fix, and enhancement update
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips.
The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655)
Security Fix(es):
* xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345)
* xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346)
* xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360)
* xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361)
* xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)
* libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363)
* xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712)
* libX11: Heap overflow in the X input method client (CVE-2020-14344)
* xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libwacom, xorg-x11-drivers, libX11, mesa, libinput, libdrm, libglvnd, xorg-x11-server, egl-wayland.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips.
The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655)
Security Fix(es):
* xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345)
* xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346)
* xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360)
* xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361)
* xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)
* libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363)
* xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712)
* libX11: Heap overflow in the X input method client (CVE-2020-14344)
* xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xorg-x11-drivers-7.7-30.el8.x86_64.rpm
4feb07c0b7dba12f36983fcf2eddfce96c747e61b92cb8833a148ca1ac4fadea
RLBA-2021:1807
gcc-toolset-10-dyninst bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-dyninst-10.2.1-2.el8.x86_64.rpm
3628ca20014ba600e2deef311adf1f3ecaf8b169ea290d3c1755ad6781b2cc37
gcc-toolset-10-dyninst-devel-10.2.1-2.el8.x86_64.rpm
36ec6e021428699304c0fb462d494018b6d8d7da984f0f9e667fb4c32301f224
RLSA-2021:1809
Moderate: httpd:2.4 security, bug fix, and enhancement update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199)
* httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984)
* httpd: mod_http2 concurrent pool usage (CVE-2020-11993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199)
* httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984)
* httpd: mod_http2 concurrent pool usage (CVE-2020-11993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2021:1811
Moderate: libvncserver security update
LibVNCServer is a C library that enables you to implement VNC server functionality into own programs.
Security Fix(es):
* libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247)
* libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839)
* libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397)
* libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405)
* libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libvncserver.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibVNCServer is a C library that enables you to implement VNC server functionality into own programs.
Security Fix(es):
* libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247)
* libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839)
* libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397)
* libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405)
* libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvncserver-0.9.11-17.el8.x86_64.rpm
38ec5ff34fff0a426bd377186afed28a8370441f300af098d5959601147d09e5
RLEA-2021:1813
new module: subversion:1.14
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
RLBA-2021:1821
spice-gtk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-gtk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-glib-0.38-6.el8.x86_64.rpm
8814c47eecaee1eb462199f94515b93833c611c26882e152ee257b84561fda60
spice-glib-devel-0.38-6.el8.x86_64.rpm
b2a4d27b80d27dd2f8ab8f6d3d7de0a8878a0a2bb570e31d5aa635e91fcdad9e
spice-gtk-0.38-6.el8.x86_64.rpm
7285e6a3292af38d0e24d515af5ec6e1976068c7ff14d5af58ac5f7df6568595
spice-gtk3-0.38-6.el8.x86_64.rpm
315f85dd0f0494fb42a94a3e50c518cdbd386dd5908f4b48a38931ab7a3986de
spice-gtk3-devel-0.38-6.el8.x86_64.rpm
498331b3d6a778df41e04336354773e88f2ba3290e41831b2bd61d8b9c41ded8
spice-gtk3-vala-0.38-6.el8.x86_64.rpm
fd440611163373050491b18223548fab12a21cfee52f2f7faba5b3e7fb09064e
spice-gtk-tools-0.38-6.el8.x86_64.rpm
373e38bdff58b36b689e94de258778b07d44f14f84782355d57ec8caa4613cbd
RLBA-2021:1822
perl-Time-HiRes bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Time-HiRes.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
perl-Time-HiRes-1.9758-2.el8.x86_64.rpm
fae5102e437c83981a9c6cc1d957462bd4010e059ccd92d0c1542e6560ef1950
RLEA-2021:1831
gcc-toolset-10-strace bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-strace-5.7-2.el8.x86_64.rpm
43d2c8d98a0bc67d2b039967dd91195256aeec6f5f648b9f7e04d9ad4257ad03
RLEA-2021:1833
mod_security bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_security.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_security-2.9.2-9.el8.x86_64.rpm
0c307e12c65d00832938f7676bf9fc204db744eb8e48f310c4e68081de76dbd3
mod_security-mlogc-2.9.2-9.el8.x86_64.rpm
128c0e3b588c755cef6a9d74bdd9c11825e59a97461e23b94433ddab38d58c45
RLEA-2021:1834
nginx:1.18 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e
RLBA-2021:1837
liblangtag bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liblangtag.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
liblangtag-0.6.2-8.el8.x86_64.rpm
b2f6701fa925b087b454fb00b152cc3adad415d88a9fea28b0c6c401ace72688
RLBA-2021:1838
libcanberra bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcanberra.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libcanberra-0.30-18.el8.x86_64.rpm
4250c90196fa1fd761ad985adfe702647b4a990829e33cd2bce7ad81007b4323
libcanberra-devel-0.30-18.el8.x86_64.rpm
a9ba387d2876731c26bc4ff6b1f0588a29e01026140c4acccaacc68a425386aa
libcanberra-gtk2-0.30-18.el8.x86_64.rpm
9ec58605dea28c7136b0236c5b5424e4cad7aa447a3cb68d4f5564888602f555
libcanberra-gtk3-0.30-18.el8.x86_64.rpm
58d60f6bc91fced10e23f0a37df0111e13e2ec2a652a1a279add5a6e3efa1d35
RLBA-2021:1839
gcc-toolset-10-systemtap bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-systemtap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-systemtap-4.4-5.el8.x86_64.rpm
e54a70603f27c83eeee3ee144153296da6bc730668054187f5ebdaff9e0debdb
gcc-toolset-10-systemtap-client-4.4-5.el8.x86_64.rpm
e664a7166e068b4d3b709249791c6b20b15051277c3083910b1502a01a12cf58
gcc-toolset-10-systemtap-devel-4.4-5.el8.x86_64.rpm
d124fe2423d1228e188491c9bd7056694ebd565b0e51d1a7d0834d802ab5165f
gcc-toolset-10-systemtap-initscript-4.4-5.el8.x86_64.rpm
729435248b1ada8434729f638aad21d44a20d8a87be08562135321b98fa6ad89
gcc-toolset-10-systemtap-runtime-4.4-5.el8.x86_64.rpm
33863b7b3220086746258bafcbfbf167083e8b8c3ad5ef3fc1adc01dde3be385
gcc-toolset-10-systemtap-sdt-devel-4.4-5.el8.x86_64.rpm
7ef4e54e7fa1203cedfee393041404380e0265875b7741aea76f9774327d19d9
gcc-toolset-10-systemtap-server-4.4-5.el8.x86_64.rpm
ca4d199fda08c1e62e16fa7241b51d80bb7dddffad0cb5dd804650c8320dfc88
RLSA-2021:1842
Moderate: raptor2 security and bug fix update
Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples.
Security Fix(es):
* raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926)
* raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for raptor2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples.
Security Fix(es):
* raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926)
* raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
raptor2-2.0.15-16.el8.x86_64.rpm
1a7d901ba0d259189d3b83ebcfa33ee04cae242c19cb181b4bb78eecb0dccebe
RLBA-2021:1845
sblim-sfcb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-sfcb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-sfcb-1.4.9-17.el8.x86_64.rpm
bec650953f943da05bbb7c5a90fe7178c22bc66e6db00e29ceba86089732a1b3
RLSA-2021:1846
Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2021:1848
dconf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dconf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dconf-0.28.0-4.el8.x86_64.rpm
7b50268254a1a308f2ee2dc13783603d8da3a3e4d9723cca8d541007241c59d3
RLEA-2021:1850
jbig2dec bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jbig2dec.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jbig2dec-libs-0.16-1.el8.x86_64.rpm
b203ea84fb770705d42348816339f0b0ddb3c560f7a841dfe05bdfb5fd6640ee
RLBA-2021:1858
sendmail bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sendmail.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sendmail-8.15.2-34.el8.x86_64.rpm
156730e9c4db72ebfaa54b95a87e07bffd94526da024db5dc2f961cfeac0754c
sendmail-milter-8.15.2-34.el8.x86_64.rpm
f02eef48d7b4802656658b8f9819d4a5d67ae1e70d46d05edd9ba2e3923588ab
RLEA-2021:1861
pyodbc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pyodbc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pyodbc-4.0.30-2.el8.x86_64.rpm
db4d19f991a354d7c95135bd0ebdbf85b54294a154c87ba75dc929d799ae1227
RLBA-2021:1863
icedtea-web bug fix and enhancement update
migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for icedtea-web.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java
rocky-linux-8-x86-64-appstream-rpms
icedtea-web-1.8.4-4.el8.x86_64.rpm
feaac8dd236c1cb26df3883f0a87cda23e6adf12a883130ccb4bd258038f34ec
RLEA-2021:1869
new module: postgresql:13
PostgreSQL is an advanced object-relational database management system (DBMS).
This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLBA-2021:1871
perl:5.30 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl
perl-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
be39133cd5aa9bfd0ce8ff6128a31858f7907ce317762fd852affb340341cfaa
perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpm
69eb78e36fdb6b427100912d45b923db19c5b95051a4f58ada6a8b09ed6245b6
perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
ed229dccbc0b92ac2a641e672a1b62281cb7887ad180cf0eb7bf70a72d8190e8
perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
70b3d3861ab9c1695c9bd398d4bd822fed4f52f843ccb34d987b1c72fb6f6190
perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
49c68243eaf5e3faabd356adf782356365c8538ebd80a0d262625e13d8ec5b16
perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm
847b4fb0ddf80554f9db4f306d9b404f77ff15198af23e1afe2abf866e91117f
perl-devel-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
585f8362cf74ed848f3445bed0952f343ac30d51ae393244d5eed738adcadc7e
perl-Devel-Peek-1.28-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
067cf2dc67c1e9c5a402034ec3b340e886228a66c99ae15b785109c57ff94161
perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
1da6e17c67943d6d69e57ebd15f72bfa43b6015870fdd338c76b117b2be9f67f
perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm
11b390ba9933b7bb4409320ba870c4463a78dd6f74d9a3773124415e97e75f9f
perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpm
457f4f13f74cb7f2c75a3dcce9ae34a32fca4c4e8eb786635c5fa71fa9005c91
perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpm
4193813e5c230e8a603babedc74c2ea14a0d56fb4072b9623069c9c4df5000b3
perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
7acf6021827fa52dc9a1fcebcb239d23d9096de93e0a6132f0fe4fd541f3f1f2
perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
4189d9a4acaa4add86f0991f50f74e444b59afb872b205e444480c428e247eaf
perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
5e8ac50accc1d9281fedfb67c5f38066ac8d9e1237e1d7cc7fbef1e973fb89fb
perl-Errno-1.30-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
6638a5f0666fb87c5a1b13ca99bd76fdcc01f29f8709d206655e62ea694afcd9
perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
c8ba40590e844230d1f154071d9e092cb479fa4993a8352a0d9c7b3ed9764e01
perl-interpreter-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
02d644ab73c948161e823d1c6944f52564dc8d06ecd73bba0b9957295350387d
perl-IO-1.40-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
1b5f6a564f11bdb4ceeef49e03cc7b9e8ba622b99a3f74bbda31653a1bbdb1ec
perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm
d9b9704b3035ec259ed3e1f9312e9349ceddc090d395acf2dc8534ed8d7e6524
perl-libs-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
6a2d197b52df3e9e8d372ddb5735269efeda9c3915a22818b5877593cd957617
perl-macros-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
a00992fdb69978b36a93933ab608b73c31c23ad22477d71e2f6a6cd50f576ab6
perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
c9c30db84c6c619216fdef1298196c00adb7b76175f550228155a7269ee03217
perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpm
ce753739b5103c9621175e6efb82cb858ba857acfcc7390543eab398ae508ff3
perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm
658be4f88cf5a7b34961bebac1c752e2ffccf124d804dac560e872be550ca38f
perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
8f5fb9d385661011819dde62c803ea841a5ef174e9fdb8fc1d63ca226e6f2bcf
perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
19c9476b75c247420525ff36ad321453c46d0262305cad01bfd0eea652a70093
perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpm
b60d7dc5e566fbe0b9282e1f90b628d86d87f6e7c091290737cddea24d9bdc1b
perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpm
b7f894a292d6278b60fb5754d1ed5ad9d199c8f84d140f47dbeb260d6a3eaa35
perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpm
693af6f1dd797f1bfcfa11d8dc1ea0334d5739f84f7b69e05cf0e168d7627359
perl-tests-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
3b5e10bdb757229457125f796ffa71dfbaf8635a4ad4cc218b91fce7a0ecfe3f
perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
2e5b2999050f52a5be6078a7024fa2d8696471958b37582c6ae57f869b22b247
perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm
e95a1149d05da0bdfc99db4a561b0ffee93dd2d670951b8bf9e9f0bcd867473c
perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
c32bff30e752a3efa107b8a0d0a6758e720770d895c642fbd8434f86f54ef46e
perl-Time-Piece-1.33-452.module+el8.6.0+878+f93dfff7.x86_64.rpm
0983e9e7fb85c4ce71777a0205c985ed57df8a543f13cb4ed349f9fd8fdb62c1
perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
329b8a55fd6c40d52610e15f55037edc8395d682ed5ceca6611930c6ec0c80fb
perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpm
641de0fcef19c0f7ab506f797d92584ac6c17d3f1335d5fa6fb0d515c8220612
perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm
96805b92a1012403138db9d46d761fcafc05517684b5ff73a5ccfbf75edb0d59
RLBA-2021:1878
squid:4 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLSA-2021:1879
Moderate: python38:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)
* python-lxml: mXSS due to the use of improper parser (CVE-2020-27783)
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python38, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, python-ply, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)
* python-lxml: mXSS due to the use of improper parser (CVE-2020-27783)
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
RLBA-2021:1880
mod_fcgid bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_fcgid.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_fcgid-2.3.9-17.el8.x86_64.rpm
96b06bcbf7c919d7860e97fdee65d347132301964163b676678f0edd3b06dd96
RLEA-2021:1889
libfprint bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fprintd, libfprint.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fprintd-1.90.9-2.el8.x86_64.rpm
6491c1b1a2cf6143b8fa443bef28504be7be0503f6e3c9dc8a55ca79065c2c5d
fprintd-pam-1.90.9-2.el8.x86_64.rpm
1efdd9068c4be78be4a38ad0f81d2f7a7655b4275a3cc9b7bd63fdda1451ef21
libfprint-1.90.7-1.el8.x86_64.rpm
028164883c21054399e9240cfc0367a4ec61ff4b86801066ee110951b78afc06
RLBA-2021:1892
source-highlight bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for source-highlight.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
source-highlight-3.1.8-17.el8.x86_64.rpm
0e196806afe493edb18aa1a760819f175f69d698f5c748bab3f5c9dd9984e20b
RLEA-2021:1893
new module: mariadb:10.5
MariaDB is a multi-user, multi-threaded SQL database server that is binary
compatible with MySQL.
This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary
compatible with MySQL.
This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLBA-2021:1895
libgovirt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgovirt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgovirt-0.3.7-4.el8.x86_64.rpm
545a6b1e83548cbcc04f46b3109ade9651b99c4c1cb7f0061c42e716d370aebc
RLBA-2021:1899
gcc-toolset-10-gdb bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.4 Release Notes.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-gdb-9.2-4.el8.x86_64.rpm
72a19b8ae9245f67865cd410b7d5f357756735b86ea8b2287eeee52dd737b561
gcc-toolset-10-gdb-gdbserver-9.2-4.el8.x86_64.rpm
c9cba6cf5dc0e84a17356ec5200c135b2d03ef5a5b68288b3de0fbc2e1a39087
RLEA-2021:1900
memkind bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memkind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
memkind-1.10.1-1.el8.x86_64.rpm
6e14104dcc6708e2351d57b77f26893e44c23e35b33cdf05078fe46c42524d9d
RLBA-2021:1902
uuid bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for uuid.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
uuid-1.6.2-43.el8.x86_64.rpm
f1e86f91c8e650975437970e0c91d0bf5c398eee60b6e0905400d65823ae17e8
RLBA-2021:1903
pulseaudio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pulseaudio, twolame.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
twolame-libs-0.3.13-12.el8.x86_64.rpm
029e7f5810df21c2da415b3c5a0a0732f5cdf2c185f82ae756706775913bd2c8
RLEA-2021:1906
libyang bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libyang.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libyang-1.0.184-1.el8.x86_64.rpm
a18b82afa4780f61864a7cd2bd28a7bc870964039c91ee5a429fae5626178eae
RLBA-2021:1911
container-tools:2.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLBA-2021:1912
ilmbase bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ilmbase.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ilmbase-2.2.0-13.el8.x86_64.rpm
4d46f7970d6415e15081a9f22f3d9afebc7467b373d8bbcd1d9704c236a3cc00
RLBA-2021:1913
SDL and gstreamer bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for SDL, gstreamer1-plugins-base, gstreamer1-plugins-good.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gstreamer1-plugins-base-1.16.1-2.el8.x86_64.rpm
080de6123569b64faac1939ca663245bf7099e20974ca0c59ad7aa92ba870bae
gstreamer1-plugins-base-devel-1.16.1-2.el8.x86_64.rpm
fb49590c7cca49cf399a894fe5093e9e4077164cf97b706451498e6217814b31
SDL-1.2.15-39.el8.x86_64.rpm
9ed4e04c21f25fae0421f47c9334a5d58b123708004650b7817a3f5a6c8124c9
SDL-devel-1.2.15-39.el8.x86_64.rpm
39b8c51c2ad75b19a80ff692a5c73a3717f47748cd82caf03a0a4b3a74f37bbb
RLBA-2021:1914
libsmi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libsmi-0.4.8-23.el8.x86_64.rpm
48ede3425a13595c69ab1ec38b0ab3acb192b4da13173886b1b2b933f6c782bf
RLBA-2021:1915
gpm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gpm-1.20.7-17.el8.x86_64.rpm
9576114888fa8c265da2bedc5de8789e3d5edc597d4ef6963354c72a46ef9839
gpm-devel-1.20.7-17.el8.x86_64.rpm
da9cdd5ac686e1edbca85896c9507ef04eb92e9d9c57b43e6eec4541fb4de34d
gpm-libs-1.20.7-17.el8.x86_64.rpm
9a1109ffb7ae23caa6a6776f2d5fe0b11b452a3779c9edc157c9dbaebd2a7987
RLBA-2021:1917
tang bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tang.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tang-7-6.el8.x86_64.rpm
ee9ae1dc56ca1d5b38b35add16d02f318dacf13c6957f8b02f1124b55e2049b0
RLEA-2021:1919
new module: python39:3.9
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
RLSA-2021:1924
Low: spice security update
The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.
Security Fix(es):
* spice: Client initiated renegotiation denial of service (CVE-2021-20201)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for spice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.
Security Fix(es):
* spice: Client initiated renegotiation denial of service (CVE-2021-20201)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-server-0.14.3-4.el8.x86_64.rpm
0b42ed068415f6f6755f7d7efbfdcb6f7f15d59d1a9a837df2d6bc5b1552be38
RLBA-2021:1930
python36:3.6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python36
python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
fe5acf5b333e19f8028820c4fdc9736984d0e79466cc28d1605dbc766f3942a0
python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
1d3f8a8f08584719452bea07bd3790bd3a282b39842f25f5bd9f40acffe1e97c
python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
284c71458cac84d2f339a1438ec01395f82d9f54935d0479274f5bb3882f913f
python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm
f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d
RLBA-2021:1933
mod_auth_openidc:2.3 bug fix update
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_auth_openidc, cjose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc
cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06
cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102
RLBA-2021:1936
scap-workbench bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for scap-workbench.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
scap-workbench-1.2.0-8.el8.x86_64.rpm
dbc084d9736353c535f44d800926704fbcd69953e841cf010a525332b1386e74
RLBA-2021:1937
protobuf-c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for protobuf-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
protobuf-c-1.3.0-6.el8.x86_64.rpm
f3a99aed36ada0451b36b9682ef6b6d07f790d4cc157bf13e8d3c04856b7c489
protobuf-c-compiler-1.3.0-6.el8.x86_64.rpm
08916c494c2a4b29608e6ebe1d70f8960df4065c1ba0d80c4c45f3fcbec61348
protobuf-c-devel-1.3.0-6.el8.x86_64.rpm
4c57f3d2a16b8aab617e5e52087b065eb3955c14b1acf36e7aebe8d24e9d0b9f
RLBA-2021:1939
libosinfo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libosinfo, osinfo-db, osinfo-db-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
osinfo-db-tools-1.9.0-1.el8.x86_64.rpm
adc8c8996f88803b72ac5fc2325714318a2b2f03a22c77f4cc8d4e7797609e0f
RLBA-2021:1943
crash-trace-command bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crash-trace-command.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
crash-trace-command-2.0-18.el8.x86_64.rpm
9998511793ac0e78c4972e891317b0bab2a10d4dd5c7a65a0a991726490e3c07
RLBA-2021:1951
new module: container-tools:3.0
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLEA-2021:1955
jmc:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jmc, ee4j-parent, jaf, HdrHistogram, lz4-java, owasp-java-encoder, directory-maven-plugin, jmc-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__jmc
lz4-java-1.7.1-14.module+el8.4.0+394+13a3c723.x86_64.rpm
9bb5f1fde802c20380728f69ca4c08d6279caa11f65a801c7347095d5687c31c
RLSA-2021:1979
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLSA-2021:1983
Important: idm:DL1 security update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:2259
Important: nginx:1.18 security update
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e
RLSA-2021:2290
Important: nginx:1.16 security update
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee
nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20
nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55
nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904
nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f
nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462
RLSA-2021:2291
Important: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLSA-2021:2360
Important: postgresql:9.6 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (9.6.22)
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for postgresql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (9.6.22)
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgresql-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
0b1c99a3e81edc34c35bcce7ac55f6db1876fd0fe74d04258e3f9703810165b9
postgresql-contrib-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
e524c0629c6d38353c7da4ba6bfeaed2c82a39a5e1024fb9425c578d60e4c93c
postgresql-docs-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
88df40af56e602aad0cd0ccff1891e214c7f252b061d1adcf8e75033d3daacee
postgresql-plperl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
0109c22adfb0829ee7967550f1500a5101504890e82ff63ceec7ada1a8d0d0d6
postgresql-plpython3-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
020f1729ea269e28a16781d3666fcc0d6b0a4bbb9ac725ae84300cc7b049ec12
postgresql-pltcl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
8de17b6cb46b1d1a3aa5bc6842728e4e57da3a23175d3a8596a0cfc48c55a7db
postgresql-server-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
c76ddbe828fec9fe1a71bb618dc2a6b705e01782c6845081fe78ae45debb4aa8
postgresql-server-devel-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
323b8b1c3f0f5b6790ce6e710859aefeda899a2195b72086eea50bc32e300c5d
postgresql-static-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
120a9aaf53b223981e347dc1fd215de958a1b5279fc78c061093d07d5afb5cdf
postgresql-test-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
11897a3ba65c0e88aa99c4502c19f94bc91db7124f5d60388d31ac996ebf9719
postgresql-test-rpm-macros-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm
25ac98b62c359b013fba2af6bf95ce9ef44d1ee87611b2a92af9a526e2ceacff
RLSA-2021:2363
Important: gupnp security update
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
Security Fix(es):
* gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for gupnp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
Security Fix(es):
* gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
gupnp-1.0.6-2.el8_4.x86_64.rpm
99156c05f5915a79b954b5a4e6d5d38b65d7c455f9a66af27e036a35635570cc
RLSA-2021:2370
Important: container-tools:3.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLSA-2021:2371
Important: container-tools:rhel8 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: vulnerable to symlink exchange attack (CVE-2021-30465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3af0efabcac69789ce47fab592ecc29899095fcc2be8f8a6201db544376bc188
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLSA-2021:2372
Important: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.7)
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
* postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029)
* postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.7)
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
* postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029)
* postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:2375
Important: postgresql:13 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.3).
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
* postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.3).
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027)
* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028)
* postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:2583
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm
74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
RLSA-2021:2584
Moderate: ruby:2.7 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999)
Security Fix(es):
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999)
Security Fix(es):
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000)
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
RLSA-2021:2587
Moderate: ruby:2.5 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626)
Security Fix(es):
* ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
* ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201)
* ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
* rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
* ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
* ruby: HTTP response splitting in WEBrick (CVE-2019-16254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626)
Security Fix(es):
* ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
* ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201)
* ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
* rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
* ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
* ruby: HTTP response splitting in WEBrick (CVE-2019-16254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
RLSA-2021:2588
Moderate: ruby:2.6 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627)
Security Fix(es):
* rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881)
* ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
* ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201)
* ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
* rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
* ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
* ruby: HTTP response splitting in WEBrick (CVE-2019-16254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627)
Security Fix(es):
* rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881)
* ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
* ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201)
* ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
* rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
* ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
* ruby: HTTP response splitting in WEBrick (CVE-2019-16254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968)
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm
2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a
rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm
b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df
RLBA-2021:2592
idm:DL1 bug fix update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984)
rocky-linux-8-x86-64-appstream-rpms__idm
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:3020
Important: ruby:2.7 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
RLSA-2021:3061
Moderate: virt:rhel and virt-devel:rhel security and bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754)
* hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504)
* QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617)
* QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416)
* qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301)
* Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754)
* hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504)
* QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617)
* QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416)
* qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301)
* Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2021:3070
container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLSA-2021:3075
Low: libuv security update
libuv is a multi-platform support library with a focus on asynchronous I/O.
Security Fix(es):
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libuv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libuv is a multi-platform support library with a focus on asynchronous I/O.
Security Fix(es):
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libuv-1.41.1-1.el8_4.x86_64.rpm
1a1e44d7537433919bdf760fe9a2bb545720b7d054706e5c3871cca3b40f0f31
RLBA-2021:3083
gcc-toolset-10-valgrind bug fix and enhancement update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
Bug fix(es):
* incorrect pkgconfig virtual provides in devel packages (BZ#1968378)
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-valgrind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
Bug fix(es):
* incorrect pkgconfig virtual provides in devel packages (BZ#1968378)
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpm
eaee7045eb86911441e2ca185719dac4846cf6761b34b1cd4503e66276f0b650
gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm
4b0fc0732a44b410281e4ebb01b853a5ae5b49173e876bfba3064ea2a42410d3
RLSA-2021:3590
Moderate: mysql:8.0 security, bug fix, and enhancement update
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)
Security Fix(es):
* mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)
* mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)
* mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)
* mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)
* mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)
* mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)
* mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)
* mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)
* mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)
* mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)
* mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)
* mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)
* mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)
* mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)
* mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)
* mysql: Server: Options unspecified vulnerability (CVE-2021-2146)
* mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)
* mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)
* mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)
* mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)
* mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)
* mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)
* mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Segfault and possible DoS with a crafted query (BZ#1996699)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mecab-ipadic, mecab, mysql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)
Security Fix(es):
* mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)
* mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)
* mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)
* mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)
* mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)
* mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)
* mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)
* mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)
* mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)
* mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)
* mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)
* mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)
* mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)
* mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)
* mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)
* mysql: Server: Options unspecified vulnerability (CVE-2021-2146)
* mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)
* mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)
* mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)
* mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)
* mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)
* mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)
* mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Segfault and possible DoS with a crafted query (BZ#1996699)
rocky-linux-8-x86-64-appstream-rpms__mysql
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
RLBA-2021:3593
gcc-toolset-10-elfutils bug fix update
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
Bug fix:
* The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
Bug fix:
* The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013)
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm
f64e85941a97279c482bbd079fbd153255a348556053cf6e40b7b1abea70c7bf
gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm
fbf71de210a57662e2215e22fe634b8822b0533020a47c1f6615e0e50b9c2e66
gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm
47103bfcc834e8d9585ea457e023013726ea8fd98bfb6cc9ab1003ac9df38925
gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm
20d78a08fcad187ce1fe69bdb260016abe2cfc43d6fe882099adfc1c11cb4b55
gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm
b27fdaf713c099c491534f785cc4418944976ced9ace65c6a1b4cfdc64441000
gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm
06e63e0c75d6871db6259dca49854a356e43dfc658de0edfb41b193111939565
gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm
769e4bb8af44477862465592d22f364ae865f1f7cd86bf005b0a2e304ce20765
RLBA-2021:3661
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLSA-2021:3816
Important: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438)
* httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438)
* httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2021:3918
Important: redis:5 security update
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
* redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for redis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
* redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__redis
redis-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm
07ed98eddf06d6cf89b3b44f3d2437fb863fb94b8366cb76e071ee3949d87eab
redis-devel-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm
88dc345660dcc3b1735cf173bdbee0cab0259caa738f353d60ebd210ce021a88
RLSA-2021:3945
Important: redis:6 security update
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
* redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for redis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
* redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__redis
redis-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm
4eef6a7e2f37e49feb209a59bf02823274ca392247433e04dc4d20f43a1990cd
redis-devel-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm
23152bf30dc357235e82eeaf7c6e53ea18f2e50f7bc3b9eaa1d38f99fa160a90
RLBA-2021:4093
container-tools:3.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fixes:
* kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245)
* 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264)
* [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fixes:
* kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245)
* 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264)
* [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLBA-2021:4094
idm:DL1 bug fix update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Dirsrv memory leak (BZ#2003607)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Dirsrv memory leak (BZ#2003607)
rocky-linux-8-x86-64-appstream-rpms__idm
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:4150
Moderate: python36:3.6 security and bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270)
* python-pygments: ReDoS in multiple lexers (CVE-2021-27291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270)
* python-pygments: ReDoS in multiple lexers (CVE-2021-27291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python36
python36-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm
cc13e57ac650df29ee9ed66c0dac505cfbde741608604acfd60ff5ed455b3687
python36-debug-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm
43b88c0a96a9906b7aded4fbfd2d2bf4de6b1753dd6e0e84faec8106a66cab1c
python36-devel-3.6.8-38.module+el8.5.0+671+195e4563.x86_64.rpm
a9a046234a026579a675db98b8dc5a2dc0d354897b6f749a2264f097eb6a42a6
python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
fe5acf5b333e19f8028820c4fdc9736984d0e79466cc28d1605dbc766f3942a0
python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
1d3f8a8f08584719452bea07bd3790bd3a282b39842f25f5bd9f40acffe1e97c
python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.x86_64.rpm
284c71458cac84d2f339a1438ec01395f82d9f54935d0479274f5bb3882f913f
python3-scipy-1.0.0-21.module+el8.5.0+671+195e4563.x86_64.rpm
496d5d8cfad3f4edb2251e0515c299893db4792d67cab28efc43d45d251b8f79
python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.x86_64.rpm
f63c913823a0770c0274bd82ae33cb31ad9d48f6e81fa0d88153c08b2158c23d
RLSA-2021:4151
Moderate: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-pygments: ReDoS in multiple lexers (CVE-2021-27291)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-pygments: ReDoS in multiple lexers (CVE-2021-27291)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm
6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9
python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
RLSA-2021:4154
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
* containers/storage: DoS via malicious image (CVE-2021-20291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
* containers/storage: DoS via malicious image (CVE-2021-20291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLSA-2021:4160
Moderate: python39:3.9 and python39-devel:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Information disclosure via pydoc (CVE-2021-3426)
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Information disclosure via pydoc (CVE-2021-3426)
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57
python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
RLBA-2021:4163
mariadb-connector-odbc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mariadb-connector-odbc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mariadb-connector-odbc-3.1.12-1.el8.x86_64.rpm
77f9ed66d4c10737a40f1dfe9d25177eae63e27d168d41e92b823d15840d636a
RLBA-2021:4167
socat bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for socat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
socat-1.7.4.1-1.el8.x86_64.rpm
12653938d941afafbaa7fedd576fea5ad9a69124b5003aef196b8b5d26154747
RLBA-2021:4170
libreoffice-voikko bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libreoffice-voikko.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libreoffice-voikko-5.0-6.el8.x86_64.rpm
68c67ec0e50e488c398f5470f9528c4851f615beb1549f1aaaa5d09ea61b1dba
RLSA-2021:4179
Low: file-roller security update
File Roller is an application for creating and viewing archives files, such as tar or zip files.
Security Fix(es):
* file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for file-roller.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
File Roller is an application for creating and viewing archives files, such as tar or zip files.
Security Fix(es):
* file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
file-roller-3.28.1-4.el8.x86_64.rpm
774249365a784f0f1ddec77ece69c5f945aea411d0fb82fe80f35b95e0f5ca61
RLBA-2021:4180
evolution, evolution-data-server, evolution-ews bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evolution, evolution-ews, evolution-mapi, evolution-data-server.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evolution-3.28.5-18.el8.x86_64.rpm
52099aaa38d080cab8e5ad7d2752560f444e7f9eebb0c9d2a7e04e0ee4125e1a
evolution-bogofilter-3.28.5-18.el8.x86_64.rpm
cc6330c94c49457a8d2f56b3cb453baa7f287c820d88772368121fe3652ffdcc
evolution-pst-3.28.5-18.el8.x86_64.rpm
3a8b77dd43293eaeccf413117992e0695e74c9aa6ff31edf4bc5253effdc9f98
evolution-spamassassin-3.28.5-18.el8.x86_64.rpm
a493ffbbaa757d8dcff030bfc959f5d9ee6c4fc92caf48dcb0385e4144f8d858
RLSA-2021:4191
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595)
* libvirt: Insecure sVirt label generation (CVE-2021-3631)
* libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594)
* QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595)
* libvirt: Insecure sVirt label generation (CVE-2021-3631)
* libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLBA-2021:4193
rsyslog and its related dependencies bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rsyslog, libfastjson, librelp, liblognorm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
librelp-1.9.0-1.el8.x86_64.rpm
c6fc1c283dfd3d98e337bc9e4dfa643c53657c0fec5515713ba75fdac61842f8
libfastjson-0.99.9-1.el8.x86_64.rpm
427188c6f09a570c668cee4e22ab62832788c6f6c6a99d07126466308e04f13a
liblognorm-2.0.5-2.el8.x86_64.rpm
bc00a8717bbea75b192e417e9cbf3525f9ccd6dd328de5f49f883dabf8c686a7
liblognorm-doc-2.0.5-2.el8.x86_64.rpm
25face4c27d1c40f02b3738653637a107a64b7360f5c91d3d84e69172da02e2a
RLBA-2021:4195
powertop bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for powertop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
powertop-2.14-1.el8.x86_64.rpm
729ffc74c690fbbff0b6e3f9ceee824079f3e70fe5d5f29a079eb606332821e5
RLBA-2021:4196
libgweather bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgweather.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgweather-3.28.2-4.el8.x86_64.rpm
4c69a5c6bd5a4e3cfacce7a740228f49cf1ae41c28511ade87c1f12b9eb032f9
libgweather-devel-3.28.2-4.el8.x86_64.rpm
04206eb4ee259438d53647ee5b8281a4f5330fac03f12ba6952a23613587f61c
RLBA-2021:4212
mailman bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mailman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mailman
mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm
b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3
RLSA-2021:4213
Moderate: php:7.4 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110)
Security Fix(es):
* php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069)
* php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071)
* php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068)
* php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070)
* php: NULL pointer dereference in SoapClient (CVE-2021-21702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110)
Security Fix(es):
* php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069)
* php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071)
* php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068)
* php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070)
* php: NULL pointer dereference in SoapClient (CVE-2021-21702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLBA-2021:4216
xorg-x11-font-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xorg-x11-font-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xorg-x11-font-utils-7.5-41.el8.x86_64.rpm
afd2b72c9233ef3489cdc0c47125bd19ccd8f93cf4ff0bd2f60213d3e6c22e53
RLBA-2021:4217
stratis-cli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for stratis-cli, stratisd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
stratisd-2.4.2-2.el8.x86_64.rpm
512ed0de3294b1af949e2af690f45b72ad1a8f2e19472b1dac715058d308a8b6
stratisd-dracut-2.4.2-2.el8.x86_64.rpm
ead1ebd70d475ea2caf5ce0c19f03d66ad818ee36fc044fb137c1ce759b7162e
RLBA-2021:4218
udftools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for udftools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
udftools-2.3-2.el8.x86_64.rpm
98bdda0c742d835d9875a0b6da1453a13ae1b63c1ab35bce343898029bca5c4b
RLBA-2021:4219
libinput and libevdev bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libevdev, libinput.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libevdev-1.10.0-1.el8.x86_64.rpm
5a7495b56a09a76c54ad5fce64f6adbeda62d1cc6bd0accce4c9386ac9bff4fb
RLBA-2021:4220
xapian-core bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xapian-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xapian-core-1.4.18-3.el8.x86_64.rpm
53e29be7231b6ebf376f7c89e6d654597c4931af8dd219787cb9ac630da69d3b
xapian-core-libs-1.4.18-3.el8.x86_64.rpm
31cb47e61ca8961dde64cd276b4e991594462e0ac63e3054263f617fd04fd3d0
RLSA-2021:4221
Moderate: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm
2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLSA-2021:4222
Moderate: container-tools:3.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLBA-2021:4224
libwacom bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libwacom.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libwacom-1.6-3.el8.x86_64.rpm
289ee5b010e498d615a969b48e600668c2351bd34b2e2908b24fc57d827494a9
RLBA-2021:4228
rshim bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rshim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rshim-2.0.5-2.el8.x86_64.rpm
97e027fb20b53d88f4943792d036df6a87be61e8c2e5360c617b349bb115ba83
RLEA-2021:4229
google-noto-emoji-fonts and pango bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for google-noto-emoji-fonts, pango.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pango-1.42.4-8.el8.x86_64.rpm
481dc7c787260e8d261cd4f7d7499105def3a3a64835e4f7f4ed6ab0ddf92723
pango-devel-1.42.4-8.el8.x86_64.rpm
2782d37b80b2e47d284ec7395f60a3bcbb77edf63f1f4ead25ad1b2dccd464c4
RLBA-2021:4230
ipa bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:4231
Moderate: libwebp security update
The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.
Security Fix(es):
* libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009)
* libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010)
* libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012)
* libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013)
* libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014)
* libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330)
* libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331)
* libwebp: excessive memory allocation when reading a file (CVE-2020-36332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libwebp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.
Security Fix(es):
* libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009)
* libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010)
* libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012)
* libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013)
* libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014)
* libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330)
* libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331)
* libwebp: excessive memory allocation when reading a file (CVE-2020-36332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libwebp-1.0.0-5.el8.x86_64.rpm
f3a9a91ed62713359b0255f51c68185ac36426fbe542469c22fcf709df97bfad
libwebp-devel-1.0.0-5.el8.x86_64.rpm
274e1428df907f6f75a7093330bb69359132f90e1398978b3cc5b282db668d23
RLEA-2021:4234
mesa and related packages bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xorg-x11-server-Xwayland, libepoxy, wayland, wayland-protocols, libdrm, xorg-x11-server, egl-wayland.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libepoxy-1.5.8-1.el8.x86_64.rpm
fa45b6c15f3a168ecb19032e0e2321541e1ac5bc8775d28491889b32696332bd
libepoxy-devel-1.5.8-1.el8.x86_64.rpm
f3df3fb27f03617cca795772e3d8450ec6347161fcae7af29676f18b7b60ac73
libwayland-client-1.19.0-1.el8.x86_64.rpm
f8be8d0b50f23d997f7643d9dba4d149a1b29f26c61ce6bb85f8b136cb2265d7
libwayland-cursor-1.19.0-1.el8.x86_64.rpm
2d9e5c9557e076c1730c407955d4959668bf72c1b33f257ba240a221e19daea9
libwayland-egl-1.19.0-1.el8.x86_64.rpm
22c6e952f8edce3aaf3dd0caaf3c2544b4cae56a0f0bc11c47ae9263c935cd6f
libwayland-server-1.19.0-1.el8.x86_64.rpm
81752663a48a83b6251f80cbbc8f49e19032cbdb2452a83647034f2a372e259b
wayland-devel-1.19.0-1.el8.x86_64.rpm
7641020d95b21798a2bea97e7cd1676d4637229d58dd129a7d9be11d4133d4a5
RLSA-2021:4235
Moderate: jasper security update
JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard.
Security Fix(es):
* jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828)
* jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272)
* jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926)
* jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jasper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard.
Security Fix(es):
* jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828)
* jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272)
* jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926)
* jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jasper-libs-2.0.14-5.el8.x86_64.rpm
5830d55c1e5a8b07c706d339f3deb917c7d0a4364160859ccbd59044315ca93c
RLEA-2021:4239
pki-core bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
RLEA-2021:4242
new packages: gcc-toolset-11-dwz
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-dwz-0.14-2.el8.x86_64.rpm
414ba44d288436081a409b4e578b86c1f284347262b45f47cc0fe4c07af80bf9
RLBA-2021:4244
dwz bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dwz-0.12-10.el8.x86_64.rpm
d4682e21463097454b01d788a980f13c2377cdc5f757d6a446c30ed1061ba00c
RLEA-2021:4246
cmake bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cmake.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cmake-3.20.2-4.el8.x86_64.rpm
9d21c01f081a4b8f553192a92fe4d5fcf48530fe318383c12d8b2b78114b81e5
cmake-filesystem-3.20.2-4.el8.x86_64.rpm
d7d94d53b80ea0fca0c7c6af95e71260daf4fb15240928d201d8c0aa6f1455eb
cmake-gui-3.20.2-4.el8.x86_64.rpm
e67e49c592112e86feb8459cd94ed0c5e31428a9bf87bd0fe7413863c330bf08
RLSA-2021:4256
Moderate: graphviz security update
Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains.
Security Fix(es):
* graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for graphviz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains.
Security Fix(es):
* graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
graphviz-2.40.1-43.el8.x86_64.rpm
2be0fa27c439694487dacbb62531a62dd1d0fd76b5c145c5f9fc810708b73287
RLSA-2021:4257
Moderate: httpd:2.4 security, bug fix, and enhancement update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690)
* httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690)
* httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLBA-2021:4259
new packages: gcc-toolset-11-dyninst
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-dyninst-11.0.0-2.el8.x86_64.rpm
52aa51970a45cb360d40b51fc6950ac1d378f03f7e441f3302847fb4a0416b23
gcc-toolset-11-dyninst-devel-11.0.0-2.el8.x86_64.rpm
892e60f0d4b29630fa5239a1c9d88c344c4cbd697bae563cf5a06bb9347d14cc
RLBA-2021:4263
new packages: gcc-toolset-11-valgrind
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-valgrind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-valgrind-3.17.0-6.el8.x86_64.rpm
22e3c8bb50f033855ffbb6f0a0cd5584ad40c22096494a26e73921a9f311e957
gcc-toolset-11-valgrind-devel-3.17.0-6.el8.x86_64.rpm
4fa4a361e3a93cd0f3167f9c3c324001858ab8647df00d1654dd80b89b52f132
RLBA-2021:4274
new packages: gcc-toolset-11-ltrace
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-ltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-ltrace-0.7.91-1.el8.x86_64.rpm
440eb2bf1e4b352c859409c520a72ec4afa00268b06a568a952766dc1ed61470
RLEA-2021:4275
postgresql:12 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLEA-2021:4276
postgresql:13 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLBA-2021:4279
new packages: gcc-toolset-11-make
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-make.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-make-4.3-2.el8.x86_64.rpm
580e8e84640ba2dccd1fbc460b3c2581c1d6ccfd130a29e427590785dbc244bd
gcc-toolset-11-make-devel-4.3-2.el8.x86_64.rpm
44e8f297fa2de647b81fdb7e54560792707abe9c3c3721ee9d4a7b93a804acc2
RLEA-2021:4282
new module: ruby:3.0
This enhancement update adds the ruby:3.0 module to Rocky Linux 8.
(BZ#1938942)
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the ruby:3.0 module to Rocky Linux 8.
(BZ#1938942)
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
RLBA-2021:4285
libvoikko bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libvoikko.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libvoikko-4.1.1-3.el8.x86_64.rpm
5c7ee590aa167c204857ef2e994e26be9c8ac3b74a0a5907dbb266fdddedc00f
voikko-tools-4.1.1-3.el8.x86_64.rpm
b0f7a35b787c63187c9175d9435a7773bf9d1911543fa6e3769191347017f150
RLEA-2021:4286
lpsolve bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lpsolve.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lpsolve-5.5.2.0-21.el8.x86_64.rpm
e476606c04389d6be46b60f23064e4f60ebf06df3686442956f9a3c078911d45
RLSA-2021:4288
Moderate: libjpeg-turbo security and bug fix update
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libjpeg-turbo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libjpeg-turbo-1.5.3-12.el8.x86_64.rpm
71a9f44edce13938e9fb1557ec88d9d923fe2ea547fdb3cb0926489d04e93c01
libjpeg-turbo-devel-1.5.3-12.el8.x86_64.rpm
777786c85899f62d57f0cb029424e4b6cd928de19aea0cd7ecf369a7353b245a
libjpeg-turbo-utils-1.5.3-12.el8.x86_64.rpm
8f7e075b1ddbff3238735af3cb79ed0883dd1a8b7c2a35afb473d4507d707a4e
turbojpeg-1.5.3-12.el8.x86_64.rpm
0a042fe31a447a3204ffa910a05cec647e16d7952f7f19d32a8e24aa2680bd2e
RLEA-2021:4289
sblim-gather bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-gather.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-gather-2.2.9-24.el8.x86_64.rpm
fc460831084b0f087a10aa0011b5c7ee044622bcb040a401a4e0e8cb77e508d5
RLSA-2021:4292
Moderate: squid:4 security, bug fix, and enhancement update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384)
Security Fix(es):
* squid: denial of service in URN processing (CVE-2021-28651)
* squid: denial of service issue in Cache Manager (CVE-2021-28652)
* squid: denial of service in HTTP response processing (CVE-2021-28662)
* squid: improper input validation in HTTP Range header (CVE-2021-31806)
* squid: incorrect memory management in HTTP Range header (CVE-2021-31807)
* squid: integer overflow in HTTP Range header (CVE-2021-31808)
* squid: denial of service in HTTP response processing (CVE-2021-33620)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384)
Security Fix(es):
* squid: denial of service in URN processing (CVE-2021-28651)
* squid: denial of service issue in Cache Manager (CVE-2021-28652)
* squid: denial of service in HTTP response processing (CVE-2021-28662)
* squid: improper input validation in HTTP Range header (CVE-2021-31806)
* squid: incorrect memory management in HTTP Range header (CVE-2021-31807)
* squid: integer overflow in HTTP Range header (CVE-2021-31808)
* squid: denial of service in HTTP response processing (CVE-2021-33620)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLBA-2021:4298
pyparted bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pyparted.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pyparted-3.11.7-4.el8.x86_64.rpm
78e4ef6771cb8ef1d187a15434b7063d4e95f83fc84a924085dd879494670473
RLBA-2021:4307
ipmitool bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipmitool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ipmievd-1.8.18-18.el8.x86_64.rpm
6f60b773a641fd698637567c687565d7c0f61c8012b102beebdfc19733677a58
ipmitool-1.8.18-18.el8.x86_64.rpm
4499de1e8f15fb44c99a77be0b38f895522b39f21a0c2ea503338f7055984bde
RLBA-2021:4311
varnish:6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for varnish, varnish-modules.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__varnish
varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
b9e50c31d639d02ea7ac7dfd44542da1eb99e9e500ff67d94cd101de8939fb2c
varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
a8db537b818eb564f557f5c29fcbae4d49c524380c6dfbd3d863dcafcea915d4
varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
67d172546cc350ba9674f91c3a1cd72149280cddff3ad7851ead00923b1378f6
varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm
9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e
RLBA-2021:4313
python-ldap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-ldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-ldap-3.3.1-2.el8.x86_64.rpm
721a8e6a717b034e306d1b21ffb2d3c6d9f175bd27c818e3a25d3ea416e410a1
RLSA-2021:4316
Low: zziplib security update
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for zziplib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
zziplib-0.13.68-9.el8.x86_64.rpm
b14f7c6ee1108658863a2c7254d5c2e1829fa9ee54c13ad089854f7d42e14c2d
zziplib-utils-0.13.68-9.el8.x86_64.rpm
fe43deb8bc190c8a2a423b7a5621122b253abe8459dbe4d78d767c3b1cc04a81
RLBA-2021:4318
apr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for apr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
apr-1.6.3-12.el8.x86_64.rpm
23636f805dc36996a57264a872409dd6c1ef9150dfa02dca7b2fa0a6016ce46b
apr-devel-1.6.3-12.el8.x86_64.rpm
3e1190a514704461ab4528e39d1abb2da8be8e23327c822791750a4ba864cc5b
RLSA-2021:4324
Moderate: python-psutil security update
psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python.
Security Fix(es):
* python-psutil: double free because of refcount mishandling (CVE-2019-18874)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-psutil.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python.
Security Fix(es):
* python-psutil: double free because of refcount mishandling (CVE-2019-18874)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-psutil-5.4.3-11.el8.x86_64.rpm
93541c8c1475fbd127831e367cbf33db3c0881499f84ff19b057d1d64af12c6c
RLSA-2021:4326
Moderate: libX11 security update
The libX11 packages contain the core X11 protocol client library.
Security Fix(es):
* libX11: missing request length checks (CVE-2021-31535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libX11.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libX11 packages contain the core X11 protocol client library.
Security Fix(es):
* libX11: missing request length checks (CVE-2021-31535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libX11-1.6.8-5.el8.x86_64.rpm
66600448091b07b90d26aad07eef05f65693d5ede2d1272c7d5b75a07b2deaa2
libX11-devel-1.6.8-5.el8.x86_64.rpm
2e1561f3442cfafcae05e05640156a198cfaa3509df21a931f9ae945b51f7040
libX11-xcb-1.6.8-5.el8.x86_64.rpm
8aba2186142e2053bb7e06f871ba1fd5b71e4822ef2e6d8f8d7dcabe250e5302
RLBA-2021:4327
perl-GSSAPI bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-GSSAPI.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
perl-GSSAPI-0.28-25.el8.x86_64.rpm
4c8d266e4446421ac55fdf9fa865f8c3603a67d45473f93926c2543d8c2f1cf8
RLBA-2021:4328
scrub bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for scrub.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
scrub-2.5.2-16.el8.x86_64.rpm
55f4085d7fae3b814497e5a3a380c91667e4e124099432e36032927d3fa643a0
RLBA-2021:4329
jmc:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jmc, ee4j-parent, jaf, HdrHistogram, lz4-java, owasp-java-encoder, directory-maven-plugin, jmc-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__jmc
jmc-8.0.1-4.module+el8.5.0+676+5f023c1e.x86_64.rpm
bd544cc77d0049e0a4f0781b8b45f79d1fdfe7ff83a95ec4c03b980892140c98
lz4-java-1.7.1-14.module+el8.4.0+394+13a3c723.x86_64.rpm
9bb5f1fde802c20380728f69ca4c08d6279caa11f65a801c7347095d5687c31c
RLEA-2021:4335
tesseract bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tesseract.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tesseract-4.1.1-2.el8.x86_64.rpm
7e804dcc73b5431686744c78849dd6abe1906a3a2d947143cd04cc22e11bcec1
RLBA-2021:4337
numpy bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-numpy-1.14.3-10.el8.x86_64.rpm
88426273e627094ce60d92e2f38d7d8e7a24d64f5e09ba5cd30ddc7aa4d03d0f
python3-numpy-f2py-1.14.3-10.el8.x86_64.rpm
26f0c3b1f51b2806a59e14b7f03c97a80d3420c80b3aeabb5ccc94f2520bc2d5
RLBA-2021:4338
python-coverage bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-coverage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
platform-python-coverage-4.5.1-9.el8.x86_64.rpm
2440743216f1852078cab6ac55e74643d943ba61b58f1df96677ac6c68ae328c
python3-coverage-4.5.1-9.el8.x86_64.rpm
508eb87fcf60df12f9b13ffa9bbf3c5159e90478a343d519e47aef4858818529
RLSA-2021:4339
Moderate: grilo security update
Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements.
Security Fix(es):
* grilo: missing TLS certificate verification (CVE-2021-39365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grilo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements.
Security Fix(es):
* grilo: missing TLS certificate verification (CVE-2021-39365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
grilo-0.3.6-3.el8.x86_64.rpm
406faa8be9d8e3cecbdb5d88224218bc8064a1ba7c0232000e18e516e394825d
RLEA-2021:4345
pcm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pcm-202107-5.el8.x86_64.rpm
92ae3ce4eda9c08e467fbdd8c8f41056ca9e78500a631407a8028f726648b02d
RLBA-2021:4348
brasero bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for brasero.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
brasero-3.12.2-5.el8.x86_64.rpm
b44d64dd22fb33e76e2e1d190be29a9ae36a78fcf4089ea35f5ba60b3376f9b2
brasero-libs-3.12.2-5.el8.x86_64.rpm
932ab06fe910ca25148f898c4fdfe8cb862a0101f13407012498b2231552dae9
brasero-nautilus-3.12.2-5.el8.x86_64.rpm
b4cfeaf97a50976c95f4a3f7de0c394acd5b20598d9dc38c25227cf97044d9fa
RLSA-2021:4162
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-psutil: Double free because of refcount mishandling (CVE-2019-18874)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python: Information disclosure via pydoc (CVE-2021-3426)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-psutil: Double free because of refcount mishandling (CVE-2019-18874)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python: Information disclosure via pydoc (CVE-2021-3426)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029
python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae
python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm
74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
RLBA-2021:4533
ibus bug fix update
The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems.
Bug fix:
* Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems.
Bug fix:
* Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064)
rocky-linux-8-x86-64-appstream-rpms
ibus-1.5.19-14.el8_5.x86_64.rpm
d640b203a5d7f39666096bd8f6431de2754458602329d3ad9e0cdda2149127a3
ibus-gtk2-1.5.19-14.el8_5.x86_64.rpm
17fb91d21b32c0eafce99b60fc54f24908f5296dbf505f5d865cf0c8478f4d2b
ibus-gtk3-1.5.19-14.el8_5.x86_64.rpm
d6616deb0b59c7ffb51448f8970150cc2569882c1a796770734a1f54a4209a22
ibus-libs-1.5.19-14.el8_5.x86_64.rpm
55ec665058ffe34aebd18ce73c6f723a7653a852f4e5f6bf8290a3d1e0048e5d
ibus-wayland-1.5.19-14.el8_5.x86_64.rpm
bd1554851ebce67c9961e0d1dfa0a847f8aad00fb24993ef8ba0dc384b5a206a
RLSA-2021:4537
Important: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2021:4585
Moderate: gcc-toolset-10-gcc security update
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)
The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters:
This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters.
There are three levels of warning supported by gcc:
"-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.)
"-Wbidirectional=none", which turns the warning off.
"-Wbidirectional=any", which warns about any use of bidirectional characters.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gcc-toolset-10-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)
The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters:
This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters.
There are three levels of warning supported by gcc:
"-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.)
"-Wbidirectional=none", which turns the warning off.
"-Wbidirectional=any", which warns about any use of bidirectional characters.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-gcc-10.3.1-1.2.el8_5.x86_64.rpm
7540704c3174809261e03b7d7097217feb9f86a4c86140a4652566bcede4fbc3
gcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.x86_64.rpm
f3a6e586abf184a36ae0cebb2e25a7c3fb30b9a7cf66107c7c81939bbee76bc3
gcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.x86_64.rpm
f0f5e192cad7b410e5b12dde407b68fd42cbcb92aee3c4701ecf2eb07db7afd6
gcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.x86_64.rpm
225c5cd4667683d1b04d3a8ddcfc294ec0d4c5c0a16c4f56c4dd2da8b1ed0c8a
gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.x86_64.rpm
78c0a8ba02a1769d00a7fd8467d37b102c6735e83db543ebcc5ff0ac5b89a6be
gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.x86_64.rpm
b4134855699223e24c2653af1eb983a60ba445c1bd565bf84fc6931f46b5b926
gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5.x86_64.rpm
47ff618b2d2a9c2a984c9cc41f39ac203fd42d0f2c9c4ff1d2e1453dde3369f6
gcc-toolset-10-liblsan-devel-10.3.1-1.2.el8_5.x86_64.rpm
bfea9c7e7c421f7bf3dfe32906e4dfffcbc40a1533e3c1ca769e74fcf6031dc6
gcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5.x86_64.rpm
167bf467d120ca7d903ae0b7d452291073cdeb99ac106ca5286ffe60390d797f
gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.x86_64.rpm
2f60776c2c62359175409514403a7159949660820ed10c89c6936b47e319a852
gcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.x86_64.rpm
4986f05abecf7adafb7d3a7eaf2f895bf4832416ea56a008e5dfb231d0f0ca04
gcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.x86_64.rpm
eb951d4a541f5c80632df6ca914cc7f1dcc30b494559f7f1f4e73f52aea5daf2
gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.x86_64.rpm
d4b17d92538129104ce44e190628d899cc1298da157c28ae4304f99ddd1bda94
RLBA-2021:4604
httpd:2.4 bug fix update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Bug Fix(es):
* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Bug Fix(es):
* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856)
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2021:4826
Important: mailman:2.1 security update
Mailman is a program used to help manage e-mail discussion lists.
Security Fix(es):
* mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097)
* mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for mailman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mailman is a program used to help manage e-mail discussion lists.
Security Fix(es):
* mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097)
* mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mailman
mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm
b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3
RLSA-2021:4916
Important: mailman:2.1 security update
Mailman is a program used to help manage e-mail discussion lists.
Security Fix(es):
* mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for mailman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mailman is a program used to help manage e-mail discussion lists.
Security Fix(es):
* mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__mailman
mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm
b2620ae197434bb1a14a9ea7f5957d5f5cc990dda426bd38dfc469db4019cef3
RLSA-2021:5142
Moderate: idm:DL1 security update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2021:5235
Moderate: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.9).
Security Fix(es):
* postgresql: memory disclosure in certain queries (CVE-2021-3677)
* postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.9).
Security Fix(es):
* postgresql: memory disclosure in certain queries (CVE-2021-3677)
* postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:5236
Moderate: postgresql:13 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.5).
Security Fix(es):
* postgresql: memory disclosure in certain queries (CVE-2021-3677)
* postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.5).
Security Fix(es):
* postgresql: memory disclosure in certain queries (CVE-2021-3677)
* postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2021:5238
Low: virt:rhel and virt-devel:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930)
* QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930)
* QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2022:0258
Important: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2022:0323
Important: nginx:1.20 security update
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030)
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030)
Security Fix(es):
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
8b9098490e0ed579ef134c2c7e9e47fae539d6d5242e50d33138965f578345cc
nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
22ac42d3d46d47b8a58587447b601e7609f0f66c75346558c7075201e24c1b47
nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
d906cd3b87784901f32f1ad92120afc85c8b21d9dec7f08c1a0f5ce95a217256
nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
38f76d35fd980728308e94451574909e04fc39cecdbcdb9e0db195cfa2101bbc
nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
7e8970264c09a96068a63b604e536a5e9c36636d45352158be17327f1fa8a3f7
nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
7d251e53fa3837429092951a3d2fb89c1439ac9798ae72a0f7ee86dc2548c75f
RLBA-2022:0348
container-tools:3.0 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
RLEA-2022:0352
container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
RLBA-2022:0361
virt:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2022:0418
Important: varnish:6 security update
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for varnish, varnish-modules.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__varnish
varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
b9e50c31d639d02ea7ac7dfd44542da1eb99e9e500ff67d94cd101de8939fb2c
varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
a8db537b818eb564f557f5c29fcbae4d49c524380c6dfbd3d863dcafcea915d4
varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpm
67d172546cc350ba9674f91c3a1cd72149280cddff3ad7851ead00923b1378f6
varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm
9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e
RLSA-2022:0441
Important: aide security update
Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions.
Security Fix(es):
* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for aide.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions.
Security Fix(es):
* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aide-0.16-14.el8_5.1.x86_64.rpm
cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa
RLSA-2022:0543
Important: ruby:2.6 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm
2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a
rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm
b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df
RLSA-2022:0545
Important: ruby:2.5 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
RLSA-2022:0643
Important: python-pillow security update
The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817)
* python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python-pillow.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817)
* python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pillow-5.1.1-18.el8_5.x86_64.rpm
c3b196ec79ed44cbba9c193e5da4687349ed47692644581fa5028742c74ff5fc
RLSA-2022:0672
Moderate: ruby:2.5 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
* ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
* ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
RLSA-2022:0886
Moderate: virt:rhel and virt-devel:rhel security update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized
systems.
Security Fix(es):
* QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized
systems.
Security Fix(es):
* QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2022:0891
Moderate: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)
* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)
* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2022:1049
Important: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2022:1556
Moderate: mariadb:10.3 security and bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543)
Security Fix(es):
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514)
* MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532)
* Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533)
* Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543)
Security Fix(es):
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514)
* MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532)
* Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533)
* Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550)
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLSA-2022:1557
Moderate: mariadb:10.5 security, bug fix, and enhancement update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546)
Security Fix(es):
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515)
* mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524)
* Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546)
Security Fix(es):
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515)
* mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524)
* Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542)
rocky-linux-8-x86-64-appstream-rpms__mariadb
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
RLBA-2022:1561
idm:DL1 bug fix update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Error replacing a replica with CentOS Stream 9 (BZ#2062404)
* reinstalling samba client causes winbindd coredump (BZ#2065719)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Error replacing a replica with CentOS Stream 9 (BZ#2062404)
* reinstalling samba client causes winbindd coredump (BZ#2065719)
rocky-linux-8-x86-64-appstream-rpms__idm
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2022:1563
virt:rhel and virt-devel:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized
systems.
Bug Fix(es):
* KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized
systems.
Bug Fix(es):
* KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239)
rocky-linux-8-x86-64-appstream-rpms__virt
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
RLSA-2022:1565
Moderate: container-tools:3.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
RLSA-2022:1566
Moderate: container-tools:2.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm
f05e3a5804bc41a2cbe15e7dd640a8b1f466adb07480ac7090f9e125f180d54a
buildah-tests-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm
75c858735e75051b96c44ac94a357625b3459f31c4714ced8fe9b7be74b2e235
conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
8eea523ee80d672368f00dc4e8ba738e41348861907f959d3b0faae90bdc5da8
containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
64c38316265764e308c43ca0a377128b6c4c4fec43af3519ba7b560e87ccf501
containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
ff96311c068918572299d74c8bcd914d766d0ad8d6691d398a27356db9fd72ed
crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
c6e23a8f551bd494e6e447e239eb193df92ca05a63aeb133fbe6948b637dd645
criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fdc15dc04f2bbbac461e0c20c01c826fa68b2494865febca2ac3924a4773034f
fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
36393bb9bd46c2e6a76efd928c52295f90866a848a0da9fbcee58e3727b08ad6
podman-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm
2bb6b433aeffad66524fee9505a40bbe68e2caccb3210657ed8c8da6fee1e276
podman-remote-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm
bc4b311ff224a47fcbdbb1e270c032aafc2705b1312e96b5dc45b2b45aacc364
podman-tests-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm
f77b5368ea0054f95286a0d27bcd7867bb9e793de93550f8a956403c02c79ea7
python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
8b0c7d5d7a8ca1bbd46bf6871102decfed58281de4a5f229186f707d18ba3c22
runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpm
2b69e5454c7b790f76e59d46c5ad05b7078dcea944992b0034c2aa23d4cbbfd2
skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
50632fcbdb02b63bfeb14a901bb8a3630fc0abe673cdec80761d4f2903f3f3f3
skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
8cfac1296143127ad506ce2ae6896bf89688a766f2d909d614c3b2ed60b645c6
slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
5a5eb9f4776dafb77c665ebbde602c5d62e3efba0e995686e9dba3cf6b3332b4
RLBA-2022:1761
gcc-toolset-11-gcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-libasan-devel-11.2.1-9.1.el8.x86_64.rpm
8c531bddbe5c1e180d660086855220b674d590560b3fe16bdcf5bec6c03565cd
gcc-toolset-11-liblsan-devel-11.2.1-9.1.el8.x86_64.rpm
7ea82f68a26c5141760207388077e010f4588b4f9b70355062d551a7a960a902
gcc-toolset-11-libquadmath-devel-11.2.1-9.1.el8.x86_64.rpm
d55d5364205ac1921cf4aa34f0366fcdbb1af4df4a24cea8bf6ae24776568dcb
gcc-toolset-11-gcc-11.2.1-9.1.el8.x86_64.rpm
55b7a4d78981bdaa96e1714d261c6d0cc5765d33b99601e6dd1910af466ece5e
gcc-toolset-11-gcc-c++-11.2.1-9.1.el8.x86_64.rpm
dab6a4db71182b486a96d0fdd8d00d9f8fb79950de4dd7e3a9fb2a5c550e6c31
gcc-toolset-11-gcc-gdb-plugin-11.2.1-9.1.el8.x86_64.rpm
bbadb1f377705308377525bda83d4670fbfef3aa9349ff8247a73c6858c11cbf
gcc-toolset-11-gcc-gfortran-11.2.1-9.1.el8.x86_64.rpm
50bbacaef62a786cf61e2953a9dd545b43196bd4fe5f85578be6ca2a46ca27a2
gcc-toolset-11-gcc-plugin-devel-11.2.1-9.1.el8.x86_64.rpm
e85a7a32d6fa3bc19b04bb8794efc10deacc41a2e1ecef5d0f46727886b5a743
gcc-toolset-11-libatomic-devel-11.2.1-9.1.el8.x86_64.rpm
0e931bbc87d9727198466655485c6d3a7245ed4b1d17e6d4fb554645c33791c1
gcc-toolset-11-libgccjit-11.2.1-9.1.el8.x86_64.rpm
e13a692af85fafbdd5b6c998a780a99c43ee8d4818b8fa6bc354f25be6d1820f
gcc-toolset-11-libgccjit-devel-11.2.1-9.1.el8.x86_64.rpm
5832a93871a5901f23a9fdb1238e06a5f92d0ba2a065076755af6432aaef904e
gcc-toolset-11-libgccjit-docs-11.2.1-9.1.el8.x86_64.rpm
a55a1e9b527968edae0d9c1837fbd0d8150d2647ee2a43a9e8937628d0665f2d
gcc-toolset-11-libitm-devel-11.2.1-9.1.el8.x86_64.rpm
de730760d63d865954eb6d526717a8d5ca5242905dafaf1cd8b5710e88eb2c1d
gcc-toolset-11-libstdc++-devel-11.2.1-9.1.el8.x86_64.rpm
dacb6447df8255683e9f59207e25eb1d3d0a623d338bf643d30f43827399545d
gcc-toolset-11-libstdc++-docs-11.2.1-9.1.el8.x86_64.rpm
14683e54880445a43df79bb23fc77e5d4b8d5c99c05da399f82a6348f25eb46d
gcc-toolset-11-libtsan-devel-11.2.1-9.1.el8.x86_64.rpm
b66e5ba1f658b4496922a4bc5d5860fc05195a1c8e04d8fff7fcf9640d6125fd
gcc-toolset-11-libubsan-devel-11.2.1-9.1.el8.x86_64.rpm
5b4d8b23fb0a11f41583725ee2c7b3bcbde1eecd19108e38628e2d1b7bf731b0
libasan6-11.2.1-9.1.el8.x86_64.rpm
4d7f7522004e9f9ade90c1bda34985df154802745e64820e8b5ff0fca25b18d7
RLSA-2022:1764
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860)
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860)
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpm
7867930af945070f981bdaa8645a2cbabe1c20d36c2afd88a03cec102bfef2cd
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029
python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae
python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm
74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
RLBA-2022:1770
evince bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evince.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evince-libs-3.28.4-16.el8.x86_64.rpm
fb8c9b16a783e917de4cbedd8f687777b790874348c8a818c26e43b9946b1026
evince-3.28.4-16.el8.x86_64.rpm
4b89edf257c0c87227a5dcea0e42852933bc381cabd0b85117f819cc47abd048
evince-browser-plugin-3.28.4-16.el8.x86_64.rpm
d772b8a7820f4606899ae37f2ea1ca79d3a8e6f66c8a18801470b572616a22e0
evince-nautilus-3.28.4-16.el8.x86_64.rpm
4de0dd97df1d0379eeac86c9fd9731bd67b67b0f9c295a9f37d8a2c1f6d2badc
RLBA-2022:1789
certmonger bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for certmonger.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
certmonger-0.79.13-5.el8.x86_64.rpm
9a594693b16cc0399de587c611d818d10c15fc5321b99c3bec7bc8c725360f3d
RLBA-2022:1790
libpinyin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpinyin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpinyin-2.2.0-2.el8.x86_64.rpm
f7cc05cac86c98616dc9f56207505c2e980f7bd0feba15a5007056e7f8c65478
libpinyin-data-2.2.0-2.el8.x86_64.rpm
e4d105f0edecc9ef1b34463a0ad865cc4ec4a2be853820cfd277f0f1452eeaa4
libzhuyin-2.2.0-2.el8.x86_64.rpm
3bc4c86c897dac5e0aa555966bd9abccf88cb3e8aed5f3d1a9306b47604e1545
RLBA-2022:1794
libmemcached bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmemcached.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libmemcached-1.0.18-17.el8.x86_64.rpm
b01aa0dec0396ea605e5e144b56b26ac5ab6c5f512fe8c26af4e95cc2fe74fd1
libmemcached-libs-1.0.18-17.el8.x86_64.rpm
79f88c46d4fc83d343996e1959c868674ff4542061026f0278702808ee4d4aa9
RLBA-2022:1800
accountsservice bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for accountsservice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
accountsservice-0.6.55-4.el8.x86_64.rpm
111ac52115876ea83896c95c7fc1d4885ef7916bfccc1c67cc9ae5c3ac1f2aad
accountsservice-libs-0.6.55-4.el8.x86_64.rpm
caf042716f9d89983e8d36a58f3d48ed8d0d30e02871e160fdff59e59b17084e
RLSA-2022:1801
Moderate: gfbgraph security update
GLib/GObject wrapper for the Facebook Graph API that integrates with GNOME Online Accounts.
The following packages have been upgraded to a later upstream version: gfbgraph (0.2.4). (BZ#1997941)
Security Fix(es):
* gfbgraph: missing TLS certificate verification (CVE-2021-39358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gfbgraph.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib/GObject wrapper for the Facebook Graph API that integrates with GNOME Online Accounts.
The following packages have been upgraded to a later upstream version: gfbgraph (0.2.4). (BZ#1997941)
Security Fix(es):
* gfbgraph: missing TLS certificate verification (CVE-2021-39358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gfbgraph-0.2.4-1.el8.x86_64.rpm
a87c20bff6e5d12e128387db8895f77c29aecac5b482e7231f2b406409156147
RLBA-2022:1818
libnotify bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnotify.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libnotify-0.7.7-6.el8.x86_64.rpm
b77107b01be0756468f03b12b034843555134ff13043edfc9e0e4ff1a048cd99
libnotify-devel-0.7.7-6.el8.x86_64.rpm
0a3e2b1920bcf1cc6cb537d4365d32e4e11d85b7a484eff139d61156db594de5
RLBA-2022:1822
ibus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ibus-1.5.19-14.el8_5.x86_64.rpm
d640b203a5d7f39666096bd8f6431de2754458602329d3ad9e0cdda2149127a3
ibus-gtk2-1.5.19-14.el8_5.x86_64.rpm
17fb91d21b32c0eafce99b60fc54f24908f5296dbf505f5d865cf0c8478f4d2b
ibus-gtk3-1.5.19-14.el8_5.x86_64.rpm
d6616deb0b59c7ffb51448f8970150cc2569882c1a796770734a1f54a4209a22
ibus-libs-1.5.19-14.el8_5.x86_64.rpm
55ec665058ffe34aebd18ce73c6f723a7653a852f4e5f6bf8290a3d1e0048e5d
ibus-wayland-1.5.19-14.el8_5.x86_64.rpm
bd1554851ebce67c9961e0d1dfa0a847f8aad00fb24993ef8ba0dc384b5a206a
RLSA-2022:1823
Moderate: mod_auth_openidc:2.3 security update
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786)
* mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791)
* mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792)
* mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mod_auth_openidc, cjose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786)
* mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791)
* mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792)
* mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc
cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06
cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102
RLBA-2022:1827
librdkafka bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librdkafka.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
librdkafka-0.11.4-3.el8.x86_64.rpm
a4b09561b1efb5a87696b0604671810e62aeca4dcd470ec07b9f0e4c0f677b19
RLBA-2022:1829
virt-viewer bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-viewer.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
virt-viewer-9.0-12.el8.x86_64.rpm
c8ab81e91ad618ba06c071cd61b6445eff11083e644705ae4cbaf2c0738ff7d5
RLBA-2022:1834
pesign bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pesign.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pesign-0.112-26.el8.x86_64.rpm
60dc0388fc7f3541b208ef7084efa30bf0aae086a5874efaf751cab420bd4b8e
RLBA-2022:1838
nss-pam-ldapd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nss-pam-ldapd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nss-pam-ldapd-0.9.9-5.el8.x86_64.rpm
1c7a0729e994b202a859ea9c573239de2e6f62ff4a20c907d5e7f626e8b3d313
RLSA-2022:1842
Moderate: exiv2 security, bug fix, and enhancement update
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422)
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for exiv2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422)
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
exiv2-0.27.5-2.el8.x86_64.rpm
cfc76de579f2e1df9d8f0a31087465508607573be2a4b0955dae956b542ce538
exiv2-libs-0.27.5-2.el8.x86_64.rpm
6b50be335ac80aa78e50ecd8a69564ea80b5a0cee93e48b74f5061c7d4e390c6
RLBA-2022:1855
mesa and related packages bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdrm, libglvnd, mesa.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libglvnd-glx-1.3.4-1.el8.x86_64.rpm
b01e2356538e6d15e2eb5b21902e6ed0b400186bac257c2d13a2b5cc9d2ad4c6
libglvnd-1.3.4-1.el8.x86_64.rpm
f1163ceb211495b2a91499a2141c16733e43d7c66693e32d22fd820149258df0
libglvnd-core-devel-1.3.4-1.el8.x86_64.rpm
42500c9215dd43b4e96fc7e43647dfa84b9da8733ae83dadbbe261bac9861c63
libglvnd-devel-1.3.4-1.el8.x86_64.rpm
b4ca66f315566cde4f6937b8c22f44326ec74e330807658fd83b0b1aa47ba5af
libglvnd-egl-1.3.4-1.el8.x86_64.rpm
2ef9230943c2926f32bf154b8e658fffcc0d688581c7336501b28b959f21bab6
libglvnd-gles-1.3.4-1.el8.x86_64.rpm
233c89561015a077d8233167b5ae05346ae76c8bc01a8b60cbd21a24c0c44f40
libglvnd-opengl-1.3.4-1.el8.x86_64.rpm
09abf13b00e3ed08ee9c785a6387b55ae1104c93e9d27797d6ace76080bbc4e1
RLBA-2022:1868
freeradius:3.0 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freeradius.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__freeradius
freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
1e8b3b99d9fc3b5342025649b5896806e159286d54e6904a98791df010bef14f
freeradius-devel-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
70f19035db8bc4a89bc155e860276414d9458861c130acf2c11c13f86b3b91c1
freeradius-doc-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
f3c8b43ec991aa6dc7edc64348c8a23e8bff4adba392b62707d9b44199ba430e
freeradius-krb5-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
27b16326b6c4650e7e0c33027b2fadb02f4a10311f13afc38eab9d5d7cf5b556
freeradius-ldap-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
2ad0a32f55c4eddd09aac0c5185a7e88ef5fe062df601c07925b50ef93a367ec
freeradius-mysql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
a9af343bd4e84800c15760b58c83f2a161756dd1df1b8fe5fa825b02e2ea9089
freeradius-perl-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
8485e5f25b08399e5bd292fb848281c058edfbe9b4b8e5f569cd8f12e8e0ac09
freeradius-postgresql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
02fd34ed5aac035cf2bbe5e520c79be88ff0432b89b7dcdb60fb611c807c1680
freeradius-rest-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
4c341c6244c5fa2d45b62da76cd4dc23c6cbe3b32d0f42722486960f3d767f33
freeradius-sqlite-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
c6a11c1d56dd96e69867d49c91a1bd1ed95d429ebca2e5a63b9f7487a6a4aeb6
freeradius-unixODBC-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
d1c7b7b0d12278c9ac2aa57a4e9a5fa87c49e2840458cf10542f3b0416c3e198
freeradius-utils-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
d72976b00fbf0c97038a8951eea8444e2dd9cdc9e583bd873ec87dfd7cab6977
python3-freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpm
e3ef89fceddc589a575ade624e50f9da072396c0b860ef217d5b166b1ebbb45b
RLBA-2022:1871
corosync bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for corosync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
corosynclib-3.1.5-2.el8.x86_64.rpm
7849214cea901afad69a3246b2548cf903ba9714faeb24bdbec52342fe78ac48
RLBA-2022:1872
gcc-toolset-10-binutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-binutils-2.35-11.el8.x86_64.rpm
23f870f3c02d15a65fcdbd64c5090f526ca6ddb157ac297e2c914d0d1bc25231
gcc-toolset-10-binutils-devel-2.35-11.el8.x86_64.rpm
5c4e4cb0067ea909a4a0fa13385cc9978afffdc01f2a7c5c55ba42bf5ccc7262
RLBA-2022:1873
gcc-toolset-11-binutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-binutils-2.36.1-2.el8.x86_64.rpm
e4de3c87cb5ed806dbe98810514d659919aa53d371e56ade88f03f412a25cbbb
gcc-toolset-11-binutils-devel-2.36.1-2.el8.x86_64.rpm
3e2ac4ad76bdbe5c9c1f39fd49ee626211d9e58282b188ee2464f9b75324986f
RLSA-2022:1891
Low: libpq security update
The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers.
Security Fix(es):
* postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libpq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers.
Security Fix(es):
* postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpq-13.5-1.el8.x86_64.rpm
871c6b4ca25f1c2d48340cf813ea64a4f100249f6b5826bc2a9b1d1d375831fe
libpq-devel-13.5-1.el8.x86_64.rpm
59f455a4b0422a4618ca16c3e22854c86fd67e80e1c79a0887d678e909e2c677
RLBA-2022:1895
libecpg bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libecpg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libecpg-13.5-3.el8.x86_64.rpm
a4e29a1002f40223c0380a1fd3a6257f4a9f76b97cd17641afe19a564f219a93
libpgtypes-13.5-3.el8.x86_64.rpm
2fdebefb15fc6e9104d0008a93f0e914a853c7a4806e4132395b21cda066d823
RLBA-2022:1899
spamassassin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spamassassin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spamassassin-3.4.6-1.el8.x86_64.rpm
9e5317a0af1ce3815d80fbb4604e16d7ecb8bd9deeff0167ad037ac5ac004e46
RLBA-2022:1905
gcc-toolset-11-gdb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-gdb-10.2-5.el8.x86_64.rpm
507fd1b65448322eb4f7be5b9bc505287e1c57ef187a4547c687f517e70e8968
gcc-toolset-11-gdb-gdbserver-10.2-5.el8.x86_64.rpm
4672600d290a3509945c9330e81420f0ad327bd98da8cb23f68d12fd53c83274
RLBA-2022:1922
mdevctl bug fix and enhancement update
The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdevctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel.
rocky-linux-8-x86-64-appstream-rpms
mdevctl-1.1.0-2.el8.x86_64.rpm
c9b7910936d7fabc88c66452df359e90494a2d3ebc7f0ba8bb07ecc66c7cd9a5
RLBA-2022:1927
mozilla-filesystem bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mozilla-filesystem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mozilla-filesystem-1.9-19.el8.x86_64.rpm
dd82ce2bc279b2c69a478f85b58431ffa2c4b152f9a2751c6553b8ac3532fc05
RLSA-2022:1935
Moderate: php:7.4 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Local privilege escalation via PHP-FPM (CVE-2021-21703)
* php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Local privilege escalation via PHP-FPM (CVE-2021-21703)
* php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLBA-2022:1937
gcc-toolset-11 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-11.1-1.el8.x86_64.rpm
e09d7949c64eebf62003d85a59868b567fbde7b2237bcceaa14a3149b303d2d5
gcc-toolset-11-build-11.1-1.el8.x86_64.rpm
1025dd8704d707157905fed44971dc96e2893698b993b94db993ee2ec971b761
gcc-toolset-11-perftools-11.1-1.el8.x86_64.rpm
d32231d4a47739e03ce4fc39394d26413e5844554c7e93b37c5c8eb434826c61
gcc-toolset-11-runtime-11.1-1.el8.x86_64.rpm
d57f1b8ca87240cd4dbd58f549e85673c39be4ae19c5890ac297c2235c96f9d8
gcc-toolset-11-toolchain-11.1-1.el8.x86_64.rpm
20b579e339bc9e8eecaaa22cf1e75b1beb722b0cdecfb97587642614409e3647
RLSA-2022:1939
Moderate: squid:4 security and bug fix update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm
7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a
RLSA-2022:1964
Moderate: fetchmail security update
Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client.
Security Fix(es):
* fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386)
* fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fetchmail.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client.
Security Fix(es):
* fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386)
* fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fetchmail-6.4.24-1.el8.x86_64.rpm
684c206b13c58381b25384d7b4b66507cc796811c738a4356b5b91904f4e9210
RLBA-2022:1965
plymouth bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for plymouth.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
plymouth-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
00b086a9069c7f5eb967de8f56e31c1560bb0e49d5c28cbc95b7f921d713f0a8
plymouth-core-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
76ae32a05325b0c1bb3907f4a90cc8f8468fd8c81815eac54d5fe9242c1d10dd
plymouth-graphics-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
bb4826aa5ede058a2253013b199fd6531e53e96786b40e33b8057617c9ca24d9
plymouth-plugin-fade-throbber-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
ba76ac771f037ca36c4619df4be0b37c46cf4cee9bf512ec6d07d6bce6a4b102
plymouth-plugin-label-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
181eddf9e8a7b96fa5d7150a703f7d603d7ddd43ce1736943c17c2400c29c114
plymouth-plugin-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
82b113585a40bd7677a0ee48df618096dc991987ab52a49b72809714134bfb4a
plymouth-plugin-space-flares-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
2ffb9c0ebf8bfe32100d18ebbbbc106f5cf96d7b69f36a341c63ca1bcc578d22
plymouth-plugin-throbgress-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
d0fbc8b21f3a8fdb6c2504d276f47eab45e99dcaa2fbd3bdb528cdd9019c1762
plymouth-plugin-two-step-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
4d7d08bdf934fc99bde6c8ccbad38fe8daa2447c52b5868a002c7c8420757aa2
plymouth-scripts-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
2477fb861b4aa2cf66a64457d3785549ae4c72f6da4dde2ac6c13763c84ce2ba
plymouth-system-theme-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
d8dc8eb03f4b4a505124e7eada3974a8b912e5b14840738854575203e175691f
plymouth-theme-charge-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
b47cc533faf9caee9a6c824572f08774b47281973a986d5f9f59e61aee973a1e
plymouth-theme-fade-in-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
b7e8e98d969700edd6ecea353ccb9f5cc1ed4d16535bf0bc31185f84ad1bc49c
plymouth-theme-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
b51b3692c1c547df089297070953537cacb7eecf0ff4134698e3201183c6d184
plymouth-theme-solar-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
a0db572c9a96cd00d6e678bebfacff850925ecc06928601bdd395e536e7c3694
plymouth-theme-spinfinity-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
6c5560e1521809493b6baab6ae08adc77b574538721dc2f9601a3676c554604d
plymouth-theme-spinner-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm
ac40b96199a4f11778bbeb3bb774babad457275d85feffb3931d4768d234b5de
RLSA-2022:1759
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355)
Security Fix(es):
* QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748)
* ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286)
* ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266)
* ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267)
* ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268)
* ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269)
* ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251)
* ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252)
* ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253)
* ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254)
* ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255)
* ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256)
* ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257)
* ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258)
* ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259)
* ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260)
* ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261)
* ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262)
* ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263)
* libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485)
* hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622)
* nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716)
* libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975)
* QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145)
* QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)
* QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355)
Security Fix(es):
* QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748)
* ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286)
* ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289)
* ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266)
* ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267)
* ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268)
* ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269)
* ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251)
* ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252)
* ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253)
* ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254)
* ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255)
* ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256)
* ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257)
* ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258)
* ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259)
* ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260)
* ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261)
* ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262)
* ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263)
* libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485)
* hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622)
* nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716)
* libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975)
* QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145)
* QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)
* QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
RLSA-2022:1762
Important: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* psgo: Privilege escalation in 'podman top' (CVE-2022-1227)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* psgo: Privilege escalation in 'podman top' (CVE-2022-1227)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649)
* crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650)
* buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
RLSA-2022:1763
Moderate: python39:3.9 and python39-devel:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17
python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57
python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
RLEA-2022:1767
nginx:1.20 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nginx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__nginx
nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
8b9098490e0ed579ef134c2c7e9e47fae539d6d5242e50d33138965f578345cc
nginx-mod-devel-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
1bef73d9ec96e3ea6dbc20bea0dab1a592f5fc5afc14aafe4179ac9ddc81dc79
nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
22ac42d3d46d47b8a58587447b601e7609f0f66c75346558c7075201e24c1b47
nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
d906cd3b87784901f32f1ad92120afc85c8b21d9dec7f08c1a0f5ce95a217256
nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
38f76d35fd980728308e94451574909e04fc39cecdbcdb9e0db195cfa2101bbc
nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
7e8970264c09a96068a63b604e536a5e9c36636d45352158be17327f1fa8a3f7
nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm
7d251e53fa3837429092951a3d2fb89c1439ac9798ae72a0f7ee86dc2548c75f
RLBA-2022:1769
libgit2-glib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgit2-glib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgit2-glib-0.26.4-3.el8.x86_64.rpm
d1edcdc02b09b6d0bbea2ea82193f142fcd5a46d65f23b033c9a73ecfad6006d
RLBA-2022:1779
usbguard bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for usbguard.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
usbguard-1.0.0-8.el8.x86_64.rpm
d0744bfbb307d7373e66581992f59b65d2bc6eeab255998e4381db97daf9b32e
usbguard-dbus-1.0.0-8.el8.x86_64.rpm
70124d46923db66036b4cc4124524754b889bd02fe7d1ce90a767ca7ba245126
usbguard-notifier-1.0.0-8.el8.x86_64.rpm
c4fb2066028324a13f65fb5413819cc016084822aa6d808b81da0a1829face57
usbguard-tools-1.0.0-8.el8.x86_64.rpm
1968b7e0ed6e8504071df5dacfb780cfaa42667009563a9256ab2ca245b09742
RLBA-2022:1788
jq bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jq-1.6-3.el8.x86_64.rpm
2195fdec718ee82c3274825465f936cd3b2457323da254f681e77f9883e0e5ef
RLSA-2022:1793
Moderate: container-tools:3.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
RLSA-2022:1797
Moderate: compat-exiv2-026 security update
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for compat-exiv2-026.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
compat-exiv2-026-0.26-7.el8.x86_64.rpm
78164a9e0f93342ed57af835a136e2d845c635b614a5c9464778a78d4cfcab43
RLBA-2022:1802
gcc-toolset-11-elfutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-elfutils-0.185-5.el8.x86_64.rpm
945d9ae78b45022525fa7d11189f3745e1b7d071d13ca2923f9ebfdff7b0c979
gcc-toolset-11-elfutils-debuginfod-client-0.185-5.el8.x86_64.rpm
70192dfdca07e1c592b29582ce1be8c30ff08b0f302551f8a3ffe7dbcdf2993a
gcc-toolset-11-elfutils-debuginfod-client-devel-0.185-5.el8.x86_64.rpm
ca7b65fcf980bc7d5e81a50ca4b99f380458289c580093cc7afff2b339763e8c
gcc-toolset-11-elfutils-devel-0.185-5.el8.x86_64.rpm
beba053cc78152742b044218e4c2e5cc23de10ded7746bfda094d93694392c92
gcc-toolset-11-elfutils-libelf-0.185-5.el8.x86_64.rpm
49a8d44581c79eaaa4677a61a41e43542085da9aceca8544d0d882294f151ec0
gcc-toolset-11-elfutils-libelf-devel-0.185-5.el8.x86_64.rpm
edbde0836414eeb7484506c342e1ba1b991aa3e0edc3b1796718aa9d8a1a4d86
gcc-toolset-11-elfutils-libs-0.185-5.el8.x86_64.rpm
796dd175cba886d5a8de41243bf75e1dbf212801fcdd4a64361f6f5e4bd344c4
RLBA-2022:1803
fence-virt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fence-virt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fence-virt-1.0.0-2.el8.x86_64.rpm
76c7d89484468bf87ddaebe27482659d8034dff50f29182fbda8edcf2ba2ecf1
fence-virtd-1.0.0-2.el8.x86_64.rpm
f4aa67de39a9ce7c6fa45fdd7f8210c8f3b93cefc300a1600aee9ddd61cc4182
fence-virtd-cpg-1.0.0-2.el8.x86_64.rpm
3b3dfc81f909a2e420d6cb5c0362e467634306b3933cd9c659571aa34fd9c231
fence-virtd-libvirt-1.0.0-2.el8.x86_64.rpm
5c5678b035ddd27c35cc0fb2fc3c1ffb7a47d39e34e96ce51cec9d09980efe64
fence-virtd-multicast-1.0.0-2.el8.x86_64.rpm
66e6ba450474fb77e5a22d22de79c20ce3207bf768db31776ad7667519e17378
fence-virtd-serial-1.0.0-2.el8.x86_64.rpm
8edc8ef1d257d76b4bdc3694b7077724c21a7138fa92252294dcf6ca70fc31ba
fence-virtd-tcp-1.0.0-2.el8.x86_64.rpm
c67ee2384ba6ca843e8d988552f624c92ca4e2050e54ee64208082c35b736546
RLSA-2022:1808
Moderate: aspell security update
GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker.
Security Fix(es):
* aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for aspell.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker.
Security Fix(es):
* aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
aspell-0.60.6.1-22.el8.x86_64.rpm
35a21a9a576b4ce6f4b34851a880ece09a2baaf51d16df49edbcd76b8e19f243
RLBA-2022:1809
tcsh bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tcsh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tcsh-6.20.00-15.el8.x86_64.rpm
c23f4421eb59f2a1f06c6956a2972b13f3341529d1557d5e2ef2d204ef4cf5e5
RLBA-2022:1811
ypserv bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ypserv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ypserv-4.1-1.el8.x86_64.rpm
077ca96ec9ba1f447a80706d068c4f84284b4a8f982961f0e229f316d64a31c1
RLBA-2022:1816
new module: container-tools:4.0
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8.
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8.
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
RLSA-2022:1820
Low: udisks2 security and bug fix update
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for udisks2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libudisks2-2.9.0-9.el8.x86_64.rpm
13a2d984b5d4a21f35ab57ddd95914c27ccc916993620b4dab9bbd697ee2911a
udisks2-2.9.0-9.el8.x86_64.rpm
5d4821126edacaebbe000dd9896ebb8dc63993f6f5da7e689e9968f946738a22
udisks2-iscsi-2.9.0-9.el8.x86_64.rpm
56eaaef8707e7c62a15fb4ce052a398cca4de48677e8ef3b7b9d10e96184cce2
udisks2-lsm-2.9.0-9.el8.x86_64.rpm
375eeb6adab3d131e8d96cbc816da721444799bcbf8f60c6b45d7b0f23016578
udisks2-lvm2-2.9.0-9.el8.x86_64.rpm
b9ad578c257ddfc2788078ef33be243cde33c0a9f6793529b334c2ebaa860412
RLSA-2022:1821
Moderate: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python: ftplib should not use the host from the PASV response (CVE-2021-4189)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python: ftplib should not use the host from the PASV response (CVE-2021-4189)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm
6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.x86_64.rpm
1257203382679fe9daa7dee565a99b8ffdbcefd743bda938d3facb7c15e9a571
python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9
python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
RLBA-2022:1824
gcc-toolset-11-annobin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-annobin-annocheck-10.23-1.el8.x86_64.rpm
ddf7846e76fa48303cdd2029f4206cef963671e30f1e375d4dd02d8441df3243
gcc-toolset-11-annobin-plugin-gcc-10.23-1.el8.x86_64.rpm
07d28a08396431cbb871eae01a77fb6b37528d86320a1aa7b8ae3589e113e3c3
RLBA-2022:1826
sshpass bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sshpass.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sshpass-1.09-4.el8.x86_64.rpm
52ad1cf18599607e0a1a6010acd13d3f6ebb97f89523896db7b5758a207e41e5
RLBA-2022:1831
postgresql:12 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLBA-2022:1832
postgresql:13 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLBA-2022:1833
inkscape:0.92.3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-scour, inkscape.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__inkscape
inkscape-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm
99fbc2bc4c7cb4c339ab096f89359ea28bbc9324b584a62cd23d89c2fc7fcd51
inkscape-docs-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm
903c394461f3f339c0c1881d384ad702f33e682dc2bd7b118641dae07702bb75
inkscape-view-0.92.3-16.module+el8.6.0+805+841d2db4.x86_64.rpm
e021d3d754d7b16da3852a2d0ee69b05cf3e06d5354f8fb6050c72a7c2af475b
RLBA-2022:1840
gcc-toolset-10-annobin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-10-annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-10-annobin-9.29-2.el8.3.x86_64.rpm
78d18254087a9645cd5c3ab866058af10025caf2192a6fc77e1aa94ff1af9a8e
RLBA-2022:1852
fido-device-onboard bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fido-device-onboard.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fdo-admin-cli-0.4.5-1.el8.x86_64.rpm
0b4d42006f2771bf69064e0f5c0760ccb4a501707ebdb8109b690623f9c13287
fdo-client-0.4.5-1.el8.x86_64.rpm
771890a1d457afd6b520fc64f6eb22395791ff9aa648741ebd4639e1ae5ce237
fdo-init-0.4.5-1.el8.x86_64.rpm
f3a2ca65e4946f41048b2e57277e8101b597e61a0ea22ac7ee891bc08eac6189
fdo-manufacturing-server-0.4.5-1.el8.x86_64.rpm
79ec5f43b0adceefe49d81473ff9e1a67e83cc84bfc4c6d5caa392246535336f
fdo-owner-cli-0.4.5-1.el8.x86_64.rpm
3975e1444499f5da7d4c92f7b5a76b75a0aa4e0f5a7c000ef2f9bdc9fef63553
fdo-owner-onboarding-server-0.4.5-1.el8.x86_64.rpm
5064445c720560843ac32fa04dbfca0bb4adfeb36a8117d1cf90b7a292aaae01
fdo-rendezvous-server-0.4.5-1.el8.x86_64.rpm
45d55ff49176c1387639103a20d31fdb1d7acc3b0aa682c733ebbf520e6d5dbc
RLSA-2022:1861
Moderate: maven:3.5 security update
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Security Fix(es):
* apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Security Fix(es):
* apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpm
86a01e3eab084e992222cf94a07c1591b41cf818904e7472d549b3d9f4fd2efa
RLBA-2022:1878
git bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for git.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
git-daemon-2.31.1-2.el8.x86_64.rpm
1172b644c3b23ffeae9a503dca48a343f697f371a77479522ce92c5a63ba4d87
git-2.31.1-2.el8.x86_64.rpm
0539d1de6615e832592ac547a7ccc3a7a7cd8a134d4ba4fbc7be791a0c61ed6e
git-core-2.31.1-2.el8.x86_64.rpm
17b04d086666e514b8f7bc9c81a0e3c97d924b8ad1c5171dfaa12e12286f7701
git-credential-libsecret-2.31.1-2.el8.x86_64.rpm
8867bbe1b88d44b70ae0ca8059b138885627b416874044732797a0288eafd500
git-subtree-2.31.1-2.el8.x86_64.rpm
69b10ce2ae22f6ce41c4bb3b1d379d21f46685b42440c9c540351653e78174f2
RLEA-2022:1884
idm:client and idm:DL1 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2022:1889
texlive bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for texlive.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
texlive-20180414-25.el8.x86_64.rpm
fca0165b3f00ccbee923dff753995b6b6ceedf08fb38d88f524ef4da2d4112e9
texlive-bibtex-20180414-25.el8.x86_64.rpm
f64cbef8d54f64fed525e64ba5211cb613417aa9111b22f1efa7d5fda84e1085
texlive-dvipdfmx-20180414-25.el8.x86_64.rpm
e0e256a8933512a4538f08a24c98eb7cecde65159d6557cbfdc20c5d7d64d2cc
texlive-dvipng-20180414-25.el8.x86_64.rpm
ba9da0905b5eb35c2132251e289b4a678b4fe64cf63a20334cce10b4377e03f1
texlive-dvips-20180414-25.el8.x86_64.rpm
ae5ef7c07d69ca9468b9277d2920ab38a1ca9a7a16944a6cb61fff708010229c
texlive-dvisvgm-20180414-25.el8.x86_64.rpm
bd712ec77ae18d3ba1e1e5acadd71c603c5f0859d96ff46524f287578406628a
texlive-fontware-20180414-25.el8.x86_64.rpm
3ec4004806a8b3d3af8f4d98e282998837882393dae947be60e49d863a0fc479
texlive-gsftopk-20180414-25.el8.x86_64.rpm
0774bd23840df0f8b8741c7aa4ad47fae98db9ef4ee089a6e4bf60022f261862
texlive-kpathsea-20180414-25.el8.x86_64.rpm
76516edd4f5c824824220b8b1da6741ad6ea0942d2716bfc7e88080cb2d5dbbd
texlive-lib-20180414-25.el8.x86_64.rpm
2522f9d127bdbf59caf4ba91384c3e0320e943b9fa208c9cd5c24d48a0dc7fab
texlive-luatex-20180414-25.el8.x86_64.rpm
86575844bd8ce4a907bc232527ceb5db896ff9038c8e85e5f83d0b2c16014387
texlive-makeindex-20180414-25.el8.x86_64.rpm
f9778abcdc837430ccb9061d9852f09ee58759c56c0a57231dde5dc73ba98e8e
texlive-metafont-20180414-25.el8.x86_64.rpm
97c7ab08597695d91071bb5985161fb06df6ce46e97ced54da5240706cf19e75
texlive-metapost-20180414-25.el8.x86_64.rpm
5cae1b2f3337ad06119dbc9343ab651ecf9e0daea063633b8fb4ba22516511d3
texlive-mfware-20180414-25.el8.x86_64.rpm
d0c5b0857db638d86cf7ba0ef35b997f1519cff0eea56791caaa66b57f29a90a
texlive-pdftex-20180414-25.el8.x86_64.rpm
a46d20c3a65f36dfc65761712b979997bcc89891b775fbca457f969101c23503
texlive-tex-20180414-25.el8.x86_64.rpm
7f7d031f477f4a95aa1a88b4f88ca0d06026ec6a3920afef1c5e6f063df0b8f1
texlive-tex4ht-20180414-25.el8.x86_64.rpm
3fc0fddcbf11aa8933f47502decef9800ae973cc7673fd23b7084fdd450cc020
texlive-xdvi-20180414-25.el8.x86_64.rpm
6e413c15fc26329f8eafeeeed53cb6b0d4f4a9e6629210c7d4f66c6adf9d2905
texlive-xetex-20180414-25.el8.x86_64.rpm
80cc7e19c1c545758bd2879b21c8fe0f4f96555481ba1c8d265ec064bc0a2bfd
RLBA-2022:1892
sysstat bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sysstat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sysstat-11.7.3-7.el8.x86_64.rpm
18ebf39527982354ecd4e9f241cb0ca214e9c626ff13d63897a0ea0b2ad595d7
RLBA-2022:1897
gcc-toolset-11-systemtap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-systemtap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-systemtap-4.5-6.el8.x86_64.rpm
44a368e9fc0ad89c1cab208712d6edd8b070b3dd41e9ca9a059e8a6028334499
gcc-toolset-11-systemtap-client-4.5-6.el8.x86_64.rpm
2a2aae7b383978ea9e1854f2ab4f842f2d2476dc07a580c70411b51f7afbcab9
gcc-toolset-11-systemtap-devel-4.5-6.el8.x86_64.rpm
1e2851383fbd0b0a3aaf1ce1c36ed3c4a89b5ed4289207308b5224bbc94c8b22
gcc-toolset-11-systemtap-initscript-4.5-6.el8.x86_64.rpm
21b8c938af2bbdc4d410e32fd36feb852293565b1e22069a62562cc385b627c0
gcc-toolset-11-systemtap-runtime-4.5-6.el8.x86_64.rpm
63f6d86581cf4d3949da19fd4033ae6df34a327a1e116bac053c8c09847f0a78
gcc-toolset-11-systemtap-sdt-devel-4.5-6.el8.x86_64.rpm
3933f9ea0548a4cd585056f115026c3aed083178106b846ea77475121e94ea3c
gcc-toolset-11-systemtap-server-4.5-6.el8.x86_64.rpm
e6a168197e3cda466086095cb04a170d69b909d9f19c813dde906c9f48f3c51c
RLEA-2022:1904
new module: php:8.0
This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
RLBA-2022:1909
spice-vdagent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spice-vdagent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spice-vdagent-0.20.0-4.el8.x86_64.rpm
b3605bc678dc36fdc5ced1b865e1fa1437222171da80645ff01e2d9cb88205ea
RLBA-2022:1913
tcpdump bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tcpdump.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tcpdump-4.9.3-3.el8.x86_64.rpm
606612b501e49ca1d1656e14f9a5309f36f6d181532e4d20df341fc04df4f6ce
RLBA-2022:1914
libosinfo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libosinfo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libosinfo-1.9.0-3.el8.x86_64.rpm
f5860ea3eae997c4028830f13a0d0f78333d9ad5a20953ed3455586af8c2b197
RLSA-2022:1915
Moderate: httpd:2.4 security and bug fix update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)
* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)
* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)
* httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)
* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)
* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)
* httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLBA-2022:1918
webrtc-audio-processing bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for webrtc-audio-processing.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
webrtc-audio-processing-0.3-10.el8.x86_64.rpm
2842620f64a4b5acf00d61cb3ae4d86a42605d5e9084b7bbdbcb125cf3b2d594
RLBA-2022:1923
gnome-session bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-session.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-session-3.28.1-14.el8.x86_64.rpm
f581f6dc06c1c8738281641dacd0d9f0e19f1d534da0d2faaada8f5cc892e39b
gnome-session-kiosk-session-3.28.1-14.el8.x86_64.rpm
b818bf62e55ce8a88a3ada3af7f3c33a5fe47848814cc0651137b9727edad179
gnome-session-wayland-session-3.28.1-14.el8.x86_64.rpm
dea48ea5a779795ba234e782bde1bda745f23e91d796e38c950c7d575c617e32
gnome-session-xsession-3.28.1-14.el8.x86_64.rpm
92930d1b2a3373ee484493ba6f32dd8323c3a5ae3d237a4a2a58cadccb5eea85
RLEA-2022:1926
libreswan bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libreswan.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libreswan-4.5-1.el8.x86_64.rpm
28ccbf755030a96bbc1a660229ee3796060f067345edd60000b459afb72bba24
RLBA-2022:1929
gcc-toolset-11-strace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-11-strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-11-strace-5.13-7.el8.x86_64.rpm
8340fd0cefab9e5f9104cbba5427b8a30afc390ea304d84589004a961a5273ae
RLSA-2022:1932
Moderate: python-lxml security update
lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-lxml.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-lxml-4.2.3-4.el8.x86_64.rpm
10e104ac88f0773f495df99f033e9fc933362a6371329d9c392d96d43c766b5b
RLSA-2022:1934
Moderate: mod_auth_mellon security update
The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server.
Security Fix(es):
* mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mod_auth_mellon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server.
Security Fix(es):
* mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpm
4e2af6902d8948be02387c6a9ce5db3423f38ce4f60913a06e463b6ce72e7b87
mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpm
7b1ffed1c79ced0755d2f174d7e67f5d933ad0cc601c2c11f0010cadb54fdc3a
RLBA-2022:1936
vsftpd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for vsftpd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
vsftpd-3.0.3-35.el8.x86_64.rpm
a1e5698fa330881ab4899757f583b2712629ee295d2eda043d1bb37fee955838
RLBA-2022:1938
hostapd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hostapd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
hostapd-2.10-1.el8.x86_64.rpm
b9ac29f6c6ff5e0efe5bf53898c16c3d104f59445268e4f10f39b2efec8322e5
RLBA-2022:1940
egl-wayland bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for egl-wayland.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
egl-wayland-1.1.9-3.el8.x86_64.rpm
5863f1d68d29762f4265851a4583037e8ff0d6cd00962e7dfbc96c9d941e3c0e
RLEA-2022:1943
pmdk:1_fileformat_v6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pmdk, libpmemobj-cpp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pmdk
daxio-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
963751bfb649f95591c1808f358a112d41536259e0323cf9f86d2e69a8c05db4
libpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
19f3938519fdd148bd78ef3ec13c2e1b604a901b5fe1f82d99cb6673aff0a0be
libpmemblk-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
465a9e4c0f257f572f3bd0379bb9d6cad2692a87617268e36f47ce9960fb9e3c
libpmemblk-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
b7a4ff7a843998c42d1a2a8d531ca2ec845b9d6fd6e0149d63d352c0db731b59
libpmemblk-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
eb818cfc5f415610acbfe575931a53b9b26335b6b8f948da35b6593a94cabfef
libpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
d269a75f3c76f836a86ac7ddaeb69b1371e6aa82706c34718968b3675f5a6e41
libpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
68ca3f7c0c3379900aedc8162d5ebf8322d73c61c7463f5643ab498329376731
libpmemlog-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
2095a586118d758554389b640f9429064c1c17f895833837765197c32f57fd3b
libpmemlog-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
e5e45f30eeac5359ee8c456839d01f3cd536af8530e8ac6a131cb7748c009bb2
libpmemlog-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
d18d39c058d5c8a4c1cc15bc82c845a50c967ca59d9f8ce5e0ead104fa77ec8a
libpmemobj-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
764fa3f5c3ac2e3773ff03d951d1c61ce679d612aa330bf946916c4fb802282a
libpmemobj-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
a7f4fc10d017785d12c618eca0227a703b11e7e2d89f3f4c8fc16188afa26bd0
libpmemobj-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
b9883c286082e87a4f9d48953ad92d5d074158a71a1d4699be165d044b6fb600
libpmemobj++-devel-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpm
534a08c1946cafdceb3afd81823bc2fc23c78f7cbe75be848ae4c480a1b44993
libpmemobj++-doc-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpm
d39e51c9f69e29b7119cc33b7c9a0096cf56f79af085c9e582ddb96354b44184
libpmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
173613ad2dc1a6366d24019f1dcf276ab1810942f7fdf3220b68cc33866e9e3f
libpmempool-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
70be05cc99ef64babf20fa1fcc0980ea20d28339ef02a93e78af182121dd4897
libpmempool-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
32bbfdf69bc4823362c256cdf4b395326d1239ca05bbaeb5c40de0729c6b8c4e
librpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
089e2693ebe7733f5effa2d7420443ff28ab4829cbcb872a5b92315b238d04a8
librpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
cc4326c2ab389c18c9756da388baf4aa335e2924fc3ac88fa941f02c76271d16
librpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
7660ae7f67e41540e0421fbfc959f65821e588e8348e1039a183fbc3f80eeb20
pmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
894f1afb6e937152a6980a230fae9210cd06c9d91e1a38eb23c89d9a498f3165
pmreorder-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
2fec02e2edf426bd5479c35d56b3e17b339d9173390e6e3be1b5576640102160
rpmemd-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm
22a93397c519e9e66e037bb007698dbc706a4a25aa6cb7ed79dfd18e2e6bdf99
RLBA-2022:1944
netpbm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for netpbm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
netpbm-10.82.00-7.el8.x86_64.rpm
8720cb93f3bd6269e53e9f53aee095bd9c658891536e3a4c27e64eeee41b1322
netpbm-progs-10.82.00-7.el8.x86_64.rpm
a19db72d87f18fa35ed3217c757ef60b46df7d80449c61645ed6ed8bef2a9d96
RLBA-2022:1949
python-pillow update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pillow.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pillow-5.1.1-18.el8_5.x86_64.rpm
c3b196ec79ed44cbba9c193e5da4687349ed47692644581fa5028742c74ff5fc
RLEA-2022:1957
perl:5.32 metadata for the Rocky Linux 8 module matrix (4/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__perl-DBD-Pg
perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm
5d9299dd0e22b1ec43cf84b205377dac6e301c7fbb881ebbc4503d66ad16e7d5
RLBA-2022:1959
scl-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for scl-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
scl-utils-2.0.2-15.el8.x86_64.rpm
f4811fcdee1d82ecef667fcb852ee1d16d2c7113b01f106e09d0657e12dd4f34
scl-utils-build-2.0.2-15.el8.x86_64.rpm
ac75a2dc62e0263cea333b700d9129a14875da4e5bc77bea3a1107d6ebfee9e7
RLBA-2022:1960
gegl04 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gegl04.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gegl04-0.4.4-7.el8.x86_64.rpm
48ae7950b7af2b4fa21076f8f1d60551a931a3a27d0260736501d8d46b0b5cfa
RLSA-2022:1961
Moderate: cairo and pixman security and bug fix update
Cairo is a 2D graphics library designed to provide high-quality display and print output.
Pixman is a pixel manipulation library for the X Window System and Cairo.
Security Fix(es):
* cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pixman, cairo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cairo is a 2D graphics library designed to provide high-quality display and print output.
Pixman is a pixel manipulation library for the X Window System and Cairo.
Security Fix(es):
* cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cairo-1.15.12-6.el8.x86_64.rpm
7fd42a923afbaebcff03073c443235685e4094ef7eab8ca48c8043d198b92673
cairo-devel-1.15.12-6.el8.x86_64.rpm
438d6899db8d75f02ae86797acdf9e157a38814214b60a8c8a43a2174100fec1
cairo-gobject-1.15.12-6.el8.x86_64.rpm
6828a209878746c228c9902843e0519407eb9cb8a3d204346a68833e9321ce8a
cairo-gobject-devel-1.15.12-6.el8.x86_64.rpm
9fa96b78a8a7f6114db6763d6f1f83d3a435ea0b2175914e79ec4fb70ae55414
pixman-0.38.4-2.el8.x86_64.rpm
fba43060573303c7e5d8bf3f65997ab720d2935be48a2910b778ee8e84f5fcc0
pixman-devel-0.38.4-2.el8.x86_64.rpm
07460cc1404bd085931f245340cebd640b41c1fe8596e9683a1167745a18bfc5
RLSA-2022:1968
Moderate: libsndfile security update
libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV.
Security Fix(es):
* libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libsndfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV.
Security Fix(es):
* libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libsndfile-1.0.28-12.el8.x86_64.rpm
5e58b32e9b028c3abd837883fbe4ba64dafdd491153e5bcf9c347029a44e3be6
RLBA-2022:1969
dpdk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dpdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dpdk-21.11-1.el8.x86_64.rpm
e9f76a1c2e6181c3b851cf29ac60c18b6fbecca07a5708e86d2634bc847f5d94
dpdk-devel-21.11-1.el8.x86_64.rpm
d4bc8c11993f1481b73bc15807a1cddcec1ab21c93d13697aaf4a4121d8c166a
dpdk-tools-21.11-1.el8.x86_64.rpm
ad3014357acdc36548f17ef3005719bb4f7dba1d64b2acdf7a3543c142ee7630
RLBA-2022:2141
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* Udica crashes when processing inspect file without capabilities (BZ#2077472)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
* Udica crashes when processing inspect file without capabilities (BZ#2077472)
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
RLSA-2022:2143
Important: container-tools:3.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* psgo: Privilege escalation in 'podman top' (CVE-2022-1227)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* psgo: Privilege escalation in 'podman top' (CVE-2022-1227)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
RLBA-2022:2144
container-tools:4.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Udica crashes when processing inspect file without capabilities (BZ#2077474)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Udica crashes when processing inspect file without capabilities (BZ#2077474)
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
RLSA-2022:2200
Important: .NET 5.0 security, bug fix, and enhancement update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17.
Security Fix(es):
* dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267)
* dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117)
* dotnet: parsing HTML causes Denial of Service (CVE-2022-29145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dotnet5.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17.
Security Fix(es):
* dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267)
* dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117)
* dotnet: parsing HTML causes Denial of Service (CVE-2022-29145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a
aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5
dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7
dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm
7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b
dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85
dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm
b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420
dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325
dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm
2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969
RLSA-2022:2234
Important: subversion:1.10 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
dc6f52adf8b10fd6b240c72b5ea1d62e0bbbe3d5bcc47380339117fc1953eb3f
subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
802bbeaf38639b1e42096fab308cf1bf8efe3df3a1b3c3720b7a5ac3939b7265
subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
e5c5a44c338f73bb0445575d27aef6a4b1a7d1ae1f7246b7bce10b6fe5782f47
subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
152d3eccdd9928c4d97f5a47117cbd0d224ae5b7c9886e3cb0414f645ad85d82
subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
1837382796e426c99566575486d20468e5e08d54a9feec23a37f37664c105dd1
subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
c019433f83ba3f54fb215c6f1a57e182c582f2f7b5aba6659278fb65bf8216cd
subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
a181eeabc6eb2ac08c26cea039b8776703ecd01ee9af67eeddeef97c3765418d
RLSA-2022:4798
Important: maven:3.5 security update
The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven.
Security Fix(es):
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven.
Security Fix(es):
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpm
86a01e3eab084e992222cf94a07c1591b41cf818904e7472d549b3d9f4fd2efa
RLSA-2022:4805
Important: postgresql:10 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (10.21).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for postgresql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (10.21).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgresql-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
a6556d962b8a4f21a234401b79b04dfaa0d5b61827325a20c8ea65f8067db498
postgresql-contrib-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
f279a2e053d7188bae25db22cd9a791bd25f458a03d74cb0628dcaa85c4db232
postgresql-docs-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
87df4cba162d789d39a9523d06ee5feb42b3c481362ca95e556b445e6e29f15e
postgresql-plperl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
cfa2703ebbe6afb8a1c428bacc45d8f2f18f153acda6fb288bc2b80bf1df5777
postgresql-plpython3-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
ddb003a769bcc194ab0b637b07ccbc91da7c739cd73fedf9ce4b73c41fc0b611
postgresql-pltcl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
d9a82d23a49cd4b229471121e55d4ff5433b91f06bda8638ba6f8354bcd366e7
postgresql-server-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
bcadbd1180ecfa672f9200bc1ff29e259e40b3b4a1fdf1a049a5fba65f51a631
postgresql-server-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
4e8fb48abd7db1afa17213b156d0e7bb3564cca215f8ae476e45b3d8114a32fb
postgresql-static-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
39857f6bcea51fd8cb8377b16ee7b095b2cc7b8b9100c16cde17f540facd1f26
postgresql-test-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
3037b8880b67dd06af7e2984029602733a3143700865544c0615bedd5cc22333
postgresql-test-rpm-macros-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
8dda3e9fef1d774bae73bf59cbf3b1c564dfe692ca7fc7cb60f0a13b7a1b6403
postgresql-upgrade-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
b72c8a51074d3e368fb33e0b20e256a73799d7cb689c40c43a6afcdcadf476a2
postgresql-upgrade-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm
745351bb1da0240458daa4c71cc28bbf516c3b1067e5b344afb80c1553952c42
RLSA-2022:4807
Important: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.11).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (12.11).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
RLSA-2022:4855
Important: postgresql:13 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.7).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.7).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm
731fb4c69a0d54ba56aa9e3e29aeef225b2289253ac1a7e7f4dea2012db45919
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
postgresql-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
5f8b0f083a1c9317df2506cef87ffce359943e65029a35861574bee6915195f7
postgresql-contrib-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
bdb8007dd69d049f90a135191cec910719dbcccb2f71cda1f1ecb4cd646acbc6
postgresql-docs-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
4e69a20363fb0f37eb5d284f8d396a644c8a05b9f0f11586da2e5a95bcdf5232
postgresql-plperl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
e42432f9031923fedfe56d3931c1ad2bd0d6803b95e7514bc922f4f3a8a9e676
postgresql-plpython3-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
4e9e7590fdf7f3e7754a306ab37cc6353c94662a025f95f2121148a9e816806e
postgresql-pltcl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
93599fd463b0958889f0a13fa32d36c2541db19d0d1e894fbb8f9bf792a801a1
postgresql-server-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
491ee6cb770d191dff89adb471c3b64810e6ba80e36989a0783ec2a4717f16d5
postgresql-server-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
fb598803af7755dec0375e23b391345d57d70616fac19f6afd6bc6e70bea42a8
postgresql-static-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
ea3065316ff5a9e71a63d1d3c8f3b2fec8096d24492e157c537e2a3d28f4bcb4
postgresql-test-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
730791c8791203248f3a1f0de1f71f9d4c3af466c3cd115bbcc538b33617c8f4
postgresql-upgrade-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
0c989ec06bfbb47761b85d6631d13fa3150be693ec2c8e34536e7b2acf9b9a75
postgresql-upgrade-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm
fc5a01ddfaf607fdf9268ab430711210612faaa36589eb71c23e6b62950c1b2b
RLSA-2022:4941
Important: subversion:1.14 security update
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
731bbe79595f494e581798261d3910616e1bcdbae2ef7f981b215453cf5af705
python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
b9453a4cc7f514c6b5d4fc9635d55f1cf4c75dc38cb5f774719646b8d4e57001
subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
117b77bc021f04f14594b64923ba7fc5d339150c0c18bcaac03c2830da8dc238
subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
2089246938eb318f05ba38eeeb5cbba0cf766f9b1d2add194ed624c6123087f5
subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
7a0b71de12a9a00fa90c466b489c01106b0efb79cb41ff2eba7559ae09236461
subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
e08caf8753168202fcb5ed6b9c38e8bb3897bfa19054afb1746cd7ea65d6fd4b
subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
2f746f1042536d1ba89f58dfb7530418fc05f4c86af692b53a40239cb12a83a2
subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
af4c11a20b867799fde5ed6bf4dfb553c6904e4e9c46a1824273bb52354920a0
RLEA-2022:5139
nodejs:12 bug fix and enhancement update
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm
40c2bd9fc581b3e1911cff31c4448efb063ee0501c11a65ac2d28f1382c54edd
nodejs-devel-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm
0dbea4843e50404baf084e6e5e5e92f5b880df36cd1f7fa26a530601ddb6ff96
nodejs-full-i18n-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm
dcb7739c0ed9048c9568bfb84a0d3411b019eef17458a5129d54b71ca7e69587
npm-6.14.16-1.12.22.12.1.module+el8.6.0+982+9fdca2d4.x86_64.rpm
144156798b2195a01a827128f54a3e69a1162fbf8a6a56255c8fe4f115ecf1d2
RLSA-2022:5163
Low: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy NULL pointer dereference (CVE-2020-13950)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy NULL pointer dereference (CVE-2020-13950)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLBA-2022:5325
postgresql-odbc bug fix and enhancement update
The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity).
Bug Fix(es) and Enhancement(s):
* postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for postgresql-odbc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity).
Bug Fix(es) and Enhancement(s):
* postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179)
rocky-linux-8-x86-64-appstream-rpms
postgresql-odbc-10.03.0000-3.el8_6.x86_64.rpm
f32a46807101023fc6d8f5287a3bf75409ee0a2ed2e0107399dbf2f0247fd6ec
postgresql-odbc-tests-10.03.0000-3.el8_6.x86_64.rpm
42395c2c9708007d6b9e4a81d12e39675d5001010f672d60bcb2c7a116f2684e
RLSA-2022:5326
Low: compat-openssl10 security update
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries.
Security Fix(es):
* compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for compat-openssl10.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries.
Security Fix(es):
* compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
compat-openssl10-1.0.2o-4.el8_6.x86_64.rpm
598a90725474db12773498e0622b9370467f94e418f0fbbeed19788c425cff30
RLBA-2022:5329
cheese bug fix and enhancement update
Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects.
Bug Fix(es) and Enhancement(s):
* [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cheese.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects.
Bug Fix(es) and Enhancement(s):
* [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028)
rocky-linux-8-x86-64-appstream-rpms
cheese-3.28.0-4.el8_6.x86_64.rpm
1cd8f7b5f5f9888477b2bcefcb93b5be066a6590b2c641568c3f6181b6285412
cheese-libs-3.28.0-4.el8_6.x86_64.rpm
dd228cd48876d9151169a9ea0a1a7038423436c278231b7f41c1acc0fd374499
RLSA-2022:5331
Moderate: libinput security update
libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices.
Security Fix(es):
* libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libinput.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices.
Security Fix(es):
* libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libinput-1.16.3-3.el8_6.x86_64.rpm
5448d678b4816353fcde30f677f369b1ac64b98b4f38f70bb834a02c47a65a3f
libinput-utils-1.16.3-3.el8_6.x86_64.rpm
d8bca0d5137448050cde5c77f9b5ab2ce245d586df2c2d05b7eb74710f9cf7a2
RLSA-2022:5338
Moderate: ruby:2.6 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374)
Security Fix(es):
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374)
Security Fix(es):
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm
487b8c46d410303fb33e9b4e4e4ca513c93dd6c1e32fff807b4264b4d58096a4
ruby-devel-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm
87986e65d2b0c62bd3a83a510c2d0449c400d26115a2ceac1032d7d47e4fba94
rubygem-bigdecimal-1.4.1-109.module+el8.6.0+988+8031c193.x86_64.rpm
10b9574c4f8bca0abe496a931b0aa5dd387139008278ad0a5da143a5682b57d2
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-io-console-0.4.7-109.module+el8.6.0+988+8031c193.x86_64.rpm
f7c851c71db19724876afe804f48dc7a658bd9614199e0bf7db956cbd0b55210
rubygem-json-2.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm
5287ad497584609c9389f3b61868ce2e0d6352585cf05a9225349665664832c1
rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm
2cf2fadc644d3e5fe944a097d7310a75272b24c1e689c5561325bb4869ab1f4a
rubygem-openssl-2.1.2-109.module+el8.6.0+988+8031c193.x86_64.rpm
130c794fe5120151946cab09649d7a4741893b0bcf07050479ebe6b2e76fc189
rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm
b161e96e3f0d89a3e9ec885fbf186a070b5c13ca27741d5889b81cd198d8f1df
rubygem-psych-3.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm
36de3362ddb04310b4ea3913105ac2819751c9e4eb68e5ac0056416f32ed78e4
ruby-libs-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm
69cf057803c2bfec15ce1a6c6916bd5dc1323dc64de13345603d5c061df8a1ef
RLSA-2022:5467
Important: php:7.4 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLSA-2022:5468
Important: php:8.0 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
RLSA-2022:5526
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: DoS when processing gopher server responses (CVE-2021-46784)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: DoS when processing gopher server responses (CVE-2021-46784)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm
7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a
RLSA-2022:5779
Moderate: ruby:2.5 security update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm
2dadb763214aaa0e2d5a932d0b2be42279f97080c8a066588d9f8a4438284ba9
ruby-devel-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm
63ad7a877a816b1ee0942047dbcbd71f9b52a383c9c7b5085700a830aea59c97
rubygem-bigdecimal-1.3.4-110.module+el8.6.0+992+fc951c18.x86_64.rpm
fbdd558fceda95c75edc0fb5bb1d7ddf9e063c30d5bbdc1f6e2e41182ee85924
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-io-console-0.4.6-110.module+el8.6.0+992+fc951c18.x86_64.rpm
721026e35dc187724f15d31f30af92dfcf50f54eb6e1bd189642fa138bf073db
rubygem-json-2.1.0-110.module+el8.6.0+992+fc951c18.x86_64.rpm
c2c099d75145af293c83fa67f3467ed5c4473f5704c0db36b61b139d90a9981a
rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm
22b7c1146480306fcee12a31ea92486e5d2c95569fac2b7af73eb5a1b7659d15
rubygem-openssl-2.1.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm
cf100363a6bc1926d83ac74ce8a36935a4bfe376e0fb27a1d65f24add669b9ca
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-psych-3.0.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm
6c5c3b67723e03a280fde12f40f093877a67a8938e46f1f33ee3267006e5a57f
ruby-libs-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm
1bca30a5e33cc4d59446068b15c4a6938c44057312cdb0b531f6c100309d523f
RLSA-2022:5821
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206)
* QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207)
* QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353)
* QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103)
* Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242)
* Remove upstream-only devices from the qemu-kvm binary (BZ#2077928)
* When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030)
* Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415)
Enhancement(s):
* Allow memory prealloc from multiple threads (BZ#2075569)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206)
* QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207)
* QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353)
* QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103)
* Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242)
* Remove upstream-only devices from the qemu-kvm binary (BZ#2077928)
* When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030)
* Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415)
Enhancement(s):
* Allow memory prealloc from multiple threads (BZ#2075569)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
RLBA-2022:5824
container-tools:rhel8 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fixes:
* error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594)
* Work on container-tools for Rocky Linux8.7.0 (BZ#2087742)
* Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968)
* podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352)
* ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049)
* catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143)
* symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627)
* Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fixes:
* error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594)
* Work on container-tools for Rocky Linux8.7.0 (BZ#2087742)
* Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968)
* podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352)
* ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049)
* catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143)
* symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627)
* Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295)
rocky-linux-8-x86-64-appstream-rpms__container-tools
aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
8fb2669180d717578f5407e383babf56b298d037148cf7d9c0bd7f819a707601
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
a0a9eb3a59768b77fa3790a555c1fb3f3b221258a5703418c0cd05b65245b4c9
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
5053642b22732a14803ee43bcb11874bb3771e7bc9a4ddac6f46ffdd3543a154
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
RLSA-2022:5826
Moderate: mariadb:10.5 security, bug fix, and enhancement update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Don't use less parallelism if not necessary (BZ#2096934)
* Links in galera package description are bad (BZ#2096935)
* [Tracker] Rebase to Galera 26.4.11 (BZ#2096936)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Don't use less parallelism if not necessary (BZ#2096934)
* Links in galera package description are bad (BZ#2096935)
* [Tracker] Rebase to Galera 26.4.11 (BZ#2096936)
rocky-linux-8-x86-64-appstream-rpms__mariadb
galera-26.4.11-1.module+el8.6.0+995+5ac2a483.x86_64.rpm
6c1369187a1133e19dec341e7099ea8bf32bc734100484c6741278676af0e239
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
mariadb-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
47eb162bd890e447dd3d4a0fb8ec38beeb0a1781fa625e38a13f0d45b9b816cb
mariadb-backup-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
520a147d559446a5bc70a2c80a2b68d22152d14832d174a9173c497ffd1569a5
mariadb-common-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
f017c78532673f9532d2d7838729fc79d2abd947f2fbbd4b975426a2bc8c341f
mariadb-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
556af926669474ea364941ba9011038a164ae7deba794a86d56700e37ae043a7
mariadb-embedded-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
88e2d30bef155c2ecee7a54fb42b172720fa505c53a671e011156277c224f9e0
mariadb-embedded-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
c33d67dca5240eabd8d936108e70067cbb8256d9c1cc16e698592ee0e2477b97
mariadb-errmsg-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
47efc58763cfa51e38884334ba62d8229f0d0665b478e3931782504aa5f3bc68
mariadb-gssapi-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
9cfc25a45a1ddd76a297284051b1c1190de192e49320a82af5e97ca7db0e211f
mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
cb1e34b23abf93b073d095feaf75dbdda7b39bb843df2695eda6a10c94402df8
mariadb-pam-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
6f8686a5ea55e7ae295cb251db7970900c8bfceb3bf4c9eae7594d74d20f5cdf
mariadb-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
b4aa22b0c0013875dc2bcb7102839c2bd62e6339028c069f8d8a51257d6024f0
mariadb-server-galera-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
98432d1dd9dac2557f64f2b412cec759d9e8d984fbfce194525a6efcb88babbf
mariadb-server-utils-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
7a6fb0550f77340846dc5043895c5f0943607aa3da61662222adbf5b14d8a25a
mariadb-test-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm
00f705e37e4b2ee57e7bb0e4ee164bf02c0284c2037aafb112f075fdd34439b8
RLSA-2022:6158
Moderate: php:7.4 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLEA-2022:6440
nss and nspr bug fix and enhancement update
Network Security Services (NSS) is a set of libraries designed to support the
cross-platform development of security-enabled client and server applications.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI
operating system facilities.
Bug Fix(es) and Enhancement(s):
* Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062)
* Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470)
* certmonger startup very slow using default NSS sqlite database backend (BZ#2097900)
* selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641)
* allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642)
* Need to be able to run self-tests at will programmatically (BZ#2099759)
* NSS segfaults still in client auth path. (BZ#2105007)
* ipsec --initnss timeouts probably due to entropy. (BZ#2121486)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nspr, nss.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the
cross-platform development of security-enabled client and server applications.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI
operating system facilities.
Bug Fix(es) and Enhancement(s):
* Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062)
* Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470)
* certmonger startup very slow using default NSS sqlite database backend (BZ#2097900)
* selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641)
* allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642)
* Need to be able to run self-tests at will programmatically (BZ#2099759)
* NSS segfaults still in client auth path. (BZ#2105007)
* ipsec --initnss timeouts probably due to entropy. (BZ#2121486)
rocky-linux-8-x86-64-appstream-rpms
nss-3.79.0-10.el8_6.x86_64.rpm
684862bc5ffd7c2f1fb4e3d80f02a05807655af5f218eb8a71f0ae541f1f38d0
nspr-devel-4.34.0-3.el8_6.x86_64.rpm
e5bfe96520798c594dbdd7506e57c5298e213e3a061559880feb30badacb0118
nspr-4.34.0-3.el8_6.x86_64.rpm
1543f75ee941cc74ec0e291eeb19eb2ecfa34491efa46059d78874418e9aae9e
nss-devel-3.79.0-10.el8_6.x86_64.rpm
ab6571733b23403211aa240ed384de6657911e94144ce724b3625f9e2eafe5cd
nss-softokn-3.79.0-10.el8_6.x86_64.rpm
8f4702dc979720438b3ca338b5215f0ec7b017443c3a2229aa71f84ce6cfe734
nss-softokn-devel-3.79.0-10.el8_6.x86_64.rpm
312d074dd3bfe576a38f02743248b050e86211e4d82dd5e0c5a7e73a6cab28a9
nss-softokn-freebl-3.79.0-10.el8_6.x86_64.rpm
93e78d2bfa30aaa30402f15bb1a29c067a6bc628353eca60453d33fff73527fa
nss-softokn-freebl-devel-3.79.0-10.el8_6.x86_64.rpm
4dcb1e4c0c555438b8b104b27e868ab458ee12bbd29f886d362eb9fecc56e4a5
nss-sysinit-3.79.0-10.el8_6.x86_64.rpm
f81f9bedbc71db1b05c23f436b16a20bb898e02f4afbb4ae30142becfda270a3
nss-tools-3.79.0-10.el8_6.x86_64.rpm
de6441d276507c10bb16f1cd2d3bd0cefffecfe0afb883037da27967a9f02c78
nss-util-3.79.0-10.el8_6.x86_64.rpm
4ed196ef6fa5a607f63430ec3e0822565f8a9dc8206ed99142b405eeba898adc
nss-util-devel-3.79.0-10.el8_6.x86_64.rpm
87c06a950c7c6e78c9eec58822d246a793e52615e9db229244efc53b66eeeb3e
RLSA-2022:6443
Moderate: mariadb:10.3 security and bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083)
* mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085)
* mariadb: server crash in Item_args::walk_args (CVE-2022-32087)
* mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for Judy, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083)
* mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085)
* mariadb: server crash in Item_args::walk_args (CVE-2022-32087)
* mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075)
rocky-linux-8-x86-64-appstream-rpms__mariadb
galera-25.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
2be577e24b7e4146b38502688892f31ba8155f3d438f5a92f5a85f0fa7851036
Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm
865b8857fe3d94502b8d4efcb6126f755a2ecf72aba4a02612f207a6baed7765
mariadb-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
197703483ce3f21c79732f53810f03df7c0c66092e2b3f6ebac1f8162fe5dd28
mariadb-backup-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
2d03c5141c3070e4bd6ec2a8f4700628b1748db93fe5672f80b8ab153eb0658b
mariadb-common-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
8b149e91c59d3b25245dd670c5b194725e74926ccc3a20291d5266593075463a
mariadb-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
f0db442d7effcc5c6cbfa80aa872c9c5be209461ff14eac63656d37c62428034
mariadb-embedded-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
69a13127d202418e1d44b7a86a3e2e6aba855ef254f5cfae2fb0f1cf37ef3832
mariadb-embedded-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
b607add53a12bab242b8c6d4e202ba0f4cd913e1b9c9910e9d3bac353d992dee
mariadb-errmsg-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
add7dbf8fffba3d45af1ac1b1dbdc871c8816cfa0ce05643b7d4e2d9bb6d50b0
mariadb-gssapi-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
e21b0e182700d9b999634937b53ae7528d72c2b4f02b16e8b37c466110ac81a4
mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
6ad4255e0c08e2a3bc03e37fc3edbf0fe41a06ce6bc93c6938c3426ad9c246f9
mariadb-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
fd385abfac5bd7e60ed92808d09ab95f7a04533852a81faec7cb79d938c9d941
mariadb-server-galera-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
ae9a8c3f42acda894da8c5db9e83658028e99fa19473522291c49ee085bfd4e1
mariadb-server-utils-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
2f9999145d8b2fd0ce3150e61c6bebc0055b8c0c56e7165907fcc43a926b7a10
mariadb-test-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm
58886712c7b405e6e25f6f5f3aec2f63464bfce745b87ebf3a893fd0886267d5
RLBA-2022:6446
virt:rhel and virt-devel:rhel bug fix and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fixes:
* swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568)
* swtpm_localca: Test for available issuercert before creating CA (BZ#2109987)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fixes:
* swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568)
* swtpm_localca: Test for available issuercert before creating CA (BZ#2109987)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
RLSA-2022:6447
Moderate: ruby:2.7 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424)
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424)
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm
f2f45642bf7f06a97f1837a99723bdf345f8cf0d42a86ba4c2abebf283e5359a
ruby-devel-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm
d7f1677bef739a83801cb34b8cb531783273bffa871791c486245c24c80d4d69
rubygem-bigdecimal-2.0.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm
27064fe03f90f11b184ddd4d4f1d6ce9d8e51646562bd5e3a90c85d2df102dd8
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-io-console-0.5.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm
2522f826d07e50f4573151caee2cba099b4a72ebc045ec4d268c1b25bbb64c66
rubygem-json-2.3.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm
4500a55dd4c62c954660301397d40e6f25634754290fa760657345fc6e212961
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-openssl-2.1.3-138.module+el8.6.0+1001+b5678180.x86_64.rpm
5427c2eed2ff85bb70f1c49c40faba028ec65a893e3aac7fa9debd97a5b7dee6
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
rubygem-psych-3.1.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm
30f5559c86ab32c6316a499f02118c9ecb437389a2040c323891fc60761c85fd
ruby-libs-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm
ca8a92b98fb7f6fe89556d2c3e76e9e146118a0b9bcd622d6a938d3feb34ba5d
RLSA-2022:6450
Moderate: ruby:3.0 security, bug fix, and enhancement update
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431)
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
* Ruby: Double free in Regexp compilation (CVE-2022-28738)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431)
Security Fix(es):
* ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
* ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
* Ruby: Double free in Regexp compilation (CVE-2022-28738)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981)
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
f15e2cb62f5089241b7c0d15d302850e6d62b29fd2baf95e4969d68291fe69a4
ruby-devel-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
471d39a317b19900d1aa0894ba19e3334bfffb9e35b77d317559b050cd2b54b8
rubygem-bigdecimal-3.0.0-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
304acf98fe6a7d8169d60426eb8c2474115406be0db98efc8873779344064cf0
rubygem-io-console-0.5.7-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
65acd752a8d7657a82e2b000ac67ca306118effa7180d5930ef2e1919738b0d6
rubygem-json-2.5.1-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
3cbd6958d0bdb8827db2c5a50b0d46611c87a04cd05c2c18e804e86a3682d87b
rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
f2314aa9d352c3a455fd466c43c462182d7d5bc8525434552c45d70bca1e4152
rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm
a0682196c973b23dd4ca6dc5d89d2a3a9ca3a3a5eb1596d05024e6ac093c5210
rubygem-psych-3.3.2-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
bec3c333cbe8353699a14dc66883da2acca1cc0ce0237b7251e126593d51668d
ruby-libs-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm
9f405c6e54de0216ab746e5621b5eb0bad162e0a4403672cbdf2630e8a2c39e5
RLEA-2022:6453
container-tools:3.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Module meta data is wrong (BZ#2120558)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Module meta data is wrong (BZ#2120558)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
RLEA-2022:6454
container-tools:4.0 bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Module meta data is wrong (BZ#2120561)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Module meta data is wrong (BZ#2120561)
rocky-linux-8-x86-64-appstream-rpms__container-tools
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
RLEA-2022:6456
gnome-settings-daemon bug fix and enhancement update
The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings.
Bug Fix(es) and Enhancement(s):
* Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-settings-daemon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings.
Bug Fix(es) and Enhancement(s):
* Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964)
rocky-linux-8-x86-64-appstream-rpms
gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm
12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94
RLSA-2022:6540
Moderate: webkit2gtk3 security update
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7).
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for webkit2gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7).
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el8_6.x86_64.rpm
6f9d418c7ea1f1201d9fce9c29a452dd5ff1e50186607bac1d8d5c36e9d0b081
webkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm
f264c4563e2b6ed207ecba5bad82bc211e855fcabe1756b92db6001872f5118c
webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm
857df66bf8107734cf442e7e59feab3e0d62c626e8738c46f676b57c99fa221a
webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpm
022a74acac9929975cd817c2e8820af36362c80ba18c35525aa3143c238e2845
RLSA-2022:6542
Moderate: php:7.4 security update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948)
* Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949)
* Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948)
* Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949)
* Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
RLSA-2022:6775
Important: squid:4 security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for squid, libecap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__squid
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm
7a54941082a3ab7b2206350637164f2ec4d208fe5f21efba7b36a9fd33617f4a
RLSA-2022:6911
Moderate: .NET 6.0 security and bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm
6e650cfac34c121a272d9c483ca5059026ec06f0d34d4bcae5d31b3e4f777725
aspnetcore-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm
70e339246f8d0c94ab2a07b9f993079005f3c20b862576c20a1a6772764c0cd5
dotnet-apphost-pack-6.0-6.0.10-1.el8_6.x86_64.rpm
0a657dbccaa3525914806ebdea52bcdaca2a936399b214dd30eecc378e94b2e9
dotnet-hostfxr-6.0-6.0.10-1.el8_6.x86_64.rpm
6982ed81d032f7ab444f935f35adff3f6d50b3d4f01c1139cd066e4fa3f57dbf
dotnet-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm
2df8853bf9d61bb52c0ada2a5eeddbf56ff1e69c8952d150d32702468268fb58
dotnet-sdk-6.0-6.0.110-1.el8_6.x86_64.rpm
583e8250ae7739698fcaf5c6b46c9f7ab5c02ce69bbd9c7c19ba1c8bfd938b09
dotnet-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm
0551f8c631a8895d3b971c3437f3723e4b2d5e3a67bdfb2f29304721a587a4c9
dotnet-templates-6.0-6.0.110-1.el8_6.x86_64.rpm
386c99913b24868fb58baba273ba69eda871b35805173bd4dc874b4076803d5a
RLSA-2022:6912
Moderate: .NET Core 3.1 security and bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dotnet3.1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm
b036a76fc87c4c0ebefdd5a48b039c099e59e631a937a3dbb25f7332e7eab6f2
aspnetcore-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpm
284b6c759438ba789f5b0dc9e68990cd9a483be7c21b3135af56a3937e7ae5ff
dotnet-apphost-pack-3.1-3.1.30-1.el8_6.x86_64.rpm
efe82ef762462f11c2e04d4aa5938f4940c02a20a22e781b7d9b292781b6ace3
dotnet-hostfxr-3.1-3.1.30-1.el8_6.x86_64.rpm
0a3e9d8b334a8ca057be0a61d2f495c0b0d6b880e64cc95a52518d8f2e258d32
dotnet-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm
eafd53eb66c10643f865ea529e46fca0c1a8375558efa5bc9a0f04d132658aca
dotnet-sdk-3.1-3.1.424-1.el8_6.x86_64.rpm
df33cdd9170652a91cb911118d2b44af28c5421bd1fd156eabfdbe796b2adf96
dotnet-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpm
6919d822bdd894fbd11352a528676772e043a81e957b956028e587586980d836
dotnet-templates-3.1-3.1.424-1.el8_6.x86_64.rpm
520fc0ea3849a0b1111c494897dfb53b2f9f48cf0e03242e82758ac941bdb3d8
RLSA-2022:6964
Important: nodejs:16 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs 16.
Security Fix(es):
* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs 16.
Security Fix(es):
* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm
440c4c7f7e759eeddb3269e62891497e5de3a79e0eafdc6edaae51f3b618d252
nodejs-devel-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm
57ecbfc42d4054167b5b62fb2cf50eb11a77b09e97f6920fdc61a0b06fdb9434
nodejs-full-i18n-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm
251fc16560f4fb5ef3ad009b28df12aeed5328b04733a5b52b9e1e31feaddbe4
npm-8.15.0-1.16.17.1.1.module+el8.6.0+1046+80feca58.x86_64.rpm
3d401a2f8fe06114ada7bba63cc62a443d33a2462d6c6e96a6335539b821aa53
RLSA-2022:7006
Moderate: java-1.8.0-openjdk security update
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm
745a98184ac9a5515249b7cd168a5790d2b07407b3eca941cbb9bf9400d2f689
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm
10be3aa175d2b7be220ed364679366f5b90ce479d11d65443fabba8fb5e23aa9
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm
a64f5fe29ba875659ccd0a3d6af6f3a1f5e87b0c4e5e93cbabe16cf8ed68ae68
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm
6facf44a3ef195fb6c7f66ffce323acf6eccf4f331d5b9059e0c03865fdcd5ac
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm
01819f766f0cfdf6b035db3ead2f50c9539d65fb760d89728a34771c4b44a31a
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpm
f0b9eb21a54ba79a63a963b57f7a2372954a3c88686a340713fa88332ab3ce4a
RLSA-2022:7000
Moderate: java-17-openjdk security and bug fix update
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503)
rocky-linux-8-x86-64-appstream-rpms
java-17-openjdk-17.0.5.0.8-2.el8_6.x86_64.rpm
838a430c12dc052feeab8968cead619fec7d76bb97abf592f861d0292706b130
java-17-openjdk-demo-17.0.5.0.8-2.el8_6.x86_64.rpm
0ad8e5c322536ec6dbc5798c48da6f97f0cb7ae2734f26350555b6aee748fd32
java-17-openjdk-devel-17.0.5.0.8-2.el8_6.x86_64.rpm
0197ddb74fb8a530c5972e9768ca5163284b1343ea3bd89baa46b62c13e8ef8d
java-17-openjdk-headless-17.0.5.0.8-2.el8_6.x86_64.rpm
63c857bda2ac036200ab1200c75d790ccbeb6e2188c06a888ae6f3989e4093f7
java-17-openjdk-javadoc-17.0.5.0.8-2.el8_6.x86_64.rpm
0704d2feac8d566e51e651cfa698732b1b90af3ba10e89d61df4a0e04401f6c8
java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el8_6.x86_64.rpm
61d2770cc684c0cee9537520ec7b7c1766c7b81ff1a5a01367d9f5fe0eefe809
java-17-openjdk-jmods-17.0.5.0.8-2.el8_6.x86_64.rpm
72cfedb194fb81bc92c44995237de168454da9f1ca92e4982839c94d5117954a
java-17-openjdk-src-17.0.5.0.8-2.el8_6.x86_64.rpm
f572d7bc2035a81698cd38ef656827cd5e790575a81d88a96b20271965971683
java-17-openjdk-static-libs-17.0.5.0.8-2.el8_6.x86_64.rpm
616d88fa04d8c7ab45e631db0cf0fdf6e6352968ab569145c5c4581bcaea023b
RLSA-2022:7012
Moderate: java-11-openjdk security and bug fix update
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863)
rocky-linux-8-x86-64-appstream-rpms
java-11-openjdk-11.0.17.0.8-2.el8_6.x86_64.rpm
f1ec1f28c33c37259da402d2e06a1467f4f9d7dfda6560d6c82ecfaf3ad6a8bd
java-11-openjdk-demo-11.0.17.0.8-2.el8_6.x86_64.rpm
b4e143d786bb6f13ad9170b9a5c7dd433aedb83213cc620ed9eea084a9f10b7d
java-11-openjdk-devel-11.0.17.0.8-2.el8_6.x86_64.rpm
294a5307e7d6a47cddb771bf7331bd33f0c76f11713a340cf9c2ba898fcdf3d4
java-11-openjdk-headless-11.0.17.0.8-2.el8_6.x86_64.rpm
ac1d47d33942cbb35a09fd0bbb94c70bf33ed1294a59069d1e7ede814e3d6fb7
java-11-openjdk-javadoc-11.0.17.0.8-2.el8_6.x86_64.rpm
51fe1350c0503073ec925d0b4872a11160cc0861b5e5d410533132621fc72e8f
java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el8_6.x86_64.rpm
a07639947737757b7337950563036a4d97230d069275a35781f6fa631a41bc71
java-11-openjdk-jmods-11.0.17.0.8-2.el8_6.x86_64.rpm
0670b157826eed4f457070a9944f09d339724159aeff56f6befed0496757cfcf
java-11-openjdk-src-11.0.17.0.8-2.el8_6.x86_64.rpm
4ebaae7da862f73d7398d0053cfd96d1249bbe313afb54279c6b0379be246732
java-11-openjdk-static-libs-11.0.17.0.8-2.el8_6.x86_64.rpm
4d8bec512555940ee20d1b0df6bc3f4680498b58c28433fa49b2431f5f5e40a7
RLSA-2022:7119
Moderate: mysql:8.0 security, bug fix, and enhancement update
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30).
Security Fix(es):
* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265)
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415)
* mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596)
* mysql: C API unspecified vulnerability (CVE-2021-35597)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423)
* mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454)
* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538)
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625)
* mysql: Server: GIS unspecified vulnerability (CVE-2021-35631)
* mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632)
* mysql: Server: PS unspecified vulnerability (CVE-2021-35637)
* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534)
* mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427)
* mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547)
* mysql: Server: Parser unspecified vulnerability (CVE-2022-21304)
* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374)
* mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367)
* mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457)
* mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633)
* mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mecab-ipadic, mecab, mysql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30).
Security Fix(es):
* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265)
* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415)
* mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596)
* mysql: C API unspecified vulnerability (CVE-2021-35597)
* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515)
* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423)
* mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454)
* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538)
* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625)
* mysql: Server: GIS unspecified vulnerability (CVE-2021-35631)
* mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632)
* mysql: Server: PS unspecified vulnerability (CVE-2021-35637)
* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534)
* mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427)
* mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547)
* mysql: Server: Parser unspecified vulnerability (CVE-2022-21304)
* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374)
* mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367)
* mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368)
* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457)
* mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633)
* mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940)
rocky-linux-8-x86-64-appstream-rpms__mysql
mecab-0.996-2.module+el8.6.0+1057+4d6a1721.x86_64.rpm
3c0021184a048d318e81df62882e329ccc9575395989cf57e5c6bb8d3dd12153
mysql-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
9cb5d1bbe5620dd769c4f7f75a45e21dcbcfac3fe3ff91b934d0c1fc3f15a0ea
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
mysql-common-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
1bc4b3d9628f3a617b83f355d19ec0105d6f13922efb67ca08ac33f99dbe5ca3
mysql-devel-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
824a5cada6538b9f41773f07d6c7f94b0aeb89454426062b7b2911873db1cd18
mysql-errmsg-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
a2063a9fd8dffa3a87a5e511b9b5e39052a530fcb27920f88ec0efed3e740d3e
mysql-libs-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
3bf0fe5f852a135cbae23e9a087f4724038b237938cd9fc2b19339517417a13a
mysql-server-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
c9db82d27d816893a193b9cab3c9195cb693c69f6dce2227fb4136bcedc1b7c9
mysql-test-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm
cc7ee9a9065cb0585ee6606c762ddf8d87502be170df730f4de4cf1978e96fe8
RLBA-2022:7122
virt:rhel and virt-devel:rhel bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fixes:
* scsi-generic: Fix emulated block limits VPD page (BZ#2121783)
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fixes:
* scsi-generic: Fix emulated block limits VPD page (BZ#2121783)
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
RLBA-2022:7126
stalld bug fix and enhancement update
The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time.
Bug Fix(es) and Enhancement(s):
* Stalld is running in unconfined_service_t type (BZ#2126495)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for stalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time.
Bug Fix(es) and Enhancement(s):
* Stalld is running in unconfined_service_t type (BZ#2126495)
rocky-linux-8-x86-64-appstream-rpms
stalld-1.17-3.el8_6.x86_64.rpm
f7461f2670713844d6f832dc358b7516e6b53b0386403c7de3b83bf5f88c5aba
RLBA-2022:7127
container-tools:rhel8 bug fix and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es) and Enhancement(s):
* containers config.json gets empty after sudden power loss (BZ#2130237)
* Podman support to perform custom actions on unhealthy containers (BZ#2130912)
* [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361)
* PANIC podman API service endpoint handler panic (BZ#2132413)
* Podman volume plugin timeout should be configurable (BZ#2132993)
* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es) and Enhancement(s):
* containers config.json gets empty after sudden power loss (BZ#2130237)
* Podman support to perform custom actions on unhealthy containers (BZ#2130912)
* [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361)
* PANIC podman API service endpoint handler panic (BZ#2132413)
* Podman volume plugin timeout should be configurable (BZ#2132993)
* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
RLSA-2022:7128
Moderate: postgresql:12 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm
7d8ef372754ce1946c34d0e2b2fcac187ff3cf1d0b09e93365f7178dc4d1bccf
pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm
193b856cde04e772032bd3e969c3693cf10773a7f8b5d81ebfb47069bf5a8f5f
postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm
e116ab4ae4b75b8d86a781409805e76edda6554d267fc6030537b08a789bf8dc
postgresql-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
f95444ae27053c5504601cfb1bf4d44bdc56f7d54b60f69fabff2a3a30f4f8c7
postgresql-contrib-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
d1da2be66f7b945e18f9ce5937472540a4e5fae27b68a66f3f6860a4c6b4cd04
postgresql-docs-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
ffa8d10df01db092f4039b3819a79dca1222c639c62cae7aca314fd59bcf68cf
postgresql-plperl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
29e8b7b91a348651e31084e03c04835aa7c00a84025fc22b252cfa772cbb2a14
postgresql-plpython3-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
1fd6e4891442fa7c18e0d3333658477bac3edf374df44767ad1a4a86d510f438
postgresql-pltcl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
5f1507924fba91e1f0ba51b3bf43d689c833a106b99635464db81d7916521a4d
postgresql-server-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
91acd673cfab624d1f4740cfa486f8da657dfe03696600e6eb50abcc8bb7469c
postgresql-server-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
8c9e2a4148198e518085b207d0f4845feeaedbd20ed36dc6bab84eb7a706394b
postgresql-static-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
43620e6cb1f200bca1539909808563f88ca31f0776c0e38a33213b63a3be7c30
postgresql-test-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
e994ddb1ebcac70c941d100c25cec93c489c1b33ff282e70f15525591e807236
postgresql-upgrade-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
8253518c68242b0c0f1807b360228af9568e96156030d52b8de3278ef1e89f0d
postgresql-upgrade-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm
c7b67025026e57a72036510e11d20e3516f3792d177a22d78c9973622d401fad
RLSA-2022:7129
Moderate: git-lfs security and bug fix update
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* git-lfs needs to be rebuild with golang 1.17.7-1 or above
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for git-lfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* git-lfs needs to be rebuild with golang 1.17.7-1 or above
rocky-linux-8-x86-64-appstream-rpms
git-lfs-2.13.3-3.el8_6.x86_64.rpm
d8a246dcad708db6bac5f33227ceefa96d4a79c8dd6ec00d99ad12d0ac0adf9a
RLBA-2022:7132
idm:DL1 bug fix and enhancement update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324)
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036)
* Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324)
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036)
* Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051)
rocky-linux-8-x86-64-appstream-rpms__idm
bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm
615d759274eb3f3f8c28657012cfec65b67d8a47fbf38b897955cec7bdde1495
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm
b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2022:7240
container-tools:rhel8 bug fix and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix:
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345)
rocky-linux-8-x86-64-appstream-rpms__container-tools
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
RLBA-2022:7455
jigawatts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jigawatts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
jigawatts-1.21.0.0.0-3.el8.x86_64.rpm
4dd6d7a49e770ec4d95f4bd04a3c6fc11f66c3889786262819905773a984f52e
RLBA-2022:7456
ansible-core bug fix and enhancement update
Update ansible-core version to 2.13.3
Switch from git to git-core dependency
Build manpages
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ansible-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Update ansible-core version to 2.13.3
Switch from git to git-core dependency
Build manpages
rocky-linux-8-x86-64-appstream-rpms
ansible-core-2.13.3-1.el8.x86_64.rpm
292ce7fdb68aab58926c7df28b3e108988bf148642adae06ba348a557d8b85ba
ansible-test-2.13.3-1.el8.x86_64.rpm
ec9d55e4bac46fde13b4b2d2bedb59fec2b424441ad913bb8596fcbb984690eb
RLSA-2022:7457
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)
* buildah: possible information disclosure and modification (CVE-2022-2990)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, conmon, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)
* buildah: possible information disclosure and modification (CVE-2022-2990)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
RLSA-2022:7458
Moderate: flatpak-builder security and bug fix update
Flatpak-builder is a tool for building flatpaks from sources.
Security Fix(es):
* flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for flatpak-builder.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Flatpak-builder is a tool for building flatpaks from sources.
Security Fix(es):
* flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
flatpak-builder-1.0.14-2.el8.x86_64.rpm
38a880b0af6d805dc60a1620d78a913f8c72a50492847a3c3c4f9171185a717a
RLBA-2022:7459
flatpak bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for flatpak.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
flatpak-session-helper-1.10.7-1.el8.x86_64.rpm
58c7ddd4eb66a852c86537cd722cba96f9167c9ff1209e0aca229354bd135d60
flatpak-1.10.7-1.el8.x86_64.rpm
16307d86bcf90b9a10b580f7264318cb01a20df8223a49db0361c08719093cc0
flatpak-libs-1.10.7-1.el8.x86_64.rpm
c0d6a3caa7713cf94f9e05bb1c83d0fef2bbfe006fba98d52da154523d765b0b
RLBA-2022:7460
rsyslog bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rsyslog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rsyslog-8.2102.0-10.el8.x86_64.rpm
6ecfc0924652059a0e59a20663a4c8492163d3a9476ef65fcc05b618885b110a
rsyslog-crypto-8.2102.0-10.el8.x86_64.rpm
501ef5dd0642197789c8afee86e586a53b3dc4e0dec9ed6454538c50b9b9e936
rsyslog-snmp-8.2102.0-10.el8.x86_64.rpm
01cee07ed3a8d9e112cc04ea731a89ddc4900d3eac727348f602f8e70104c315
rsyslog-elasticsearch-8.2102.0-10.el8.x86_64.rpm
5ae55243ecb13f18a8d4eccc3bbe99b688782bd25f92cca293650b13969b0c45
rsyslog-gnutls-8.2102.0-10.el8.x86_64.rpm
26f9b8eb9d7fb3d1ee0fa496c6d86afe1745a1300a2aeeb033f5336534b3b3ac
rsyslog-gssapi-8.2102.0-10.el8.x86_64.rpm
fb7659e51b89347942a0682769c11c65b480af8b9fa5283fbf6a912bc3b51763
rsyslog-kafka-8.2102.0-10.el8.x86_64.rpm
57623cfbeaf169b8d9db3917e3380e47ddf7d3a77981ba322a992945001e2c7c
rsyslog-mmaudit-8.2102.0-10.el8.x86_64.rpm
7c02db10512225c70140c4efe8fed9983dd8c23436e73d637b930abd82b5d6a9
rsyslog-mmfields-8.2102.0-10.el8.x86_64.rpm
8ae41c4ebda5bb2f5e490be17ea34df8a796a8ac82e37a4c6f79151fb880a682
rsyslog-mmjsonparse-8.2102.0-10.el8.x86_64.rpm
8990b09e3e34970d687f3a6dbb7a068a219ff3fa3d5dbfc6950c7009a263150c
rsyslog-mmkubernetes-8.2102.0-10.el8.x86_64.rpm
18ed1f630dd647c958ab135b7d19bf0c58a6bcf84d1fd4cf2b87abd3a1403869
rsyslog-mmnormalize-8.2102.0-10.el8.x86_64.rpm
121fbc57104776d1c67e521a9a26ba31ca81ad9cce470deaf29dc7726f5c3c18
rsyslog-mmsnmptrapd-8.2102.0-10.el8.x86_64.rpm
cac180c9d44da54781f873b435ae76dbb37cdaf659849420fc5ecd50df9d5de1
rsyslog-mysql-8.2102.0-10.el8.x86_64.rpm
009b093a178792b7a9b1322e1727a539e34a4f1f3e67333e3b157e41c623305b
rsyslog-omamqp1-8.2102.0-10.el8.x86_64.rpm
b0f15abe796a6650d2431ee09c162cdcccd9025800153f2b8521b591d5ac42d9
rsyslog-openssl-8.2102.0-10.el8.x86_64.rpm
0608b3b3949e0d32ba9ca1dd81cad91f3380b223a03ce25f8602399a5c4f5020
rsyslog-pgsql-8.2102.0-10.el8.x86_64.rpm
781b4b2940485824095aafbc61004154fdf5e7a82ffe9551952a935f51631b9f
rsyslog-relp-8.2102.0-10.el8.x86_64.rpm
8ab65a687c251669d44ce1a907e031dc45d99bd63b90796562afa9b698dbe3da
rsyslog-udpspoof-8.2102.0-10.el8.x86_64.rpm
c42e276660b6ec51faeabe13bee30151c26f441bce27a0818f5da24bcf973d5d
RLSA-2022:7461
Moderate: libreoffice security update
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libreoffice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libreoffice-base-6.4.7.2-11.el8.x86_64.rpm
e784d3b3d878595e6b5718236bfc928ddfd72e16b594bb701f169d5b4bb19fb0
libreoffice-calc-6.4.7.2-11.el8.x86_64.rpm
13a622c42cc9bb41a70c3f323778a02b216fffa7cac576de211cd008c4be5924
libreoffice-core-6.4.7.2-11.el8.x86_64.rpm
569b1e6c4b044f78ccc7f2f719db1d31bb6bff3c73c49bdcbaac648f1d34706a
libreoffice-draw-6.4.7.2-11.el8.x86_64.rpm
fc12df8aac7db65f8811e75271dbffabe2f35c0327782c1f19183ae2cca17ca0
libreoffice-emailmerge-6.4.7.2-11.el8.x86_64.rpm
068020d9b424cf5b6064ce2445ca374426fb790bfb70fced8b03216aedaf11a6
libreoffice-filters-6.4.7.2-11.el8.x86_64.rpm
a4942a4e72a76ac33204bb3405a0403b555eb3d416ab202038dd225bb1b7bc82
libreoffice-gdb-debug-support-6.4.7.2-11.el8.x86_64.rpm
73cb704b69babc93a7f851b3139e674479f490a77f52be334efb8afb64b05335
libreoffice-graphicfilter-6.4.7.2-11.el8.x86_64.rpm
9fef96de29a3c8d3038d71c04f35c81140547d0fcd91e99b9913ab7776a64746
libreoffice-gtk3-6.4.7.2-11.el8.x86_64.rpm
4ac6b5cb0644021c73e86ece8780d23869cc28e5c771e53a29eade4c3c17842f
libreoffice-help-ar-6.4.7.2-11.el8.x86_64.rpm
ee890e090faa8676295771d932fb884d6099a2beaaab0603399e910705e890ad
libreoffice-help-bg-6.4.7.2-11.el8.x86_64.rpm
c912487c44b0738bfca597127376b9e6f6b1ea159cf8fdc75e7275dc2dd7de1e
libreoffice-help-bn-6.4.7.2-11.el8.x86_64.rpm
920f525cb192101f31076810a33d06f8b277aa3a7c10c3ee0a83e3254a0caad7
libreoffice-help-ca-6.4.7.2-11.el8.x86_64.rpm
575219a5a54c5c83668914536f5b5d837fefded1ed9edf5e3002513cc02a0c16
libreoffice-help-cs-6.4.7.2-11.el8.x86_64.rpm
791f9d044ff91ce79e41611cbaa090831eb388712faa25b0ccb83f1e14faae3d
libreoffice-help-da-6.4.7.2-11.el8.x86_64.rpm
fa389a9af08bb8f5cc1d8ecd93b019985feba5686a5f0258cc36e5d57e05f5c0
libreoffice-help-de-6.4.7.2-11.el8.x86_64.rpm
421df053f212befe0d653589e9a9d7a6bdf24d8770962df2b5df5b95bb4647ec
libreoffice-help-dz-6.4.7.2-11.el8.x86_64.rpm
87a691ac5f08d12a8d82edae974431450adbb696065815656c1d2d381d927cf7
libreoffice-help-el-6.4.7.2-11.el8.x86_64.rpm
e171326eb0a005c3ce6be4d70b38b5bf759a2edd055c831d7ba6985bc8b4d0e3
libreoffice-help-en-6.4.7.2-11.el8.x86_64.rpm
40cb5a04825d52b8024097953e8ab073251b1b9302492a3747ac76b5d8eeaba4
libreoffice-help-es-6.4.7.2-11.el8.x86_64.rpm
ece90ae7d153a7b4ab4342ef668d2d0d2d9c3848a5533bac1646223514308c19
libreoffice-help-et-6.4.7.2-11.el8.x86_64.rpm
2584db17d49570e5be9bb9c6b1992f657f1fd39a14c22660fac5f5ad3a0f12d5
libreoffice-help-eu-6.4.7.2-11.el8.x86_64.rpm
9b2bf8f20b5c55f45814a41e8b03eabf933b9e7f2102d264b5a772553e53795c
libreoffice-help-fi-6.4.7.2-11.el8.x86_64.rpm
248b8850942c061e29f85fea119dad8b4d9bbd4ee3a4b6c82507d1d14c0b8ac4
libreoffice-help-fr-6.4.7.2-11.el8.x86_64.rpm
07750739db60164fd32aa035c5759d2f98556e21a9500003cf4e0f9f56aecbaa
libreoffice-help-gl-6.4.7.2-11.el8.x86_64.rpm
83866e5641d3d082eb819ecaae24a9464268de6f43bcb6c5267da61f03a001a6
libreoffice-help-gu-6.4.7.2-11.el8.x86_64.rpm
20a62bc41f0c1f385c98cc698a8eae4b07966216927abb3d04e60d1295ceea3f
libreoffice-help-he-6.4.7.2-11.el8.x86_64.rpm
6bc1c0e71e2f937ac0b63d22e9216ebf1ec34edcb18001b1bf08c22fb288f65d
libreoffice-help-hi-6.4.7.2-11.el8.x86_64.rpm
b7b375b0a8b0611b9e5602dce593f650d8ba6f47b9b462313939d3314ac6b321
libreoffice-help-hr-6.4.7.2-11.el8.x86_64.rpm
888b6b6761e58dd9f2f197415eaff390a8e26b850aa58c64172541f5a4afb851
libreoffice-help-hu-6.4.7.2-11.el8.x86_64.rpm
95795933c331257c56715e5a7bcd3a8abd5238f991ce0bf6267e47c69c643bc5
libreoffice-help-id-6.4.7.2-11.el8.x86_64.rpm
33ddc4dc9bf005d2931c67d54293d4514cb82ff15ef1faba84f97f38de994b10
libreoffice-help-it-6.4.7.2-11.el8.x86_64.rpm
559cac012576ad3f96840f5b7d74456b05df1ce2ca7de35e06cfee76e725de92
libreoffice-help-ja-6.4.7.2-11.el8.x86_64.rpm
6c69d6276a109cabb59ab93f1654a4d9870ef55d2db79461c1ca07dac419108e
libreoffice-help-ko-6.4.7.2-11.el8.x86_64.rpm
05f77b6b10dd37903b3bb15c6ce79d95d2ef0430ed73e1fb408a59d053a9a171
libreoffice-help-lt-6.4.7.2-11.el8.x86_64.rpm
594806caaf8c77e46d0b480a46025333177a488ece90735e3428e9bc0e278061
libreoffice-help-lv-6.4.7.2-11.el8.x86_64.rpm
049e912243762a99accf055d7e62353664eea8c77454e0285022f94df087b58e
libreoffice-help-nb-6.4.7.2-11.el8.x86_64.rpm
fc80baa0e6dec3c3ec5033fa26b63466e5a3ee2d1ff402d27ed93d50a2828d95
libreoffice-help-nl-6.4.7.2-11.el8.x86_64.rpm
685eae5ec3d43b31dcdd7b236bf4e31c2077e3fff84c5f1b6bc0b4fc5cf7bf33
libreoffice-help-nn-6.4.7.2-11.el8.x86_64.rpm
bb9f7eb8f57330402296b20934818ba5a19ac2c029ad0a47a633886a3abbe102
libreoffice-help-pl-6.4.7.2-11.el8.x86_64.rpm
9690a6a8be4dbef2807b61f5b052e78615452a654857bac3a41ff3bdfdb82765
libreoffice-help-pt-BR-6.4.7.2-11.el8.x86_64.rpm
62f14100a8f013a43f6bb58859ad6e7feef6c3d8183e6d8d96cacd431eb04025
libreoffice-help-pt-PT-6.4.7.2-11.el8.x86_64.rpm
4b3aab38a0ed9e7a48c5e1a7827e8c2566b9636e08f1bb813ea2e4e3754ed2a3
libreoffice-help-ro-6.4.7.2-11.el8.x86_64.rpm
44785c7cafb42fd6c3ac8a5bf658b877c470d8c91737a92da6f5da82b56fe87f
libreoffice-help-ru-6.4.7.2-11.el8.x86_64.rpm
7bdf2abb286b93262572148ad11d7041b20d18b06d7faea3fb6eb3a9cbaee64f
libreoffice-help-si-6.4.7.2-11.el8.x86_64.rpm
5453763157ca7a92b1721f1911ab68c62e5052535dffe77867cbe685a01413b6
libreoffice-help-sk-6.4.7.2-11.el8.x86_64.rpm
0db00490546a1c35218f0f82b635884b62b38470ae277396b83f6289613a8b71
libreoffice-help-sl-6.4.7.2-11.el8.x86_64.rpm
6e7733266c803e5caa36e2896fea4fe599e5012751452a610903f8d4df67dca5
libreoffice-help-sv-6.4.7.2-11.el8.x86_64.rpm
164d894544ed4a05ecbf69ad8c2c46d6c5fc7fb7cea79b70339805aacb810acf
libreoffice-help-ta-6.4.7.2-11.el8.x86_64.rpm
f83456099ab414a7dae0f7b009a4f62db6ea612bef8c439048b85d7e6f41b9d6
libreoffice-help-tr-6.4.7.2-11.el8.x86_64.rpm
e806c0810d321553f1e019230b9478faca0e9a2c7e1b2c15f7336ae84ae50648
libreoffice-help-uk-6.4.7.2-11.el8.x86_64.rpm
394ba1ba1178fe17b10387d6130b7993bf6181e1fedc51489af41c758420da06
libreoffice-help-zh-Hans-6.4.7.2-11.el8.x86_64.rpm
331aa48197e887000c33ec90eb152233758417a8ca7a34a9c23fa56e9867abeb
libreoffice-help-zh-Hant-6.4.7.2-11.el8.x86_64.rpm
51bfd6c693778df95e385dab79f3a2d9dd620460aaf91d7f9841f2e7b9f7438c
libreoffice-impress-6.4.7.2-11.el8.x86_64.rpm
ab078bb46f726b92d551f80de1c1e4fe4dff33e544bd1f5400d1252197c48122
libreofficekit-6.4.7.2-11.el8.x86_64.rpm
31ee988803ad3d5fdffed3fcabe9b8e09ab09c4bba48da7deec1edff7bdc542b
libreoffice-langpack-af-6.4.7.2-11.el8.x86_64.rpm
920b83b49d2f09d784f401be46451dbb64aaea5cd9e17dac49bdd36697f0b7b6
libreoffice-langpack-ar-6.4.7.2-11.el8.x86_64.rpm
78d7693a1d87b98587be9292817d18ad52ef17f86d20c6deebc30412781e1c08
libreoffice-langpack-as-6.4.7.2-11.el8.x86_64.rpm
bf9f6b9f8785ee91989b7ce88fd895b34c7f24f1270c352c4cc305d246136100
libreoffice-langpack-bg-6.4.7.2-11.el8.x86_64.rpm
568ab8afe163d334bf54497768ad14c00d1345e88c246ddee3bcbe65bf3cbc7d
libreoffice-langpack-bn-6.4.7.2-11.el8.x86_64.rpm
9d46c8162e4a6c61c0d03f4a9957455994796bbad10d405affb586bfb371007c
libreoffice-langpack-br-6.4.7.2-11.el8.x86_64.rpm
2072472994ae16686268dc29d979511844c96ce03a7817a5fb2960be76b9448b
libreoffice-langpack-ca-6.4.7.2-11.el8.x86_64.rpm
4a64181451223fa8ff4e23ce1f170c33bcf9fc450e56beb4246f622e9c22f005
libreoffice-langpack-cs-6.4.7.2-11.el8.x86_64.rpm
6f37ad410df8528f60b9ae8692b6e930f5b746b2a78e9dfc13f6ea062824108d
libreoffice-langpack-cy-6.4.7.2-11.el8.x86_64.rpm
08db94cfa6188f782f7dac1c52d27f9cdd7a103b67ff035edc10a579fc7ecafd
libreoffice-langpack-da-6.4.7.2-11.el8.x86_64.rpm
e7ac8a5cc2b5c040c6763be085cbe073b446cd0c8bfe2b3472fd24e412735adf
libreoffice-langpack-de-6.4.7.2-11.el8.x86_64.rpm
fa0967f42a2a7ed22dcc87888d61b4f59de2d8124f621281c3cbe6ea36160cfc
libreoffice-langpack-dz-6.4.7.2-11.el8.x86_64.rpm
052a14f24797706b445f29da9ec6c7a4dc996caa698f7e6df88606b4cefb0aa8
libreoffice-langpack-el-6.4.7.2-11.el8.x86_64.rpm
ed1d9e061b826621936931c484880dcd308547ddf4e35e6babf9ed6bd4a97ade
libreoffice-langpack-en-6.4.7.2-11.el8.x86_64.rpm
2e2bd44915aa57912b1c011f147871a08e0a4d28f1c2c25c1714d58c52380532
libreoffice-langpack-es-6.4.7.2-11.el8.x86_64.rpm
9c4eb79e70ab48de21eed1b5d165840c050cbce63fb0123e61ebb784745d2569
libreoffice-langpack-et-6.4.7.2-11.el8.x86_64.rpm
a19f1eccd5d341bf50942f31d50faf245e4744be232020be202397a39cab10c4
libreoffice-langpack-eu-6.4.7.2-11.el8.x86_64.rpm
3ce74f2358e6c95eb557d18ff35dfda581c0d9c962266d2559a1af8d5e4a95fb
libreoffice-langpack-fa-6.4.7.2-11.el8.x86_64.rpm
66ec9fa22aff02f7b450aa593ee2e17bf1a7a9328def2b2e218aa79a92c1afbd
libreoffice-langpack-fi-6.4.7.2-11.el8.x86_64.rpm
0007da28362f134d6a29b59c0e31507819c2e8eb907cdc346f2626059ee54f0d
libreoffice-langpack-fr-6.4.7.2-11.el8.x86_64.rpm
1e971ec9733d2f2b0a8104b330cdb12fb0279f7180126f3ae02c045bd559ebd3
libreoffice-langpack-ga-6.4.7.2-11.el8.x86_64.rpm
d2d3b4d019c6dae924c0213ea715ed91e3097bec26584bb57abb2909ac6ee004
libreoffice-langpack-gl-6.4.7.2-11.el8.x86_64.rpm
d474863b26dd82ba714788d8a5446babdf74577a209545c4afb37d75f37e50d4
libreoffice-langpack-gu-6.4.7.2-11.el8.x86_64.rpm
9c21941139e520fc8df84e541874189de039beb2699f7b2eaa6b33810a8c8b73
libreoffice-langpack-he-6.4.7.2-11.el8.x86_64.rpm
c547e3730b7df5e9609bca51e1aed8ac056072c0398fccff9e35baf50d120b75
libreoffice-langpack-hi-6.4.7.2-11.el8.x86_64.rpm
90364bc4907ecd68d76e456ec4aba8fcc0ac6145a65e9528f16331463dc3993a
libreoffice-langpack-hr-6.4.7.2-11.el8.x86_64.rpm
e1053f16476b87fd20df4afb4b31babceba72ac39c606b3e4783447a9eb10c5d
libreoffice-langpack-hu-6.4.7.2-11.el8.x86_64.rpm
a47a5652b3fd1cbd20e81f01864bf30882dcfbb9b488686917a6a8ee4964d7b5
libreoffice-langpack-id-6.4.7.2-11.el8.x86_64.rpm
e5fc6af405d73ed4acd1f8dbf26dc90193f37f76807b886fbbef762969a6d908
libreoffice-langpack-it-6.4.7.2-11.el8.x86_64.rpm
2278b30d85f696659b0a8b839229139595aa4f084133f5874b892e336ca4baac
libreoffice-langpack-ja-6.4.7.2-11.el8.x86_64.rpm
4a6c68d4cc66833e63bc094270eaf56aa3a4c18bf6561553813a1503a59d181f
libreoffice-langpack-kk-6.4.7.2-11.el8.x86_64.rpm
7e0d56cad92910078122a661f46d2d1d47b3876e5372473ecb61f8caeaffae4d
libreoffice-langpack-kn-6.4.7.2-11.el8.x86_64.rpm
b9d9eda16e0193f6c2de880587875f1f717a73169bd3628ed262f38e5c61c78c
libreoffice-langpack-ko-6.4.7.2-11.el8.x86_64.rpm
7ac0e0b82cf9490d634ebf46652992767434abb4df8ee1e7c4fe859ffcbabc78
libreoffice-langpack-lt-6.4.7.2-11.el8.x86_64.rpm
94ef0c95d3a2fcad1446ada35b9a8e3c2856deaed94e74f511360d24c229a1a9
libreoffice-langpack-lv-6.4.7.2-11.el8.x86_64.rpm
c9ac8ea5cb09ce99cf6696aea58f8c41184a8b13196fb89e1ca710d443cac54a
libreoffice-langpack-mai-6.4.7.2-11.el8.x86_64.rpm
b84546e33836b08193ef9f21ad24b890acdb90f00f4e04f605967b9968056a02
libreoffice-langpack-ml-6.4.7.2-11.el8.x86_64.rpm
01a3ac316f6787a3954c127250bb120a664dfdea71cd7d29a0ad2228da5b7ad2
libreoffice-langpack-mr-6.4.7.2-11.el8.x86_64.rpm
74bbfebf485064a916d2b177296680da70f16201f5782251e08afb1a2dd4aa33
libreoffice-langpack-nb-6.4.7.2-11.el8.x86_64.rpm
7596e0be67731a86d23baaa48653a88f1c9f58b7866058718a341a9ff539eda3
libreoffice-langpack-nl-6.4.7.2-11.el8.x86_64.rpm
e0425b68617eac2cfe1f4778b57fbc91829bd4705ad1a46117153f6790b19676
libreoffice-langpack-nn-6.4.7.2-11.el8.x86_64.rpm
54246c31a82ae4a834c4e443f69f8208dac2b7a0f07ec9a2566aae5375987ffd
libreoffice-langpack-nr-6.4.7.2-11.el8.x86_64.rpm
8ee2cb7edefb120807acf38d12b9266110f9d8f038e3d3d2da3d94775743a61a
libreoffice-langpack-nso-6.4.7.2-11.el8.x86_64.rpm
3d3e1c098ea29f4b056e16f88d478dd1889ff2ddbca105d3cb415b3cdc10784b
libreoffice-langpack-or-6.4.7.2-11.el8.x86_64.rpm
2bd24705f08d7fa3eed46b80b6862f879a3275fe47937b4cd709cc121bf3aeed
libreoffice-langpack-pa-6.4.7.2-11.el8.x86_64.rpm
b60f858a2490f6e1c129557dc27f9a5c4d0db6b5dd7ca16b852b4f61b22c2514
libreoffice-langpack-pl-6.4.7.2-11.el8.x86_64.rpm
6be7e833f030e569a69abd3f365bf6bad1a0832fa06e0aa8b55afdb138cd3a56
libreoffice-langpack-pt-BR-6.4.7.2-11.el8.x86_64.rpm
8586cdac51a23f6191ed5ee0902f1013a8d89931a5485348bae81787ce3247c3
libreoffice-langpack-pt-PT-6.4.7.2-11.el8.x86_64.rpm
1d398544cf751db220dc57b0cede75b98b8fde4905f30480f3c4b346d96fb356
libreoffice-langpack-ro-6.4.7.2-11.el8.x86_64.rpm
01809b70aef0cd108de61e294d9dec7987cd29498ff227973545b781ff8be96c
libreoffice-langpack-ru-6.4.7.2-11.el8.x86_64.rpm
4120bfe2987a8e3686239e55cfbadcb75b46dbb052456987a9d3af4164278652
libreoffice-langpack-si-6.4.7.2-11.el8.x86_64.rpm
9c5db83d6d161c13fb6db8ffa620aa98028a72169e62c533a662417b86fb72a8
libreoffice-langpack-sk-6.4.7.2-11.el8.x86_64.rpm
42816f66e0b3add535d723e74ef474715559bdcdf50ea6bbf8baac0c46e7f035
libreoffice-langpack-sl-6.4.7.2-11.el8.x86_64.rpm
bec9e82d634f585a2bbca25637ae8f552120f00b167d15ce95fd414e9961d2e2
libreoffice-langpack-sr-6.4.7.2-11.el8.x86_64.rpm
d66eb1c40feb6849926c06c7ff09d0de1868b7a013c62d74eb3c8bfa40509571
libreoffice-langpack-ss-6.4.7.2-11.el8.x86_64.rpm
40c16a683107387c4eddc0bc20777b63451f010c89efe29a53bd8502c5a1808f
libreoffice-langpack-st-6.4.7.2-11.el8.x86_64.rpm
35455447bc8b151b54be32cae0d0ff05ac977560e4b63f5ef08c00280abc6d44
libreoffice-langpack-sv-6.4.7.2-11.el8.x86_64.rpm
7d0cf2fb10d71e4516316ada6dc0fb2056f95acb9cb11a2802f9b68798b4ccd5
libreoffice-langpack-ta-6.4.7.2-11.el8.x86_64.rpm
9ceebf7aaeaaa9b5b8d0c8d0f22cdd574aca4a5f6dfda7bb0f5de1cf4ac4d0a8
libreoffice-langpack-te-6.4.7.2-11.el8.x86_64.rpm
f0979c16747675ec447148eedc8e8bc8911995ab920e1c160ac92037ee14697e
libreoffice-langpack-th-6.4.7.2-11.el8.x86_64.rpm
b9130736d9c55c76e97a44e0dc962a8031d7e32ecccaaa748e7480df8e388a27
libreoffice-langpack-tn-6.4.7.2-11.el8.x86_64.rpm
86146a3ed6873845b74de241424108cae0d08fc2c7455f54da13f6f9f1b38f48
libreoffice-langpack-tr-6.4.7.2-11.el8.x86_64.rpm
471572257f239e4bf9d45b3c9eaaf0a66b7770503b10244134fd341588199ee3
libreoffice-langpack-ts-6.4.7.2-11.el8.x86_64.rpm
eab92b10daa3e4e1f91b45e5974610165513d85f77f72901cd8eacf4974ac4ce
libreoffice-langpack-uk-6.4.7.2-11.el8.x86_64.rpm
8443da58a43ab69132adccd4b6c4e1660c900da203c7d6d282f127848fc7c9b3
libreoffice-langpack-ve-6.4.7.2-11.el8.x86_64.rpm
b322b352715b61ea3cdca2766ab860131b54b5a4e2d403c62f98c4a9469ec913
libreoffice-langpack-xh-6.4.7.2-11.el8.x86_64.rpm
f059618824618d09a8b2775aa0ed08d9e968e6f0cd4a6f87d45528e89e8e37c5
libreoffice-langpack-zh-Hans-6.4.7.2-11.el8.x86_64.rpm
0a34d26627c8afa66059c6ddd5b5c3344f5ca01858b0d02c99d54af1c9c8d757
libreoffice-langpack-zh-Hant-6.4.7.2-11.el8.x86_64.rpm
d24444aabc7278a7c20c8a3000d6dc6921a21a511e4ca669b51110ae27af21db
libreoffice-langpack-zu-6.4.7.2-11.el8.x86_64.rpm
c466d26a5deecbc1e28a950d03a3c15c1ee964afee2821f74426fa9cf8675dc4
libreoffice-math-6.4.7.2-11.el8.x86_64.rpm
d001266648ce05a1235e7028d84898268905787686ee7faabdb72cebd4645803
libreoffice-ogltrans-6.4.7.2-11.el8.x86_64.rpm
7b4ab27cf8d16d626049f9cc4016f6445b1f3950f7308e122ec73b9d2a92b70b
libreoffice-pdfimport-6.4.7.2-11.el8.x86_64.rpm
4173256e429df5eb0b28dbabe2a961612aa840b9d89b0b11f2b5cea8a2305113
libreoffice-pyuno-6.4.7.2-11.el8.x86_64.rpm
bc96cfc8ccce93fd6fa9ec61d1fd02f164893754bac7e766e3655c02a8e898aa
libreoffice-ure-6.4.7.2-11.el8.x86_64.rpm
008dcee0c499355dc23ceae84b819be63f3a245052e46068af0b6b0aad3cee72
libreoffice-wiki-publisher-6.4.7.2-11.el8.x86_64.rpm
87121150e754e030e1dc88f7dc4c7c4b3632cfb8cdeaaeb90fe407ddd044e313
libreoffice-writer-6.4.7.2-11.el8.x86_64.rpm
42e7244e1d162abbda7a6e4e3acbcc11a880cfb8692ce5ad8aee842026f05dd8
libreoffice-x11-6.4.7.2-11.el8.x86_64.rpm
32e691c44997fb0530c0ed4c9ba40ad4eb6f9c4a471640f11560bb1c610199d6
libreoffice-xsltfilter-6.4.7.2-11.el8.x86_64.rpm
eb29356082fc1eb03f733e03503830625f605aec1673daebc65a6db85c3cf191
RLSA-2022:7464
Moderate: protobuf security update
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for protobuf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
protobuf-3.5.0-15.el8.x86_64.rpm
bbe6424af46d5510d24c8e9c5d9198ac1b130582bd806a32b37d4308b803007e
protobuf-compiler-3.5.0-15.el8.x86_64.rpm
e8d6d89ce0937625dede41e2543fe7d68e9057b110c286da3f8ab570a42e577f
protobuf-lite-3.5.0-15.el8.x86_64.rpm
8c7dd42b7cb65b53a24b1c730699b4d443b2b5191fd07885dd5e568a59f6c511
RLBA-2022:7465
nmstate bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nmstate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nmstate-1.3.3-1.el8.x86_64.rpm
63466af6734f4f6c8cc09b9eeca17696fd0cb24a4cbfb52712c67c75d3c35c61
nmstate-libs-1.3.3-1.el8.x86_64.rpm
6a78b43ecc69f3e2fea22391a2e3429e739541e2705409ac22750ba029d0d922
RLBA-2022:7466
network-manager-applet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for network-manager-applet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
network-manager-applet-1.26.0-1.el8.x86_64.rpm
6de3fb69095b578fc44818250cb608ff5d1eafd2971b5919789a0f0af9838f23
nm-connection-editor-1.26.0-1.el8.x86_64.rpm
573a88541d4fe6bf303cf3f6ca9971252ffc8781b1a8dbfdb24e48a63d9f7624
RLBA-2022:7467
annobin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
annobin-10.67-3.el8.x86_64.rpm
001814c01eab83a5008379e3f6092e31d6df9948bab87770ac6e1c04bc8c4877
annobin-annocheck-10.67-3.el8.x86_64.rpm
5af4367270a02b2aee39756ccbcb6c37cefabf6bfaee61224595b7c5b7b849f2
RLBA-2022:7468
libnma bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnma.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libnma-1.8.38-1.el8.x86_64.rpm
fa9f87d388e229cf8b3611d5d5d6db249bcc97f807fc25e5fcfa68e76b49054e
RLSA-2022:7469
Moderate: container-tools:4.0 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
8fb2669180d717578f5407e383babf56b298d037148cf7d9c0bd7f819a707601
buildah-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2f25ea2a6be5c7011a1916c56ff82621deb8cd1d6f0217706778357723366905
buildah-tests-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
ddf136a758c754d1fd72d1438e3c92e44b6eb6b97f825cbe0d8e819e04ab1d73
conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a
containernetworking-plugins-1.1.1-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
66a46e625dfc054cd5870d6167e113d10bb59505276e810ba7da03a8db35b55e
containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
a0a9eb3a59768b77fa3790a555c1fb3f3b221258a5703418c0cd05b65245b4c9
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
5053642b22732a14803ee43bcb11874bb3771e7bc9a4ddac6f46ffdd3543a154
oci-seccomp-bpf-hook-1.2.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
e554c656d1081836a1cb7ba203733908cd2d6962e5d44444ce830f7390fb18ba
podman-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
490f60764e4fcbd8023ea76f67ae1388251b4652f3fb943722ced31cf84fdf0c
podman-catatonit-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
52bd88d63cbbc3baaceefc983b99f22f9dcc35d413fe6bbca4546d7e60c0033d
podman-gvproxy-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
42d506b86c4af61e6a5ffff7af6ac0a4ee9f22755927088e298554dbc3fc1eb3
podman-plugins-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b758f026bc43ab5ace11b05645d519087a5ec14e826a5d12f9f49979dc3e0a1d
podman-remote-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
f533129f039cf6cb7f2d4d3a961305ca1f6b731f5d60994486a27d958780a293
podman-tests-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d5cdfb3bee10883d7db12f92d710a598abcdb3a607790d54f5706f5bcd9bf581
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856
skopeo-1.6.2-5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
00879c92217e659f1ab2e92d2b65b8f09c2db2a4b690cc63ee70ac2f5a8af06b
skopeo-tests-1.6.2-5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
3692622d7758eb5d1b23030258ea1689ac1c7b55d93e241db3a43fab9eef329e
slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
474b95cb1ba67ebdb5d1e1c01628ed97e746996e5cdcd49ab0c80df8775cbc37
toolbox-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4070fc688f1a94fb09eb2d1d290c15aa06cc523a40ec39a6eb2c6e2a4a49cf14
toolbox-tests-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
f2ac5e105f0c039a157be718b529c5c0d1fa6478b678cdafb95ce6388c006700
RLSA-2022:7470
Important: pki-core:10.6 and pki-deps:10.6 security and bug fix update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__pki-deps
python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
7cd183b2f3fe01812473f107a6b40e639fbb73e7995962272e23a454a1b287b6
python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
3f0fa18b5b1cbdda18a4a406fb3785dbfcae8c156dc16a46a616487f44561ef6
rocky-linux-8-x86-64-appstream-rpms__pki-core
idm-pki-symkey-10.12.0-4.module+el8.7.0+1069+6f3de942.x86_64.rpm
07512c1525c5c5f2e8d0cd8e854a10cfe6bea277397011d10161b6a49bbaea33
idm-pki-tools-10.12.0-4.module+el8.7.0+1069+6f3de942.x86_64.rpm
59ad86761970d0125faf88d75fd1ebf7ce377cc3bc004dba6457a259f47c1978
jss-4.9.4-1.module+el8.7.0+1069+6f3de942.x86_64.rpm
639900844e2769e46d074053aff869916a34bf1c396dc8a068585c9b06d50654
jss-javadoc-4.9.4-1.module+el8.7.0+1069+6f3de942.x86_64.rpm
37da27e63ac0c3f7440ffac703a02e1efb8689438552706bb0b53e661cd8ff87
RLBA-2022:7471
libestr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libestr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libestr-0.1.10-3.el8.x86_64.rpm
e1e6d6fceb008a0fce814e9664a506b16325c490e608f3e6fed42a26f7058f7e
RLSA-2022:7472
Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828)
Security Fix(es):
* QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)
* libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)
* libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)
* swtpm: Unchecked header size indicator against expected size (CVE-2022-23645)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828)
Security Fix(es):
* QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)
* libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)
* libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)
* swtpm: Unchecked header size indicator against expected size (CVE-2022-23645)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f
libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45
libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f
libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd
libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f
libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645
libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0
libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b
libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea
libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100
libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52
libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0
libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
ea41423cb9ccd317d1a5ebbcb070b9e1a74f99ecce9c3e5051267bb64c188eee
libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
7ed71d62ecf427822af3a0b9e20fc93f9e05bf2004fb7be9511d6ab5e9b3de7d
libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
0ce8f2e8e6dca56e8a76186d1dfa73130956079bfd6f2818c1ee50944fc0b416
libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
d0cea4e0b6167849fb7edcb91531b3716e01887bfe9faea099bd0b8c7fc51858
libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
0c0d39b5bfd236922c883c4367c39d9c711ccdace73f36ece10088d466b889de
libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
092bc77167d3a1d392f4f214a08a4eaec63d5b25c12f7f3f0850b48c2de205e5
libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
c484e35d7ad61b87ad9662109aecb110158136240c797bbc126dae3078f4414a
libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
830a30966b383cdc2ed0cf28870c8af581d8a2b1dff4d0ed3fc1b4e6ec9941b4
libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
1f37a92b9f136ee4e4fc8f9bed72ca1cf858bbde132596cd5fcb789018e40a8f
libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
97350f3e49235032387990bfadb529874b4cc8fdaa39edc6f13d69e36253b4ad
libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6df6e0e49b97c69ff5b065e574b4c9eaa08c0ae4de46832fd1dc5c8b19abe6c0
libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
e8d54db9bd04dc675d8b44bab42de599af7c56fa68d5715135c1742056a0c6b3
libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
c87e4f8cb42bcbe09ed1c043fe3d57ffd7bc2e7f5adc56814651901db5f79a40
libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
ef4b347f15c6ab94fb348337c7856ba6acad1fbd7d425486741be6a5640a73e3
libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6c4b97bcb6b615b8c2bf886459f22fe782c05d2679c56fc1808e044feb60658b
libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
087db2ba93134a2c732b4fa5fa37b3c9fc2369447398a86a1a6c10de5f467609
libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
a791d8f7e3badb26d0385db4d3c03fbc0c8c800c6f5e4b984c3fcb093ba36d15
libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
57a656c3775cd30fb0e46818c56616b2083bb5a6fc1268ef52cb2ba0bf11968d
libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
b382f68a7b9146a952801ceeadf99f7ffacd5b3cdff873278f4c5e87dcf12169
libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6233e0708101c4fab6f867a5bd7081aea83c1b813f0b73b27d2dd066424feab3
libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
cfbadecd26551afc63bb73ffff83ed1a575276d71fae78783579b7200030e03e
libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6118db5d391e5ea27aeb8131ed3f596d918706291f0cb7a0ad2df37aa7d8eb26
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
e2a47a6cd93b6be3cb6cfe5b2db5852bd9934cf0e959f37ee82ac6bbfadffe93
libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
4330e66821e29bc2d1412a0480aec1bcdc1f942a81da56d43653bfb9172d9636
libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
fd055f2146f2f2210fe413dcd3500896cfaaa4683cdd3ca9cb6d130f0eb56e51
libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
5853e8e20b37b510049a488594a5e92bfd022747013a2854fcbdcc21bae08757
libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
decc7c7175a8a8456aa9fcb8aa312d9a0aac9657b8cc8a427af79f203bcaf0cb
libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
108e8b905f821306c1a18e368b647482898b6726e56268f57f967ba8ca263ee6
lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776
qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
f53d318c4b0613a22aebf4e177ad1f9105fce5fd18dc993e0229980aafc36b93
qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
c6429b4d1d9f6ac6162a7b0a6686ed3f2e1f856b1819d953dd73fc7207946275
qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
0adb29176532c04f3da5718b171484e4116fbdeb09cda55aecca84efeb2a8e98
qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
5fcca46736dc69adb0f7ff4f057607527a15031d5a13d87446cd377dc6eefe04
qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
9625fe3e4a5fffecfa1eb5b6451dd7c5a666bd468c0032198ba9dcefd2fb62cd
qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
d587a9dbc9af15a3c4408189098dd620294b95f6673b0614fead295697e1b4d3
qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
13cb392b10b20cfae2cdc32435b6177b26180bbe18ad6108cc9af993090a6c4f
qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
5ac7b977816ce165fed7737e3aba3bab5a7150730d979f1d12fb4d1a7ba62832
qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
f4cd7b44410c2c3a1c15413d45916901c818cdd79e8bff1535c416a4a74b3d33
qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
9f1769ac46cca5dd72edd4f2d7cc088d5c10dea45ec6802835aee4b2cdb0e79e
qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
e38d06d10d96bf278ce730343fd70de5c90521a564c7b739839c1e24f78a0dd2
qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
161c40f475f3129578d666dc0e8019573443ef59be07e7559618b7ccf68fae31
qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
76329de8d248dfe414a30907f835662cc25fa1bb03823724d7a87c3f32aad717
qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
631ac3650401c6f558dff57a24626a58aa7ad05e7dc8549e8bde07f483087b02
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada
supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70
supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b
swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838
swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf
swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe
swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9
swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c
virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4
RLBA-2022:7474
pcp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pcp-export-pcp2json-5.3.7-7.el8.x86_64.rpm
7f6c8907c4010774ce95460a05c58da2ac493943168eff189beb3546d7274805
pcp-export-pcp2elasticsearch-5.3.7-7.el8.x86_64.rpm
e1049e0e49a43d39b9d0a550b3c6d65356ee2a186a64d9cf8e3a81a2a563b232
pcp-export-pcp2graphite-5.3.7-7.el8.x86_64.rpm
b118fcafeee32bd85c199e196edcb04c4215fc393860148013d28f32dd3d4fc8
pcp-export-pcp2influxdb-5.3.7-7.el8.x86_64.rpm
1eb430a6942f94f8c246f0b64b49879f076a9211967ee1170283a4416fb155db
pcp-devel-5.3.7-7.el8.x86_64.rpm
53ed873be0a925f576b7373bd6e5b82227406aff0f7bd6d92e609ad40661f00b
pcp-5.3.7-7.el8.x86_64.rpm
00ebd7b43bc8a1b8c881d0c1d90752e7f9bdea90c55d4d6bdd960b52d2721d6b
pcp-conf-5.3.7-7.el8.x86_64.rpm
dc498244e321fa312f5fcf7006dfa5c0c7845bf1925ecfd5d6c393ed60ed69ba
pcp-export-pcp2spark-5.3.7-7.el8.x86_64.rpm
f2d5bb86bcc8ee31ed2b79beebaad4cc1dbb561e6db017857dd5b7beb06458b2
pcp-export-pcp2xml-5.3.7-7.el8.x86_64.rpm
5f964378221649516161216e7186f07f765f8812f51752b3548398444031616b
pcp-export-pcp2zabbix-5.3.7-7.el8.x86_64.rpm
c6dc535961e350604a665fe860315640b2f0c92e49a283cba3f7ab54e2e3e712
pcp-export-zabbix-agent-5.3.7-7.el8.x86_64.rpm
35c42db07bfd2aec133c643626ade46fb99c1161eb68ed0687ddca0d355b27d9
pcp-gui-5.3.7-7.el8.x86_64.rpm
2b7d06926848b9660823faba8921967bbd086cef56ded0fd2ac80285f4f64e7c
pcp-import-collectl2pcp-5.3.7-7.el8.x86_64.rpm
9bf437967b2f1ea1bdb71d0c9cacbd4769f5d51f6fe5fdc0e974da18434885fd
pcp-import-ganglia2pcp-5.3.7-7.el8.x86_64.rpm
9b78bddabe9eefa71861c432eac7a7b204ec400c4fbba29242ef0ac020617cad
pcp-import-iostat2pcp-5.3.7-7.el8.x86_64.rpm
02fe9376a1032c9103eb11733f9f08102b987d2315b14191bf264b1299c10b40
pcp-import-mrtg2pcp-5.3.7-7.el8.x86_64.rpm
fa014a3f31fc1ca1e5691b00d83739b3b98dc9af771fa697922320edd29ac72c
pcp-import-sar2pcp-5.3.7-7.el8.x86_64.rpm
3560e51b6528e51c36475c5949281077b881fe901ff1aa244b90ec6f364f7926
pcp-libs-5.3.7-7.el8.x86_64.rpm
9e17bc46a551e9edbf052b7b61639eca23fe433e0de7dc83b0bcba2cc12df00f
pcp-libs-devel-5.3.7-7.el8.x86_64.rpm
ca7ac79edf9b392626264422415265aac1b7c389085b94fdfccfd23359b46028
pcp-pmda-activemq-5.3.7-7.el8.x86_64.rpm
872e8abcf6fcc6c2a00990999d551ddda31be1a91d1e4a03ea6752b47fbb546f
pcp-pmda-apache-5.3.7-7.el8.x86_64.rpm
67d4640cedb9b327455eb3df26a6a2248561fe24391785db8bba26d3156ce6e8
pcp-pmda-bash-5.3.7-7.el8.x86_64.rpm
51facfa1c869ba09f53e3aa70900fc2f701a4321ec94d5d1687c70bdbb73e512
pcp-pmda-bcc-5.3.7-7.el8.x86_64.rpm
15817e139b5918e6503548f997a23bd7a540728ed25efef4a3c9b7b07adf5423
pcp-pmda-bind2-5.3.7-7.el8.x86_64.rpm
ea7c47bd76ea337e05476c8bc72c1b3df4f916efb5f3fbc453ef5b22a58e34bd
pcp-pmda-bonding-5.3.7-7.el8.x86_64.rpm
eabee9b7c021e2f1b2d78d634741220b1d5ad90508ed38d571eb68528fb8956f
pcp-pmda-bpftrace-5.3.7-7.el8.x86_64.rpm
614fc74fb65feb56a18aaffcb9f14737e0233a9b937be0ef9322f6be6c93fd3c
pcp-pmda-cifs-5.3.7-7.el8.x86_64.rpm
e9240900588e11d294004c9474ec240b680c0fa8c53d85971ea428ade018db04
pcp-pmda-cisco-5.3.7-7.el8.x86_64.rpm
6ab58ef8e02de9a0ab041ad77a17b93e036a4055f5599baa89122094afb6f44e
pcp-pmda-dbping-5.3.7-7.el8.x86_64.rpm
1ed8819ef1bb7b9d0cf2f3b6fa0fe03614235ebe1bd7d9cb43f01d5ab2daf80b
pcp-pmda-denki-5.3.7-7.el8.x86_64.rpm
de66b1141ec48dd4ce4ea4bc73e9796355a6f87c4371aecd197d81d360fadacf
pcp-pmda-dm-5.3.7-7.el8.x86_64.rpm
e7116371b14ad7f2d12b53b973bb4835916810bc23c93cb8ffbbb99251df158a
pcp-pmda-docker-5.3.7-7.el8.x86_64.rpm
eb41b394a2cb327dd5cf978e5e5442fa61465d0a2c7a7c936c92b442111a4a5d
pcp-pmda-ds389-5.3.7-7.el8.x86_64.rpm
a18e9439e2cfa458108c3203231d54289504963cb558277b2ae2adf1419572c1
pcp-pmda-ds389log-5.3.7-7.el8.x86_64.rpm
5ca961ca4a3cd832154e978a234b2366aeb821c9d386c50f7ef5f126dbfe4ef2
pcp-pmda-elasticsearch-5.3.7-7.el8.x86_64.rpm
07f3370cae783f296f3ef63f461b828440a14c0d97f5c05993c34afa7d8b27bb
pcp-pmda-gfs2-5.3.7-7.el8.x86_64.rpm
b81dea7bafdfff3b5153ad1c2bfe01b4e5be4ea7b4940ff7e126c126bad0650e
pcp-pmda-gluster-5.3.7-7.el8.x86_64.rpm
5f4005fa3a78eb4a30877aa3ace5d1c663f3685699c17d9ad24dea89af231a87
pcp-pmda-gpfs-5.3.7-7.el8.x86_64.rpm
373e6c36ff883952ca43c985667d6d22b1460bf23c825436695b61f6f82aabec
pcp-pmda-gpsd-5.3.7-7.el8.x86_64.rpm
c7dd1e16b62800b5941b53b9f6f965ad6d96f54f9220eecaca89ee4d841ce5af
pcp-pmda-hacluster-5.3.7-7.el8.x86_64.rpm
560a0f7086af3c8c812fda6105d9ec9d17284549539db3ca9c9982b59037bb2d
pcp-pmda-haproxy-5.3.7-7.el8.x86_64.rpm
efe061e03e82e894a6e563896bb1a55245aa4a7ab5ba5862ff46ae032ebba3ab
pcp-pmda-infiniband-5.3.7-7.el8.x86_64.rpm
66d153a49faec50aaa7b5d439c7fc86f34f2ded2828169e06d2964550c955cf2
pcp-pmda-json-5.3.7-7.el8.x86_64.rpm
902a782334542230ef69e996a6a1d1b853789798ea3d1643b51e6ba2b6d7b288
pcp-pmda-libvirt-5.3.7-7.el8.x86_64.rpm
8f2643279569d40fe30d06aee546598a6c1bef045eab4780a0c4bdecfc5b7119
pcp-pmda-lio-5.3.7-7.el8.x86_64.rpm
9d335fe1edf4daefd1ae9476b2f37ae9127de91848d181a3a0254fc336bcad9b
pcp-pmda-lmsensors-5.3.7-7.el8.x86_64.rpm
05f540c9b787a785d7d3cdccb846a2ef395961cf380859a564cab572de1026a8
pcp-pmda-logger-5.3.7-7.el8.x86_64.rpm
409849d5599e3fa27ac740cc80ab2f78b1f48c136d15c15d92f189022c5418c9
pcp-pmda-lustre-5.3.7-7.el8.x86_64.rpm
752d7c1012c438e765c2592ab3feccfb1c25f919b3bd5f5b323c0e8bed47f00e
pcp-pmda-lustrecomm-5.3.7-7.el8.x86_64.rpm
783458dec76d9e1747586260565105804723d3691e05e7e8ef3e638f8debc494
pcp-pmda-mailq-5.3.7-7.el8.x86_64.rpm
854e15d307eb44a6d3327fb9f361a0a565bb86841ca1ad9a7db790e5d7178990
pcp-pmda-memcache-5.3.7-7.el8.x86_64.rpm
5b7d46fb1b55895b98cef386fbf0105d9252952fc140779b57a4000b7f54eebd
pcp-pmda-mic-5.3.7-7.el8.x86_64.rpm
d64902cb5d41f559ce5d33d0db74f0f78e4b6f23720c479e07e6dd357f6e97cc
pcp-pmda-mongodb-5.3.7-7.el8.x86_64.rpm
6ae518e8af3587d018b42fac33081762609aa6beccf4fac89cab91cf44fadb79
pcp-pmda-mounts-5.3.7-7.el8.x86_64.rpm
16b938aa3e8180b94e7f2767cff2c0812c3a743bf825fded52678f6394ccf323
pcp-pmda-mssql-5.3.7-7.el8.x86_64.rpm
3123ce8d083dd4ffb03eb5ad07a9e1b793dcebe090dc26c960849a5a5d2d3442
pcp-pmda-mysql-5.3.7-7.el8.x86_64.rpm
245dc0e620170830161c3fe8209cf402ec1f978cd40980fdbf262660ab056d82
pcp-pmda-named-5.3.7-7.el8.x86_64.rpm
064f4f327642f255dde1ef4eef4f04920c6dc47a8953a8f2f5bbfcf774d769ab
pcp-pmda-netcheck-5.3.7-7.el8.x86_64.rpm
2424f1b2fb83f55878bdd2eeb2cfa2cea5416deca67c1748419b90d218e53201
pcp-pmda-netfilter-5.3.7-7.el8.x86_64.rpm
af97b89d79002cc54cb2495c53edca7feca94a4d8213d3b7e76e6584b3e65cbb
pcp-pmda-news-5.3.7-7.el8.x86_64.rpm
f11571ad54438d2b54796baecdfe3815420842b39b2f8199681ebf10a57361c4
pcp-pmda-nfsclient-5.3.7-7.el8.x86_64.rpm
35f0478d71860dd5735407f6efb74dd9f4ffaa35d6e4c5a103bef9825743a7c4
pcp-pmda-nginx-5.3.7-7.el8.x86_64.rpm
e78b31685a0d0126fda6c4ca67102e8fe17aa5c0e2c24461e9dc58eb7ae6c025
pcp-pmda-nvidia-gpu-5.3.7-7.el8.x86_64.rpm
a0903ccaa5d73ca885c7b6c9238433dde0f5ed22aad7c713692808fb369a6f9f
pcp-pmda-openmetrics-5.3.7-7.el8.x86_64.rpm
acda2ced8cb0e5cf25c340ff68af62118b2b54d631fb013bc3e49d87c867fe57
pcp-pmda-openvswitch-5.3.7-7.el8.x86_64.rpm
4019049bd7536ef2cfcfffdefa1ad20d14497e9ffb1b8440c0515570f65e8fca
pcp-pmda-oracle-5.3.7-7.el8.x86_64.rpm
265ba7ec8906991b9d82b8741eb06a19cd09870f5e0e0f4d455805226d66d4a0
pcp-pmda-pdns-5.3.7-7.el8.x86_64.rpm
03cc10c9c45397426a6f341eb3e2281b4c40afa120de3f60e6a115d11280a9cb
pcp-pmda-perfevent-5.3.7-7.el8.x86_64.rpm
5c46827714826ad2e46ca438832372b68756a23b2a814d232c24e004cb22bb8f
pcp-pmda-podman-5.3.7-7.el8.x86_64.rpm
f98fc7f25d25d301001a221af560a5181ee3c28780b2b7478031856797c3cf97
pcp-pmda-postfix-5.3.7-7.el8.x86_64.rpm
6cb13bada18d1817a51e19ce494ad14a965904a8f2a5426aeab20f744402b7ac
pcp-pmda-postgresql-5.3.7-7.el8.x86_64.rpm
2e940c0bbc810fa465555a3ff028676adfd86f02a999464e2cd48b056eeda51c
pcp-pmda-rabbitmq-5.3.7-7.el8.x86_64.rpm
715ab60a7c06980e5a05777b2d4697269ba1776d561b75c35e66ff0e1f8c8531
pcp-pmda-redis-5.3.7-7.el8.x86_64.rpm
34f3c72cc2046583e287fcf28ccbc00d8e08398f9699e56802942a0cc292e62b
pcp-pmda-roomtemp-5.3.7-7.el8.x86_64.rpm
ef99347ad293640a26a44dc17d1e2f7abc94df873ce5ab70aa77ac9578e449b1
pcp-pmda-rsyslog-5.3.7-7.el8.x86_64.rpm
53fad6bb65b717420b8ee72d4a95498d4b6a1ca55c390044b91e2acc5509462e
pcp-pmda-samba-5.3.7-7.el8.x86_64.rpm
87aaf1312975daf6af0ffa6a579ff34681c7efd432b454f92290ca771cdc1107
pcp-pmda-sendmail-5.3.7-7.el8.x86_64.rpm
d6d13dc716111db98c2376e7a3a916984f99afa1009c0341e3ae2c5b627ff292
pcp-pmda-shping-5.3.7-7.el8.x86_64.rpm
860edf1878bf5794559a23a78f2f7c17a20ca3e999af2e2b9a773d6c663ddd79
pcp-pmda-slurm-5.3.7-7.el8.x86_64.rpm
7ef94e6af4bc6384063e02cb096261e8880e5c0d61be8c18eb2e2ed466513255
pcp-pmda-smart-5.3.7-7.el8.x86_64.rpm
adce64bc75f3ed731ad1dd76346a59fa47b81184b9d0c302b5ed493c21498190
pcp-pmda-snmp-5.3.7-7.el8.x86_64.rpm
a3d4e26d42a018553a136e19e5b862e42cb32d62992a03a5fe0efa42db0ae51a
pcp-pmda-sockets-5.3.7-7.el8.x86_64.rpm
e4ab1e5d7a26a2f9223f120c0b7e703622410f4df956df2acc72a6eb2668cc59
pcp-pmda-statsd-5.3.7-7.el8.x86_64.rpm
2dd774c88537feae2dd76e3a9e6cad37ec5aa603d32da9398935df31ba85607e
pcp-pmda-summary-5.3.7-7.el8.x86_64.rpm
04a905391cb95625ce471b18343a1cafc0a0bee64a75b90c600313d3b446824f
pcp-pmda-systemd-5.3.7-7.el8.x86_64.rpm
37942492caf9f786859b2415103e5b4ebc0c69267dea087ed893d394deef005e
pcp-pmda-trace-5.3.7-7.el8.x86_64.rpm
788b42135383d3d3e29891c9088d746a3cec73b335ceba123d74cc7485d92c4f
pcp-pmda-unbound-5.3.7-7.el8.x86_64.rpm
7e9f02e2b312b580a969985523797ae105f67c75dd7d0fdb4d8e8ec421648e26
pcp-pmda-weblog-5.3.7-7.el8.x86_64.rpm
f012e167eaf763d8908d1f56a85659cedb77ce3b2f0568af50734daaf19c0880
pcp-pmda-zimbra-5.3.7-7.el8.x86_64.rpm
1f5bc88a2cf9f5aca0ac3f814ffb56b8852a2b5fa690adc9c676b004c2796377
pcp-pmda-zswap-5.3.7-7.el8.x86_64.rpm
e38b1b32a225ac0e773a10c49df473113c602d2e58702446355d5d5944936b48
pcp-selinux-5.3.7-7.el8.x86_64.rpm
0c80aba651a6d738b1437bceb7d9cc88423603d523e67de9fdb3a574248afa81
pcp-system-tools-5.3.7-7.el8.x86_64.rpm
f0e0d1b2ec9871988473d800224d427031dd19725080490c70fb944a21c5180a
pcp-testsuite-5.3.7-7.el8.x86_64.rpm
92021870bee5c92df2860e2ca5860da23dae9a47b27e4e47cbcc9b91816a23c8
pcp-zeroconf-5.3.7-7.el8.x86_64.rpm
a4325860c9a9e0b0dd9fb5801d5b83fa6fe6f3368a37519e2236ad70b2ad4a0b
perl-PCP-LogImport-5.3.7-7.el8.x86_64.rpm
f3cdaff8b6ad441b42acb20d38a12e845bb46a782f619c9b0aa7bef10f5cdc01
perl-PCP-LogSummary-5.3.7-7.el8.x86_64.rpm
e334610db252b3d394c6009ff10086f012404fe268ca8517038b66005e1a36d6
perl-PCP-MMV-5.3.7-7.el8.x86_64.rpm
8f348ee17908a1b0c01e846baa66b3ce580fb02c13267fae67af3e6bb0dc94cd
perl-PCP-PMDA-5.3.7-7.el8.x86_64.rpm
061290de4584cf422e1b7c33be79c4f6511997b7cfeb55ef7c0f3ca01ff9d646
python3-pcp-5.3.7-7.el8.x86_64.rpm
4ed2c50a8db6aa05bdc0cc68778bd1a99ef408e618fce74ef366cce4b6495d74
RLBA-2022:7475
flatpak-xdg-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for flatpak-xdg-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
flatpak-spawn-1.0.5-1.el8.x86_64.rpm
092dfe7f72bc10fa6b176644a851b3f7139c0c8f0b9d6dc5c2957925fb9dc54a
flatpak-xdg-utils-1.0.5-1.el8.x86_64.rpm
214e2855e04dae2982f996b9c3cc6fb99644190001a4e40eb56908c88053ee10
RLBA-2022:7476
xdg-desktop-portal-gtk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xdg-desktop-portal-gtk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xdg-desktop-portal-gtk-1.8.0-1.el8.x86_64.rpm
a85062ed9546335a63ee9c70d9af983ef3cdec29f602b3f07d985cfd390627d5
RLBA-2022:7477
motif bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for motif.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
motif-2.3.4-18.el8.x86_64.rpm
86ecba4ceba64fdff89a7f101adceb50d239963cf57986f5d25a33bf2c95571c
motif-devel-2.3.4-18.el8.x86_64.rpm
43139d0c2d1505c072a6a3da122d89a597308f6e4ba0ddcb35c0bb73036527f3
motif-static-2.3.4-18.el8.x86_64.rpm
b2238946b5e91bbfe0aba25eb8dc14f1209c844bb36cba8697df79d01fc0190b
RLBA-2022:7479
xdg-desktop-portal bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xdg-desktop-portal.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xdg-desktop-portal-1.8.1-1.el8.x86_64.rpm
4fdd21063a36da9322478dd1539c5c0b5150467da0d9deebad8276e7e5736c2c
RLBA-2022:7480
mod_auth_openidc:2.3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_auth_openidc, cjose.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mod_auth_openidc
cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
036daa5efe79a88cd86fc34272bf791a1688337a819b7ac9bf7c8b24bf919a06
cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm
6e8a435ea0dbb6f31c1af84f37ba26510f80207345b30485e8a404985ee00102
mod_auth_openidc-2.4.9.4-1.module+el8.7.0+1061+55d14382.x86_64.rpm
a7a7267411bd04af8caa7eb94670e7a9891c5013d3d13ee54f1249db8f50fe0a
RLBA-2022:7481
python-qt5 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-qt5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-qt5-5.15.0-3.el8.x86_64.rpm
84a3a09fcbccdf1a11d7b7c0480468953b090a06e1e609c92ecf9ea68025bb29
python3-qt5-base-5.15.0-3.el8.x86_64.rpm
ab6493c339c96cb6a973f3e1132c5f341ea7bd8f81dc0b1444bff9d661a57233
RLBA-2022:7483
adwaita-qt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for adwaita-qt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
adwaita-qt5-1.2.1-4.el8.x86_64.rpm
d8f67653bc6e3a790140c8429aa913b72ac6fb74f03f43d435e133befb9d5e03
libadwaita-qt5-1.2.1-4.el8.x86_64.rpm
87fecd70e89aa29945a28fa96049f3511b7240218c0d4f5accf1e6db0bbfafd8
RLBA-2022:7484
qgnomeplatform bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qgnomeplatform.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qgnomeplatform-0.7.1-3.el8.x86_64.rpm
64fb1dfdeff8c07b8660f54caebc5749cb648980112637684248d419fc897b91
RLBA-2022:7486
qt5-qt3d bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qt3d.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qt3d-5.15.3-1.el8.x86_64.rpm
f642deb151e9167b281d810050bbcfc12fc5c7f52d759374312c16165b49adb1
qt5-qt3d-devel-5.15.3-1.el8.x86_64.rpm
8d93413a59bc9466e402d5f66fa3d31d8cdb730c4861c6f236a762bca5f3f27d
qt5-qt3d-examples-5.15.3-1.el8.x86_64.rpm
e5fd66c3c33d003cf23cde7a101ea5df935c06b390903deb595718d6849feebe
RLBA-2022:7487
qt5-qtbase bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtbase.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtbase-mysql-5.15.3-1.el8.x86_64.rpm
dc359fa9c118d821e66dfb9bb15d5f8cb81214aa97059b17f053543b164b2283
qt5-qtbase-5.15.3-1.el8.x86_64.rpm
dc4b63e65a81d43416a0e4d32d9d32f766fa1b1d84725631f41127353beb9fae
qt5-qtbase-devel-5.15.3-1.el8.x86_64.rpm
c3b18b7f39aff76909fc8a46a972178b119927ad3390082cefb2f39aebf93ddb
qt5-qtbase-examples-5.15.3-1.el8.x86_64.rpm
0ded827c44ecf02c587c99ef8644b63dba7fb1861c93005d437eb3fe88cbf33b
qt5-qtbase-gui-5.15.3-1.el8.x86_64.rpm
e0cd9f93b35b74e750bf6b8c261852162e62ad5370b2b8c0f945410c3e054445
qt5-qtbase-odbc-5.15.3-1.el8.x86_64.rpm
0a326827cf4afdde4766f906369ebf8d4528fbed72547a40135c93dbe8a17fd2
qt5-qtbase-postgresql-5.15.3-1.el8.x86_64.rpm
3b161f3710bc965e70dfd1b827301ce1602132e50e9317ed889f4cd5daf447cd
qt5-qtbase-private-devel-5.15.3-1.el8.x86_64.rpm
75a20862f2c2d64cf34c949c5251bbbc187d513240d15a08eb51782bc14ca2b7
RLBA-2022:7489
qt5-qtconnectivity bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtconnectivity.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtconnectivity-5.15.3-1.el8.x86_64.rpm
be299dd4932be3deabe76096da6c38eb2be939a7a31213729c2739ea0d93e92f
qt5-qtconnectivity-devel-5.15.3-1.el8.x86_64.rpm
7613a3fff4065c91d19671415f34e42340e3bfa7fa14f6bb9bd2f3383cb21a4f
qt5-qtconnectivity-examples-5.15.3-1.el8.x86_64.rpm
0f221bcb899ad158aa0305ccec25b21c9d992c3315bedb6569f1b8083776e21b
RLBA-2022:7488
qt5-qtcanvas3d bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtcanvas3d.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtcanvas3d-5.12.5-4.el8.x86_64.rpm
c73830a1359e8613357d6481cf21cc3e3c681eaf5aeb3de83933c32a67930bb0
qt5-qtcanvas3d-examples-5.12.5-4.el8.x86_64.rpm
372384db2ebc1b1060416eb037fb407c9ee7070ddab840bc6a665293b249e9fd
RLBA-2022:7490
qt5-qtdeclarative bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtdeclarative.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtdeclarative-5.15.3-1.el8.x86_64.rpm
81491b48ae87d0a1ff98e6ecb754acc649785dd754a2109795bef669542da1ec
qt5-qtdeclarative-devel-5.15.3-1.el8.x86_64.rpm
ebf169329015e35b3e644bf229d92fdacc1a88d42d1b2afa533fb290cfa841ee
qt5-qtdeclarative-examples-5.15.3-1.el8.x86_64.rpm
b37e87d2f25e77843b77268ea4e3d2f3d52f34e075f60d40681420ce5868efdc
RLBA-2022:7492
qt5-qtgraphicaleffects bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtgraphicaleffects.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtgraphicaleffects-5.15.3-1.el8.x86_64.rpm
922bf366ab50acea4ed46c3b02aa697dbe2a8a93374f38a538b9e470e434f294
RLBA-2022:7493
qt5-qtimageformats bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtimageformats.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtimageformats-5.15.3-1.el8.x86_64.rpm
35f5a9434f1e60f2eb3bcb3bbda936e06749a8fb8dea14bbbc844ea2fb0e6d7b
RLBA-2022:7494
qt5-qtlocation bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtlocation.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtlocation-5.15.3-1.el8.x86_64.rpm
ca43c96196e6a8115fbf0cdf01a4489ade997dbd58048e924228498acd7a0097
qt5-qtlocation-devel-5.15.3-1.el8.x86_64.rpm
5bffd4353bab449e1392becd7834bf272be7651bb68a6794ce2f8e7ef64c8515
qt5-qtlocation-examples-5.15.3-1.el8.x86_64.rpm
b189cdea1cafc1ca79c697f4aa1665c36f4608b8115df8a76b57e41643b6a246
RLBA-2022:7495
sip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-pyqt5-sip-4.19.25-1.el8.x86_64.rpm
21db75baab778c8cd4ec6c33f44121a6532765db7ee209d7f9846b38528da3d5
python3-wx-siplib-4.19.25-1.el8.x86_64.rpm
90031a5995d9cb103e42d1a3f843f403f8a967738f3cb5ae563f9d12a1147420
sip-4.19.25-1.el8.x86_64.rpm
c68c49f9f4c35640f1d4650b4e787019062837c576c291ad21ff95c460b4e803
RLBA-2022:7496
qt5-qtmultimedia bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtmultimedia.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtmultimedia-5.15.3-1.el8.x86_64.rpm
1e948901d495ba214f0cf4e587ee090fcf45e891720c0110f77c3f7334c7344a
qt5-qtmultimedia-devel-5.15.3-1.el8.x86_64.rpm
81822f107128ae673ef95bebd307e7df7d6dead5186814de1ad54de356522e41
qt5-qtmultimedia-examples-5.15.3-1.el8.x86_64.rpm
3fe41f0f9ec7114616ad8e821087cb67530c043f8dd0a1387cad67a4c6ff0209
RLBA-2022:7498
qt5-qtquickcontrols2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtquickcontrols2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtquickcontrols2-5.15.3-1.el8.x86_64.rpm
91ff6355e91bf7fe76755e23c8ead79a6fa87c4f252d8e6aaba7ead0d5fdc9aa
qt5-qtquickcontrols2-examples-5.15.3-1.el8.x86_64.rpm
63e7a95e7a582c2d5eb16ab5e562fd91a1373fe43bd56f47b32321584087b902
RLBA-2022:7497
qt5-qtquickcontrols bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtquickcontrols.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtquickcontrols-5.15.3-1.el8.x86_64.rpm
e841695428818cb159ba7374630821ca61b5c031b7b7c626d8608a90ab763dcf
qt5-qtquickcontrols-examples-5.15.3-1.el8.x86_64.rpm
8824d8b3cffaa241822275917734a2895be9512f23237c6b7dd78fdcfd7bc921
RLBA-2022:7499
qt5-qtscript bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtscript.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtscript-5.15.3-1.el8.x86_64.rpm
b83e41de8c573f77493eb68b2f7d0b6fadbd3780c862ab4d842f8625dd9f5266
qt5-qtscript-devel-5.15.3-1.el8.x86_64.rpm
d59bd5ed20649f3fe127a33e219167c0acb851430a925ae2ae90fc8d17e9b840
qt5-qtscript-examples-5.15.3-1.el8.x86_64.rpm
a13d7b60509e536da399c7616845b03f02a2b32b766aa47c1e26dc1eb659ef62
RLBA-2022:7500
qt5-qtsensors bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtsensors.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtsensors-5.15.3-1.el8.x86_64.rpm
dd4d07314abe281986d456785a42987f84b669116f22cda25d5b51c13520e6f6
qt5-qtsensors-devel-5.15.3-1.el8.x86_64.rpm
33692a009b3d3696018cc619d05a208a45121b882e0a8efa610d5fb210d485e7
qt5-qtsensors-examples-5.15.3-1.el8.x86_64.rpm
b6e291636b85e6e0ce8ceff41b66c45d8bb855b05dafe996d16b604c7412d3ea
RLBA-2022:7501
qt5-qtserialbus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtserialbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtserialbus-5.15.3-1.el8.x86_64.rpm
c4db81d111757495d20ca6a7b68973c7e927a8d51396c163117f31000b81b3bf
qt5-qtserialbus-examples-5.15.3-1.el8.x86_64.rpm
50d8960d7d9c4254094cc5705434fbd6541ca8d820fb396a7f41f13d0d75e84d
RLBA-2022:7502
qt5-qtserialport bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtserialport.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtserialport-5.15.3-1.el8.x86_64.rpm
09eaa88aabaa25fd0f3d2de55688c787571ebd157e1519c8ac9b4c36cb899faa
qt5-qtserialport-devel-5.15.3-1.el8.x86_64.rpm
14e06e875b9033364a60bdaa8e0fcc4d2bd3d13f6cbd863471d9db02341b3f31
qt5-qtserialport-examples-5.15.3-1.el8.x86_64.rpm
29c28edda395b9cc97d2e70bfc48f2c82e4577652069d130ed35eb6eb2166483
RLBA-2022:7503
qt5-qtsvg bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtsvg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtsvg-5.15.3-1.el8.x86_64.rpm
cdbf4491b61986e0ee8cf4414e8070c8a2ca6d764ccb28080171454892e33ad8
qt5-qtsvg-devel-5.15.3-1.el8.x86_64.rpm
3f24f40dcde1e14c935483eb9817603474a86669cbdc10fa4482547b8ac5ab3f
qt5-qtsvg-examples-5.15.3-1.el8.x86_64.rpm
fbc08cea6cf9f441676ff57ddc1f83801e1bb61c406e5e9130e70f4f39783e8b
RLBA-2022:7504
qt5-qttools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qttools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-assistant-5.15.3-2.el8.x86_64.rpm
4786d6a96af720485ec88fdbe3bdaddfa6a61d3d087d56d0c5bc274229280b42
qt5-designer-5.15.3-2.el8.x86_64.rpm
b588430701a85e8277df8f757f3e8b4374d8867b9115d8fbb5b903a01edcf7ed
qt5-doctools-5.15.3-2.el8.x86_64.rpm
793533bdaf94da8620a691031351a0ac17770ef7e3256e94be2b450afd201d08
qt5-linguist-5.15.3-2.el8.x86_64.rpm
5eff7f0d07543875cfb87014838ee97e538245510cc9574ea9bfd51d8e56f772
qt5-qdbusviewer-5.15.3-2.el8.x86_64.rpm
7e1f1b3baa1205fcac3da36229d869f85839cfbc277dfed7bd8021f414e37f1d
qt5-qttools-5.15.3-2.el8.x86_64.rpm
3e61f3b558d79f3a3132909a1ba6e6acd16ded1a93f5bd5dee748ecab73c0b34
qt5-qttools-devel-5.15.3-2.el8.x86_64.rpm
a23ae3009fe541d82308977d2b4b5075f621e055a13d6e664fd29d7e6b1ce2d2
qt5-qttools-examples-5.15.3-2.el8.x86_64.rpm
2d11266ebc3e3d3fc23e27f5bb078ce38b24bf9d569bf03f7a21f1e0ac8e48fc
qt5-qttools-libs-designer-5.15.3-2.el8.x86_64.rpm
2c97dbd47aecc3b760b3c2d9284150bed26a1b97e65ac70fd09eb827bf11e512
qt5-qttools-libs-designercomponents-5.15.3-2.el8.x86_64.rpm
ff65c962ce9aac0643920b97bba917dc2ca0b543b6abe5ed9ec063ac361291d7
qt5-qttools-libs-help-5.15.3-2.el8.x86_64.rpm
f44d75132665fe1e52e6caa7dceb6be280b5b2150187cb8db3f5eae7e33a3598
RLBA-2022:7506
qt5-qtwayland bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtwayland.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtwayland-5.15.3-1.el8.x86_64.rpm
8769fcd7c04ba583f9aa0c984102efcdd0e5bc577c4c69643b0885163b293c83
qt5-qtwayland-examples-5.15.3-1.el8.x86_64.rpm
330235f622ad7be14595e9ab681a33e0bafab0c261928bc39dba45dbd7e112da
RLBA-2022:7507
qt5-qtwebchannel bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtwebchannel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtwebchannel-5.15.3-1.el8.x86_64.rpm
b5c86d314559448bf51dace12132f8f443f0c120428c4a101d70a4bf25a33be4
qt5-qtwebchannel-devel-5.15.3-1.el8.x86_64.rpm
1976ea364e37d03ec715bea5a4e6e3280c10cf657ea2c518229bd8278f0f3a48
qt5-qtwebchannel-examples-5.15.3-1.el8.x86_64.rpm
f59a44f98929e829dad4e3e13e21851b64c8def131f0bc093a78e9531cc1f3db
RLBA-2022:7508
qt5-qtwebsockets bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtwebsockets.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtwebsockets-5.15.3-1.el8.x86_64.rpm
b4d4be2415c4b0e76a3503f8a4c0b18902e7e7a5dc1b1c3162c6f04f64af2b95
qt5-qtwebsockets-devel-5.15.3-1.el8.x86_64.rpm
ff3872ded5fcbea63b4e0b5a2d784890a4340d73c577e7b76cd96aa8e8ed3169
qt5-qtwebsockets-examples-5.15.3-1.el8.x86_64.rpm
79320ecf2fb9a33400357523fde690f8feee0b0387b6b0f1e70afe532436fcd8
RLBA-2022:7509
qt5-qtx11extras bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtx11extras.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtx11extras-5.15.3-1.el8.x86_64.rpm
78e2cdb2bfddb5279ebb67065511d1bdf66f319faf4c3e87bffffc0f8eee4f35
qt5-qtx11extras-devel-5.15.3-1.el8.x86_64.rpm
8f6b8ee7473805e8b5626940f0874ba8cbc0a5577052fe7ceaf760782f036643
RLBA-2022:7510
qt5-qtxmlpatterns bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtxmlpatterns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qt5-qtxmlpatterns-5.15.3-1.el8.x86_64.rpm
1794e993e0845db24c600f3e8c3273016bad7b19d1e9214a8a6afe8b6c54db31
qt5-qtxmlpatterns-devel-5.15.3-1.el8.x86_64.rpm
9441b21ff1425ac34927e4d4d9e559dd4d8f9579977d4c4d5282025d3ff7a42e
qt5-qtxmlpatterns-examples-5.15.3-1.el8.x86_64.rpm
c19c46e282d2f0415f76f45271d9782ca8ebefffd8143406a755f0303e077eb3
RLBA-2022:7513
crash-gcore-command bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crash-gcore-command.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
crash-gcore-command-1.6.3-2.el8.x86_64.rpm
c62a9f19df7f7cb1c3c040df142636139a09406b030fdb601071fb30223ee44b
RLSA-2022:7514
Moderate: fribidi security update
FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order.
Security Fix(es):
* fribidi: Stack based buffer overflow (CVE-2022-25308)
* fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309)
* fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fribidi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order.
Security Fix(es):
* fribidi: Stack based buffer overflow (CVE-2022-25308)
* fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309)
* fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fribidi-1.0.4-9.el8.x86_64.rpm
140455eb981d3ea0296f5719b1026b29f8e6316caf885301b5607af38483edec
fribidi-devel-1.0.4-9.el8.x86_64.rpm
faba78d5909ef3519964138414e4eb0d3a72a2b0251d407382b1351e9dcfd1ac
RLBA-2022:7515
papi and libpfm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpfm, papi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libpfm-4.10.1-5.el8.x86_64.rpm
494bf65d6993e1af506a1289877dee03a3e8acdebdcedc3d56f0e6b175ff064b
libpfm-devel-4.10.1-5.el8.x86_64.rpm
0596e3333ad57a7cbfb1eb7205ff0fb33f8eb32b6651eb5962a8dda3c39401d0
papi-5.6.0-16.el8.x86_64.rpm
f3e910ba21ae8d8c84fb4a863e4e974a44a4c98136b70072c23dcb041744a7f6
papi-devel-5.6.0-16.el8.x86_64.rpm
7460659d870a675802deb1ae4b0b40a12c7ed26bb6568733a0529836fc58b526
papi-libs-5.6.0-16.el8.x86_64.rpm
923001360211247341c2e32a8aaad2649ce1fe5ae82902426d96f39750724bbb
RLBA-2022:7517
cscope bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cscope.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cscope-15.9-11.el8.x86_64.rpm
3780ca8f1158a74d20e09e7290b502ca445d9e9bf09e8335a0d771a682946580
RLBA-2022:7518
dyninst bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dyninst-12.1.0-1.el8.x86_64.rpm
12a4d57690143e288538a6eb2ae079e312f2eaba2baaaf9e24ae018daa455a7a
RLSA-2022:7519
Moderate: grafana security, bug fix, and enhancement update
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348)
Security Fix(es):
* sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* grafana: XSS vulnerability in data source handling (CVE-2022-21702)
* grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
* grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348)
Security Fix(es):
* sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* grafana: XSS vulnerability in data source handling (CVE-2022-21702)
* grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
* grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
grafana-7.5.15-3.el8.x86_64.rpm
34d4eb252d22d335ff8f1dc3ce270d6e7b354af349860e74a39d430c57b6eff3
RLBA-2022:7520
fence-agents bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fence-agents.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fence-agents-all-4.2.1-103.el8.x86_64.rpm
a17f6c28510305c719c3cf348360783fc48c50897dfcf6bf7bf88ca89161524a
fence-agents-kdump-4.2.1-103.el8.x86_64.rpm
a2856762f3dc88db905edfc92ab1e6029d7fde90796c1e304f377a225f3b88bc
fence-agents-kubevirt-4.2.1-103.el8.x86_64.rpm
5544706a9d2b7aa240ac81883b8c2f01c445a124ae7ab0b5898271d5c1b63608
fence-agents-redfish-4.2.1-103.el8.x86_64.rpm
5e65d9e3b9ccb0357a7b0d13bd2102f095a342c4269c016e404fc9b762e1438f
RLBA-2022:7521
tftp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tftp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tftp-5.2-26.el8.x86_64.rpm
de51b5d08092f05a1fee9c26441c20c3fce36f76015ea2e14d4b59d16490cf04
tftp-server-5.2-26.el8.x86_64.rpm
f408a44bc2cec703d78478ae3359aa2ca95962d644d99f80ec93c8a02bee38f3
RLBA-2022:7522
go-toolset:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for delve, golang, go-toolset.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__go-toolset
delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
be45db0ede57b9a9918c621811a3aaffb944f36ae3770ac645652983d9c3e4a7
golang-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
72e59fc43726600f51602f6126e1e9efb12dcdd525b52613b360a91d6e28faa7
golang-bin-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
d7246676585f4146b680bd263905fc30fdbeae6895072b8210a6b31081682d39
golang-race-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
89897b9645358e6c32cd4c81afbcc34046c15277fe62873a5dbfe0a8afa79ada
go-toolset-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
95b1b435a0fb426600a6538735c5a98a44af71e0fb4de962a6cec1cc1e63a4c8
RLSA-2022:7524
Moderate: yajl security update
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator.
Security Fix(es):
* yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for yajl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator.
Security Fix(es):
* yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
yajl-2.1.0-11.el8.x86_64.rpm
daca84d640abaceed94eaa249bcf7f85df19201cb41e1be7a908d4ee8a12534e
RLBA-2022:7525
valgrind bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for valgrind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
valgrind-3.19.0-1.el8.x86_64.rpm
3e53250e78ff4505641d6fa1665cc6a8e0a51972017e583191e3be1622f367f0
valgrind-devel-3.19.0-1.el8.x86_64.rpm
6b9ff3fcba5a03dacce33410d00ff6052bfee362e885e4f0e06ef7405c0ce218
RLEA-2022:7528
ruby:3.1 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__ruby
ruby-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
f4004fc8f1fbe42230b6b849a4f2c487dd17a20acd7e046d1b886ca8adba8391
ruby-bundled-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
b46fe1f1f933210251597c5b927c4e78baa1066f0a0e2a859a898c4f7ebc77ee
ruby-devel-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
c659134bb04568a0f5cad3ea76e2be9194ed247070fcc2700fac4c027e78482e
rubygem-bigdecimal-3.1.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
975f18976d211bce5dbefe7ee440a278295698833a6bb4d2aa8f059e34de1002
rubygem-io-console-0.5.11-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
d8d1cc2f174f93e306e1632ea97393986e5d8a0a2f793baf916c2690e814ae5e
rubygem-json-2.6.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
00bea2d03d3884ba228fc716df85e81537ceaa4fd80c67a514493f2bf83cd46d
rubygem-mysql2-0.5.3-2.module+el8.7.0+1081+f0a69743.x86_64.rpm
c2c8f820300b260bbe21037c29d089b5c685d944baa6c9a33f992de1ab7ef3b5
rubygem-pg-1.3.2-1.module+el8.7.0+1081+f0a69743.x86_64.rpm
f08ddfa2201801ae0272d077d8f5ced1fdf3c416bd330e5569710739be04ca76
rubygem-psych-4.0.3-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
bb252b125709fa8b52739a2c8e948567e15e6b8887c0cc4f5650f26d2d38f8e2
rubygem-rbs-2.1.0-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
d51cc0321fbd69dd43120d6b872f026d9cd5831dec96aa50e96df871a0edb4dc
ruby-libs-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm
f313a918d61bd5ae15f35483b3ee33f9ad655bf1c4467de40c205fb9a86c0565
RLSA-2022:7529
Moderate: container-tools:3.0 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__container-tools
buildah-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
08f071670fe28ccd63e3840c62819c2b25d38d2287c3b63605626114e544a6eb
buildah-tests-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
fca90c4be12b6d3078b7d6d682abe4434fa6d956f655bc1731879a67dc6c425c
conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3af0efabcac69789ce47fab592ecc29899095fcc2be8f8a6201db544376bc188
containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
72c89a742001d7ecd973e302bfee6a3d5121ccaaf3e3cab2f40d20c90058455b
containers-common-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
abc291da55ad2008cc79640586a2576695de84b8e44f1c5e48dcaa247a689cc0
crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
3bac52abef39af2ee12ebf4e077ade0d402dadc99caa24c4d1b58705e995b3a3
criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
be486649879530cca389afc64ef55a2e4b470cd5bf55920f3a24361b5e9614dc
crun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
d530ef5cb02af56564a0026e1db9aad80ed8b96690e5869a16526fec013c76af
fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
9d44c8523e2904231e5896155787c475fbacc6975658155bcac1712b0258bee4
libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
0e143c9be6708ac385c2e06294d4ebab4548eeaf1048bfa6192d0601912e6466
libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
50da4ecfeaa1808f71135ce60f3fb8db84b397f6573175c4d09d8d27fb222e5f
oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b8b6716150a0349f8c06e4d880649dc2909b7f4835f759a9b76c286a18011c6
podman-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
110128fa91767a24299b7b40ea77ad98ccb477c231150e66c88370e3ea47c249
podman-catatonit-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
a14d125bcc99bcd1c40e8a2cb27780e523c46a358f60cace03f148289f3ab0dc
podman-plugins-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
6e9b5997c40ffd4377bcacd10528f1cc38441c04d0afbecbb192e5aeb29c271c
podman-remote-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8b4a1ed3a0c0618e372a5cf506864b6b336f186190d9016056a979d46bcf4847
podman-tests-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
bddb7e274024806035e7a1e8ca34d2716099d36084975731d99de1df93264289
python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
eade283933223843b783badb4d2d84d54d1f751a085470bac068e7c713c80111
runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
79bfdb835792422b609b305d6e26c8936c7889300e209a719b8ef0a26f7366a2
skopeo-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
2d660e8c7f3942d3f67cc57ddbf24728bbe91c63b10954e46d93171785575532
skopeo-tests-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3aac4f2b10e39dea615da0233a32a6be25ac7294fee165483e1e63c5ceae577
slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
8404a00462590835516bf6007cfde530d3c1e5699d92a4ec7d44053a393e91cb
toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
f3449d764b4beab49aa6b127bf8f18d39fb56544c0c1c916149f763815937f3f
toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
20610af15eff6dde3285ae15d89140f60a0cf348e167eada4d525650269c4f05
RLBA-2022:7531
evolution-data-server bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evolution-data-server.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evolution-data-server-3.28.5-20.el8.x86_64.rpm
c567ccf699097288b1861e2d0ffcaebea3ea10b9508af5d7ad1c84c4a7639db6
evolution-data-server-devel-3.28.5-20.el8.x86_64.rpm
bd6853c427551bbe5935caa4eea7b54008a050b4567457d16fcb71366cd50047
RLBA-2022:7532
evolution-ews bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evolution-ews.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evolution-ews-3.28.5-13.el8.x86_64.rpm
a7c0a8ee534fa31c5b6c06f92db8f26259f8bf9eb6b2c025dbf3e145dc84c545
RLBA-2022:7533
cheese bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cheese.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cheese-3.28.0-4.el8_6.x86_64.rpm
1cd8f7b5f5f9888477b2bcefcb93b5be066a6590b2c641568c3f6181b6285412
cheese-libs-3.28.0-4.el8_6.x86_64.rpm
dd228cd48876d9151169a9ea0a1a7038423436c278231b7f41c1acc0fd374499
RLBA-2022:7534
mod_auth_gssapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_auth_gssapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_auth_gssapi-1.6.1-9.el8.x86_64.rpm
59074b8ba68426e1ac78f601751ae94a3e7346d77490e26d283cc0e43456b588
RLBA-2022:7535
stress-ng bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for stress-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
stress-ng-0.14.00-1.el8.x86_64.rpm
09e5fede907ee0ee3049dfa622b48736b808198032227dcf05bf1ca2a911ddf9
RLBA-2022:7537
llvm-toolset:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for compiler-rt, lldb, lld, llvm, llvm-toolset, clang, libomp, python-lit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__llvm-toolset
clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
4019138e3c053013c923f5b29f8f3d8d6665f4bc966553b1722eeb52358105cb
clang-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
32adf389fd14a400c7714351b91ec01d22d2b7df50c66609f2017855d5313ef7
clang-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
1e9ae8c22585124989957376e435e92ce7a611f9daaa4a6b884b91f08e4f91ac
clang-resource-filesystem-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
570e5e123e4974910864f4b56d333412341822f894bc90a416968a0cd0b79487
clang-tools-extra-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
9683b2d54e15e1273295c2799595215d7e4019716f54a130eaa5285e5aaff13e
compiler-rt-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
905b2cc701a2f5785c66604609207bb95341c6a02281d01db8d402aa02688a19
git-clang-format-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
f36b25e63fde63ec7bf1aaa3ca23afd3ddfbe58d94445462370fad7df7abc402
libomp-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm
baa0ee79ba1778f3f7f8b0002202d6f10bfd9b62fc4556a642887ee14c3ff543
libomp-devel-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm
8d2a2f4aa8c374c2769dc4bd7cf93dc52e2a2a5b2791a9498db42669772ef424
libomp-test-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm
cbb90c4dc11520376ced98704d10028185ad9002dbb7b23c664b803b7db2b2ad
lld-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
6761adc0183eb3675d79aedc216bccb6bf03187e7658d323bb8271fe33d8007d
lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
648cbc670df222c9909ce2f4b07681ded1a5b574446b574d0e658844101a07ea
lldb-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
140e0416e72aa350be3bd1a30189f19121b937f498cadf919bf213ff8ee5f18e
lld-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
b3cf3fc434fbccdfd091bf2642dd4453fd31d1a36f30a73370953a54cb95200a
lld-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
ac581ec9fa342d38c1661237d260ceff68c8daf89a9cbfa823291cbb804cdd56
llvm-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
025dd2e04a1d7ec2304905d7b86da94d7ffb46c372e72ecf2d91766d25f97996
llvm-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
c86f75512c19a0afae71e4eaaeb9e09613df6c8b00295c6ad01b6e89cf20fbae
llvm-googletest-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
e66365da6dea97c46700dda219e87d2770be98f57b07cb687a3b96955a8be915
llvm-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
db3cd9ebcbda9282c40e20386e21a30ebf6d178592284ddc2f4a86962761fd0b
llvm-static-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
39e1f7fa0779fb638208df74797475233aa11a53a02a342f8ab820fcd2713983
llvm-test-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
436b8dca43fbf2daf6065a807d9a4f5036d71f8cb3b4e98e805509329f2021da
llvm-toolset-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
698737c91866add724a82bc2b32e6793a7e4ba02fd11d100f4ed132fc59dbb48
python3-clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
8f99ba21f59cf14ff807ae1042b5ffd06471af728c2a7dd0bb3cf0fe70d0d9b7
python3-lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm
365f752b0027d7cf9015fb9ddbf566777801d9d12348801b4a45fcc9d2889d29
RLBA-2022:7536
nautilus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nautilus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nautilus-3.28.1-21.el8.x86_64.rpm
11e67d5eb29255f83fb1a0372e062574d29d28288ca886f009b7f9ff6286c20f
nautilus-extensions-3.28.1-21.el8.x86_64.rpm
dc186b11c5054e93db20cc7e3fff78501893fd9296dd7928b46ec4d42136f47f
RLBA-2022:7538
systemtap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemtap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
systemtap-4.7-1.el8.x86_64.rpm
8d56d3f7f25b1f0ab7989ff2aedccda102c6373c51d80a97c006edf9c4e3c8a1
systemtap-client-4.7-1.el8.x86_64.rpm
94c0288987480045fb0360a19e6d57508930feb1357b047c75317cbc59e83bc7
systemtap-devel-4.7-1.el8.x86_64.rpm
3e3173bc5da8e298e2b65f563bbfb017e313d582a7d2f656c2d8ed7719c37a3e
systemtap-exporter-4.7-1.el8.x86_64.rpm
efacdbcf9a4f2a485bc1eec0673086181fbb3033311917ba6dc8e15760f3ad9d
systemtap-initscript-4.7-1.el8.x86_64.rpm
c53ee31c2b1b778c4b0a2bdcc1f177c2c9992c1f34f0c9137c0ff1cc67d35c0a
systemtap-runtime-4.7-1.el8.x86_64.rpm
40c542c53113d9bdd6da664e1ba4c1299c4c0ba3615499bc6dc376c52046a0b6
systemtap-runtime-java-4.7-1.el8.x86_64.rpm
bf9152e68d8091ad35919157a52cd06d3546b3cb64cc85832a682cfeb3f463d9
systemtap-runtime-python3-4.7-1.el8.x86_64.rpm
c39170333c363e4789894a8989db4965d986e1fb8fc9236f1ea189b8b2bf9ddf
systemtap-runtime-virtguest-4.7-1.el8.x86_64.rpm
b786f6bd861b7a5d8ad4c754587ffa696942aebc3792e0e65bbd1bf70cb0b75e
systemtap-runtime-virthost-4.7-1.el8.x86_64.rpm
3bff66eb561bc80457981900ea1af095cc3047101321b009910b86dd475ed28b
systemtap-sdt-devel-4.7-1.el8.x86_64.rpm
5284d6c6e5f93880d0520b6954a4e3401bca1be7dc8e492280105760bd21c905
systemtap-server-4.7-1.el8.x86_64.rpm
e51f53c8099209f335ec89005182df88b9a071b181c73a1b1bc441fdb61d7487
RLBA-2022:7539
libgdata bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libgdata-0.17.9-4.el8.x86_64.rpm
75d4aa16927ac0856e33a7da1df09d7f51c39b0a94d686e5172c151e2935e090
libgdata-devel-0.17.9-4.el8.x86_64.rpm
f627bf3a4956c741c8ee7e1a6be9a5ab9bde87a9e139cd42d78fbdac26368fc5
RLBA-2022:7540
idm:client and idm:DL1 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__idm
ipa-client-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm
0f015ca9126dbf6adf72e89def936c93720d13bd3ab39996a07681cdb1e6b968
ipa-client-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
5627c47f2914e7189d0ec801e8d67e9c32ebd02b79728197995f6d952274d6df
ipa-client-epn-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm
89d738551a9170fcc56efe16ed2266831877c8de1d6fc8b636920afb52a22826
ipa-client-epn-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
16f5cc61defc5d37520dff7f5de7040f82348302fb8e08991f54dde571b6c5e9
ipa-client-samba-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm
da345ecd063a748b18217785da5198cd2c19e3a917c8ca0b4107fc2c11db3b37
ipa-client-samba-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
ec80710ad400a4e43d183499f085e9a737e1bdd47ed4a1ff1b01c0eb0711b90e
ipa-server-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
980b7ef4cf9445bb17abcdee681a311357eaaf62a14e927998807201360dee40
ipa-server-trust-ad-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm
62e27f55b52932cad8b3fc8b029753ae0b93cb1a6dc16e1975d7c62c9cd690ff
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm
b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLSA-2022:7541
Low: redis:6 security, bug fix, and enhancement update
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873)
Security Fix(es):
* redis: Code injection via Lua script execution environment (CVE-2022-24735)
* redis: Malformed Lua script can crash Redis (CVE-2022-24736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for redis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873)
Security Fix(es):
* redis: Code injection via Lua script execution environment (CVE-2022-24735)
* redis: Malformed Lua script can crash Redis (CVE-2022-24736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__redis
redis-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm
993f80907022da689b54d819c1393c56e94702a0bad0edaeb5517a2db1d874f9
redis-devel-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm
41aaf2f81f3473eefbae0eaa3f6d923b5886dbd8f1517b4d3d3143387e41f404
RLBA-2022:7542
subversion:1.14 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
731bbe79595f494e581798261d3910616e1bcdbae2ef7f981b215453cf5af705
python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
b9453a4cc7f514c6b5d4fc9635d55f1cf4c75dc38cb5f774719646b8d4e57001
subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
2089246938eb318f05ba38eeeb5cbba0cf766f9b1d2add194ed624c6123087f5
subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
7a0b71de12a9a00fa90c466b489c01106b0efb79cb41ff2eba7559ae09236461
subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
117b77bc021f04f14594b64923ba7fc5d339150c0c18bcaac03c2830da8dc238
subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
e08caf8753168202fcb5ed6b9c38e8bb3897bfa19054afb1746cd7ea65d6fd4b
subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
2f746f1042536d1ba89f58dfb7530418fc05f4c86af692b53a40239cb12a83a2
subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm
af4c11a20b867799fde5ed6bf4dfb553c6904e4e9c46a1824273bb52354920a0
utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpm
58848ac20523ce7eb107a8b9ce747474ded2c3f55f12f1f6c23511e45c735e6b
RLEA-2022:7543
subversion bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subversion, utf8proc, libserf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__subversion
libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm
16f0154bb58b939d80e145c2c77bd093963d9ba62ac46bedb133b0e60d6ec50a
mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
dc6f52adf8b10fd6b240c72b5ea1d62e0bbbe3d5bcc47380339117fc1953eb3f
subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
802bbeaf38639b1e42096fab308cf1bf8efe3df3a1b3c3720b7a5ac3939b7265
subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
e5c5a44c338f73bb0445575d27aef6a4b1a7d1ae1f7246b7bce10b6fe5782f47
subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
152d3eccdd9928c4d97f5a47117cbd0d224ae5b7c9886e3cb0414f645ad85d82
subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
1837382796e426c99566575486d20468e5e08d54a9feec23a37f37664c105dd1
subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
c019433f83ba3f54fb215c6f1a57e182c582f2f7b5aba6659278fb65bf8216cd
subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm
a181eeabc6eb2ac08c26cea039b8776703ecd01ee9af67eeddeef97c3765418d
utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpm
58848ac20523ce7eb107a8b9ce747474ded2c3f55f12f1f6c23511e45c735e6b
RLBA-2022:7545
zenity bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zenity.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
zenity-3.28.1-2.el8.x86_64.rpm
77daeb3134ae0280c77c265cca49f6116c1390eaf3b1c5ff3f0aa910d1a4b54d
RLBA-2022:7546
createrepo_c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for createrepo_c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
createrepo_c-0.17.7-6.el8.x86_64.rpm
d828fa1173d6e0b69249da5c965b6ba3cefd303fb390e485c768f4c540e044c0
createrepo_c-devel-0.17.7-6.el8.x86_64.rpm
b1cfbe29d70723acd0b6d83293a4c66c85c78f82c8db6abf5d57b4b771e0bf43
createrepo_c-libs-0.17.7-6.el8.x86_64.rpm
035cc734eb41822da21c95e6216047da87841c6e556820a07eeb3cc719b0c6b2
python3-createrepo_c-0.17.7-6.el8.x86_64.rpm
16e83c095a1c3a4654b4ffcc714e7e93fb5c93a626f5e6199116f082a4357b62
RLBA-2022:7547
gnome-shell bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-shell.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-shell-3.32.2-48.el8.x86_64.rpm
e50fd5ed905dde25ae8c673f919534cf9cbb6c339dc177b6afa62173acd319ea
RLSA-2022:7548
Low: Image Builder security, bug fix, and enhancement update
Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.
Security Fix(es):
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for cockpit-composer, weldr-client.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.
Security Fix(es):
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
weldr-client-35.5-4.el8.x86_64.rpm
19c8b20aab31af7a43f7ce7a80a348a686adb340b65afda7f6c4d83d25da3485
RLBA-2022:7549
rust-toolset:rhel8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rust.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__rust-toolset
cargo-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
e2aacb62b0a04d09e65f77eb3e6956c748376c05f6256ba7280f11242641aa8c
clippy-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
b55e65d264a1edbf17dbdad814cf6d1f0c5d4f2eeb74f2fe3b544b7b8696ab5b
rls-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
9292c0914637091ccfc4548010a93309190976fbafabac36017f925663261924
rust-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
597b07fc8c22d4eaab9d77ed221630f5c150dde5294dcdba7bab4016ed400129
rust-analysis-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
9847d19de31f87f39a3e468cd7dc83888b38031bf3392fea1421bac0c39b9dfc
rust-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
05711b5b03f2ce3d391815ff403527b9b4e60fe998d3be1ee6028688d2efa1c0
rustfmt-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
616c1c9558c7be14424a13966220a074edb22bbf1182e1a97283cf5d8b322054
rust-std-static-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
d52db076d0134d47baa62886125b1f01002747e35c1f68f533234f97f444edc2
rust-std-static-wasm32-unknown-unknown-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
af938bf001ff2a4eac39304861b05bfae61be186e5216dd9e618f6c58f208a44
rust-std-static-wasm32-wasi-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
0e339fd20d42a84dc580f26aa49abf344a75c21ad438cbda899da6f81551cf3f
rust-toolset-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm
f322dd661282948b26c683217b23d22ddfb41312c27b9afd50e8b9ca9736d462
RLBA-2022:7550
gcc-toolset-12 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-12.0-5.el8.x86_64.rpm
bb3bb847cad532741692cd6ee4aec06211ac3813583ac942506f14de75cd4492
gcc-toolset-12-runtime-12.0-5.el8.x86_64.rpm
bbe5cbe4d6baa144f7ee3b6e9da8858b68014eb39b1bb695e7cda3202627dd7a
RLBA-2022:7551
open-vm-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for open-vm-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
open-vm-tools-12.0.5-2.el8.x86_64.rpm
d83ff8d9a0ee44ee88557c14e9d0e0ba1f914c46156a3b7a72110c4c75d4e18b
open-vm-tools-desktop-12.0.5-2.el8.x86_64.rpm
d26ad2544eed14cc8820cd48dcf587e2297bb23b69453540f39594eb1ccaf93f
open-vm-tools-salt-minion-12.0.5-2.el8.x86_64.rpm
c480803dfafaea1e468ec9fc6abaeb0ed847e4bc9652ab0c2d3ed6bdcf24a83f
open-vm-tools-sdmp-12.0.5-2.el8.x86_64.rpm
1edeea21be29003c5601fd52c98b39935890b33f5cd60fa27f28653260b6369f
RLBA-2022:7553
nmap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nmap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nmap-7.70-8.el8.x86_64.rpm
c7cc616c87e54be47898034e3444f285fbc48dc1737a35c08e1ca53b580355ca
nmap-ncat-7.70-8.el8.x86_64.rpm
b347dd5a8f73d8a60b1cccfc7430f170ad6cdb62a21fc992bd9e9bfcd7f62763
RLBA-2022:7552
389-ds:1.4 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for 389-ds-base.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__389-ds
389-ds-base-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
fd4b8faa3537e6c1ef532c877e223a0352bcbf54a5b9b45b7436afebd70bc5ef
389-ds-base-devel-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
c85f42e199ab8b7796366b25ac528cff406ec413dcd43e67ebb60d055b867969
389-ds-base-legacy-tools-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
0fb9e7794dd320934e292c19fba27baef221225ab2b85d3f635ecb6493822fa8
389-ds-base-libs-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
90b0f1fb9776623272a2c53715d6be6c6bbc0a1baab67d9618c10be91668bb65
389-ds-base-snmp-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm
af40980abeff5a461d09cec4b5ed13facd6771a658af746f29f71348b2fdb60b
RLBA-2022:7554
cockpit-appstream bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit-appstream.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cockpit-pcp-276-1.el8.x86_64.rpm
724958dd3523c678b448d672af28f3414cf897a54eed5e1d95b308dbd24ec64f
RLBA-2022:7557
ostree bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ostree.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ostree-devel-2022.2-5.el8.x86_64.rpm
d9cf6e883b8e44fb17e72fd716130ff67e206778409ea9c95dc624e57d693da1
ostree-2022.2-5.el8.x86_64.rpm
6470b17fcf53a73a65c26431776bdd19a96694fc30153338c34f37c48f71d821
ostree-grub2-2022.2-5.el8.x86_64.rpm
6d647b18115b7a3b11910ec40e37f01da98a46f6cab9c2b18667930f6c2b70ab
ostree-libs-2022.2-5.el8.x86_64.rpm
1418313af255a42d78576f3469a52569a8f3714f631f830d7327af87e97d9429
RLBA-2022:7559
lasso bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lasso.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
lasso-2.6.0-13.el8.x86_64.rpm
5db64309da2504980bd16ab3f66dd92e05db01b6cf53e6d5303f3fe3794f1c26
python3-lasso-2.6.0-13.el8.x86_64.rpm
a48c00e1bbe40437cea54bdb5110ab9a69fc60270c404e1ba36bd27ac62f09d8
RLSA-2022:7558
Low: wavpack security update
WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode.
Security Fix(es):
* wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for wavpack.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode.
Security Fix(es):
* wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
wavpack-5.1.0-16.el8.x86_64.rpm
c6f564012bcad071e357f40e1fe440d2450dce3d861234012db5a202195959ab
RLBA-2022:7560
frr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for frr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
frr-7.5.1-4.el8.x86_64.rpm
40349304cec6cea14759a270205c06b16524aab130b788b6dc1b76e078e85ffe
RLBA-2022:7561
crash bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
crash-7.3.2-2.el8.x86_64.rpm
38f279bf1df01be9e2748c6e471e0bf5a567a59ef29c7d5480e5e129adf6f8d8
RLBA-2022:7564
gdm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gdm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gdm-40.0-24.el8.x86_64.rpm
5209a4abbd8ef0be8f1f69de8cf1aa055cf62e89887c0820d5c7460d3bce1135
RLBA-2022:7565
gcc-toolset-12-gdb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-gdb-11.2-3.el8.x86_64.rpm
113e65b0dec403e8d27a46c7614e0d52cbaa8ba67d219a7584d27cb96e3a4389
RLBA-2022:7567
evolution-mapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openchange, evolution-mapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
evolution-mapi-3.28.3-6.el8.x86_64.rpm
7f231b19829cf1654fa538ebb26420543f4afaf10fc28342c9dc46790c17a214
openchange-2.3-30.el8.x86_64.rpm
d360ecf50110f43847ce2928f60ce179feab205b108d75c05efe0e4cdbf84362
RLBA-2022:7569
gcc-toolset-12-dwz bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-dwz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-dwz-0.14-2.el8.x86_64.rpm
ec341f65c71d9195a1cdb04667c4a918343269a7eec2916e770e26c5a8891e4e
RLBA-2022:7570
gcc-toolset-12-gcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-gcc-12.1.1-3.2.el8.x86_64.rpm
5f036e6fb65cae4c6e167c2689023e3829260ae53ee5eed33eaaaa1549f6853d
gcc-toolset-12-gcc-c++-12.1.1-3.2.el8.x86_64.rpm
ff3c8e494a47328d8b81142cde56486cdee179aef1627015f538b28afaf3d533
gcc-toolset-12-gcc-gfortran-12.1.1-3.2.el8.x86_64.rpm
dcd4889891cbe7e92a591f9698fb865a74fff7e2163015e2dbd8fcc69a7ed761
gcc-toolset-12-gcc-plugin-devel-12.1.1-3.2.el8.x86_64.rpm
e105fc2a8b63133b835544259e25d89cf005e78f9f3ca67f11d0091c3dc181ba
gcc-toolset-12-libasan-devel-12.1.1-3.2.el8.x86_64.rpm
04a5c62c5052f74f31475db17553ab88f39815d74d1011733396dc7418901948
gcc-toolset-12-libatomic-devel-12.1.1-3.2.el8.x86_64.rpm
c2112498e3675685653f75031aa2db6dc146cd168fd0784cad59a291858fdd0e
gcc-toolset-12-libgccjit-12.1.1-3.2.el8.x86_64.rpm
844e43a44a05f61e469a7a6f329f260c76759af94ae2887ef9e95e194236de85
gcc-toolset-12-libgccjit-devel-12.1.1-3.2.el8.x86_64.rpm
d5376961ba53bb5cd32ae4a4c045b76e7624d2646b2d8a38c962c246eecfe129
gcc-toolset-12-libgccjit-docs-12.1.1-3.2.el8.x86_64.rpm
39eb2a4794ae978a24c235dc832738ee081e0a7f9a20fe2fd47d72959a7f0b20
gcc-toolset-12-libitm-devel-12.1.1-3.2.el8.x86_64.rpm
8d8f6a9da3763dc20c3c10290992837e3700b8d43304ef190d4ee7c1979cdb20
gcc-toolset-12-liblsan-devel-12.1.1-3.2.el8.x86_64.rpm
d78f4e39473a53250d264b7a036ecb0ac3a1b6a96e2c1d0f50c7023d34ca658e
gcc-toolset-12-libquadmath-devel-12.1.1-3.2.el8.x86_64.rpm
28a06382e87a7cae81b765c06a0fd1983d35e4f7c88dc805b0770f8e429b16ac
gcc-toolset-12-libstdc++-devel-12.1.1-3.2.el8.x86_64.rpm
56afc0a2684b3e900c5f285c85676f37ac205aad636fbbcd2847266948a8058a
gcc-toolset-12-libstdc++-docs-12.1.1-3.2.el8.x86_64.rpm
e637572b30d1d1a8e6db6c777e86dfafa79abe24df5466d72cc18a4e3943a1a9
gcc-toolset-12-libtsan-devel-12.1.1-3.2.el8.x86_64.rpm
1275294233303e79d66a11eb356125b64f52d145cfbf93ae8dea363b162f7e4f
gcc-toolset-12-libubsan-devel-12.1.1-3.2.el8.x86_64.rpm
9ce1496e0e9aa163826496d9d8318bd09a60ccfcf110a7bd8bc94257814e033b
gcc-toolset-12-offload-nvptx-12.1.1-3.2.el8.x86_64.rpm
a909abaf339eaf0284fed8e9bb42e9e9956741cb3856097e2834ffe997143290
libasan8-12.1.1-3.2.el8.x86_64.rpm
3ee84fc5ca2c33cb691553ab75a03bdc2d025c62e2b10a899645783673603f6f
libtsan2-12.1.1-3.2.el8.x86_64.rpm
a2d5ba8622e3567c659ec0b9e5f4ab52c16ed69196963fd7c28f1af66f01db8a
RLBA-2022:7571
gdb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gdb-8.2-19.el8.x86_64.rpm
f1e95f9044f66c46c5993e65d2523a747bff3d68c8604faa755782621ba20b61
gdb-gdbserver-8.2-19.el8.x86_64.rpm
814ae1ebe3a48cb22f6560523d00abbf64a6639dedcc9264b020dd88f966ae94
gdb-headless-8.2-19.el8.x86_64.rpm
8b56d064df49f1c40fc59c0d4e135adc0dee8468d858156db5a97cd530dae191
RLBA-2022:7575
tigervnc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tigervnc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tigervnc-1.12.0-7.el8.x86_64.rpm
b1230611e255b50351678f6737c1f8492c6b1da51bee071d5d342e0a7be97827
tigervnc-server-1.12.0-7.el8.x86_64.rpm
59c2cede9288429ba79bd7a91edae3f87a5d15b35b48f0736e99a0804057afe0
tigervnc-server-minimal-1.12.0-7.el8.x86_64.rpm
c9f6c21d2e3453fbe478ce1b8becc66701e4a08d236867bcd84511412c96c6c0
tigervnc-server-module-1.12.0-7.el8.x86_64.rpm
4af29ff868785ef4a86269a6642378bf677db753842b7238e2d309af6faa0d02
RLBA-2022:7577
sscg bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sscg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sscg-3.0.0-5.el8.x86_64.rpm
0db1c510948262c20b6a1ba7c848b0a3d4afac4f0761094362458e22ceff4253
RLBA-2022:7578
pulseaudio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pulseaudio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pulseaudio-14.0-4.el8.x86_64.rpm
e1e3f78e4963e6e3064bec42d2e0b94ede5d43f1d4b4c63600350ea20b78b44f
pulseaudio-libs-14.0-4.el8.x86_64.rpm
4c725cafcf46b59b2a5d22a5623d6f320a89a4bf3e26a9a36b9b46a6831a3840
pulseaudio-libs-devel-14.0-4.el8.x86_64.rpm
b8e962c9c1ee69f72aa7584965ef961f767772cca70fc37b327faa980bd6e572
pulseaudio-libs-glib2-14.0-4.el8.x86_64.rpm
1181871bcec0d4f9f9f3deb1a70a86e7364097002845ce07a8c3b35e25f0b2d4
pulseaudio-module-bluetooth-14.0-4.el8.x86_64.rpm
203c17e03a8109ec0e8c87fb083892a386e95a0ad1652bea8eeba4f9dbf8280c
pulseaudio-module-x11-14.0-4.el8.x86_64.rpm
5ffb362c7115ace38214e5fdde216cb1ae23b92e0dccc585fe3c8b03809c1375
pulseaudio-utils-14.0-4.el8.x86_64.rpm
95f025d51b234c77a329bdccf4b654b005d143fa1af6cb27e64ec2eaa1d4b2ea
RLSA-2022:7581
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python38
python38-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
70a9edf01a0c1901f64757580ba7fa770b350f3e26e1820427d35e78c5681376
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpm
b336bcf04e7a99e2db43ae356208f07cf7c20d04d6cf782ecc4a540a302c8b78
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-debug-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
68ea827137ec2715f8675b9393368075f33597c97882d2474cdbb77ac13f430f
python38-devel-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
253671a0f9ab494983d37500e7dc829490a27f0f1ed658e7507934536da2a8c2
python38-idle-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
83b0dee7242733e100b23cd0eebd2c77a0b47c507be10f5bc061c1c68dea88a9
python38-libs-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
8e5504e8f1a06bc9c1523594028e3b7b78217286647adae1f2b8715b29d05735
python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpm
7867930af945070f981bdaa8645a2cbabe1c20d36c2afd88a03cec102bfef2cd
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-mod_wsgi-4.6.8-4.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
c88aa51cce97a21315a074389892d42df391b98d18eba4194960548ef3e0c9e4
python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
3983b78ac97f432a5eb513329fcfd8c1e6ecb5f0c9ec2d03d05c80c4fea58029
python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm
5e372778ff75cee1e0659876b4e5c7e19593335125f12b61b819089ca9ef42ae
python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
2b866e3c4d34c5f8d8eed0d41995240e6a8b18830276161a474390d8c5132245
python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
fabd2086f03a4a87ea9653be2409ffb331a6ae617ba9820d70fe895d4444de2f
python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
5b7041635505a6b994329bf055acb8d0ab99afe5ac20badb4fe5321e16ac2684
python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm
1bc97856baf40be0e61e50548262d76b41793133aa7891a7d81240bfaabaf1c1
python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm
74f5b6313a142ddf93d3a77b44e9057d21603a58b95f06f67dd927b9285334c5
python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm
d2e76c9747ebb458d4d636929e4d717a25668e7fb11d003754c68665d05ca057
python38-test-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
33e3bc0f8a3badff0a2c98d23517c75af46747be5c6f4180071f87c5f44bad7c
python38-tkinter-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm
c8b73f455de91cc9f1768ae07b0a39feca6f85d12f132be4165c279d6844adc7
RLBA-2022:7582
gcc-toolset-12-annobin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-annobin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-annobin-plugin-gcc-10.76-5.el8.x86_64.rpm
d81c0388932c920a78267d834ad095e3a44522d5c311043611b5c579ada2d5ec
gcc-toolset-12-annobin-annocheck-10.76-5.el8.x86_64.rpm
b8a9952c6f25520cb101e48561e554431c7ebc3e5fa04c3f9e741bf2f69d0f0a
RLSA-2022:7583
Moderate: xorg-x11-server and xorg-x11-server-Xwayland security and bug fix update
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xorg-x11-xtrans-devel, xorg-x11-server-Xwayland, xorg-x11-server.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-9.el8.x86_64.rpm
243dbdac755b81ceb4e08f4e5c8df7deaaa6c2fda23af5c512040cca4d620303
xorg-x11-server-Xdmx-1.20.11-9.el8.x86_64.rpm
cc382d22f8c338a0a30ddab2206c1c42cbec25b99fa0bf390c859eed820d8596
xorg-x11-server-Xephyr-1.20.11-9.el8.x86_64.rpm
ebb46c4978564fd1539eff728a8de6db3f75dedc744592683409984af203371f
xorg-x11-server-Xnest-1.20.11-9.el8.x86_64.rpm
fdef8f253dd920e91d2f9ba799a5b3e5b95204756d3824f261a4a93d66a72f7d
xorg-x11-server-Xorg-1.20.11-9.el8.x86_64.rpm
c9f4a94db051b499721b84bb3eddc0b5d895ed8a2c393fe20ceee4f6ff6f22da
xorg-x11-server-Xvfb-1.20.11-9.el8.x86_64.rpm
a99a7511f43cca2d6edcb49e9fdcc4d26c4ffaff15f9fe6cbae504e06e3a10e3
xorg-x11-server-Xwayland-21.1.3-6.el8.x86_64.rpm
d4122e38cb1e98d83ab05954f3917ea6860595f3656084502f4d4aa7352d16d7
RLBA-2022:7584
lorax bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lorax.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
composer-cli-28.14.70-1.el8.x86_64.rpm
566b39066cf83df3757322bd4f75f5e2ad0e204e8ffcae974577a9f9dd88c385
lorax-28.14.70-1.el8.x86_64.rpm
3fea44f5a18ae5d2b1b2ba431a42bf55200ce6687ae39ada916bc19620f40e86
lorax-composer-28.14.70-1.el8.x86_64.rpm
6e65bb0a8210698bd1744c0e2af233843232ebd500ecc872db7ab16e7c8f6f40
lorax-lmc-novirt-28.14.70-1.el8.x86_64.rpm
7fdbe69127d3b95fe7fdef36f7e7decd866e5c9efdd661d440e8385e311fc185
lorax-lmc-virt-28.14.70-1.el8.x86_64.rpm
103ba3e44ec3b2bb7155a5498f94ba1661549e19321a071b009c00b4480a4970
lorax-templates-generic-28.14.70-1.el8.x86_64.rpm
a35538ec540cbe2e3fe0c7d40fca5af6e2062e0f72bc9bc5a9f90c1c26561f6b
RLSA-2022:7585
Moderate: libtiff security update
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libtiff-4.0.9-23.el8.x86_64.rpm
737b891cb4bbb38adaa29d482c291dd2bfca79cbc69dfc4113209859109e7641
libtiff-devel-4.0.9-23.el8.x86_64.rpm
a0d3483698c48679e4a03e5b5e33aa8303fd8a82a80c7c652f3e0789712e0f85
RLBA-2022:7586
tlog bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tlog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
tlog-12.1-2.el8.x86_64.rpm
f14e1d63221cb540cdb0d5ef775cde86b9c6fb6ccb006313d95d06ae9acf4cd0
RLBA-2022:7587
gvfs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gvfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gvfs-1.36.2-14.el8.x86_64.rpm
c3396af3cd19238ac1e3d4e0bd180fcb365fe57ba37c790dea55fe006a31a7f4
gvfs-afc-1.36.2-14.el8.x86_64.rpm
799de4e17e055a49ea4e2af95b8f193c9a41ef84cb4db9a167a4e164d44f7c1d
gvfs-afp-1.36.2-14.el8.x86_64.rpm
fe026dc45a4f1f1458c4081f1fd18323ffddf681c696ac2997945bf260242e4b
gvfs-archive-1.36.2-14.el8.x86_64.rpm
a3d9985a0c62dddc2f2e67b80e837d07c73111ef81e24ec0d474214726f66e07
gvfs-client-1.36.2-14.el8.x86_64.rpm
e3e750d027c8ec2ffec10035204d5b86f5622eb8f3a6646db64a9fbbdafdfd1b
gvfs-devel-1.36.2-14.el8.x86_64.rpm
ed4893212db9f34afb44f4db740f92b9e09dddd995107878a3286d6cbdeeadcf
gvfs-fuse-1.36.2-14.el8.x86_64.rpm
bbe4bb376c304201a1ac23eacd1056661044b7a4c4d049ee59bf883f3de4b64c
gvfs-goa-1.36.2-14.el8.x86_64.rpm
6ae54c65bed8a86d9637012094096385e864ead1762208e1179297d4a4de78f7
gvfs-gphoto2-1.36.2-14.el8.x86_64.rpm
a0f4c1b85f1d5db4e2441dbdbecd8c5741a6b73e0e5c977082ae61b097b4f1ce
gvfs-mtp-1.36.2-14.el8.x86_64.rpm
c12ec2c5bfa6fdc98d882d830cf04681bc03cd0d0bf11360520cc238da2d8efe
gvfs-smb-1.36.2-14.el8.x86_64.rpm
73db3c63640040334dcec02cc4f280c30fc852c94ed3783694c310251dd867ab
RLBA-2022:7589
yara bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for yara.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
yara-4.2.3-1.el8.x86_64.rpm
bde176a3a4a81a37e20fda6ce6066f6cc1efb13af44d5cebd454d39a624ceb7c
RLSA-2022:7592
Moderate: python39:3.9 and python39-devel:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
ed32c93d78b87f60465c94b954b49bb628a596faa9471a9abedd7e4f211c2b7a
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-devel-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
a08dbea41abb325d9bde0d9255ef00bda9f75d57c110053fe8d3de5c63fbff04
python39-idle-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
f2ffd5105213b5d051686c36392d8e8d5052cb81340c8a179a30c3656b11389b
python39-libs-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
0a70fff839ea02331a39ed679f5e3eae58501bbad631e7ab0f20657091b06a86
python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17
python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm
603e3ea442bedc2f6a2ab4f9b17eb4b50ee5bcfefdf2a90ac14eb32fdf1d3938
python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57
python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
python39-test-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
9c12c6ed6455bbcfcde117dabce43a704c0313b56d294e6603cca5486868fa8a
python39-tkinter-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm
ac9255a15b872f0eb7811bb94786ba64395b4569d85d9f1be078638c5e83b509
RLSA-2022:7593
Moderate: python27:2.7 security update
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107).
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107).
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__python27
python2-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
7015c1da853f57364651a1f73dfaad46ebeb1c296a6a927431754dccac1acfc0
python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpm
6c6984e61c8cc4fce2d75c9d38e1425a9977912c28bc5ae383236ba251ffea91
python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm
a5296865dceb59a184ee283b2fc261a21e29e14b52d32c2fad447a3de3c53348
python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm
8b8930c17046d2a3d34a3b4cbc82368c22dba53d4ced299b2aeaa2e6738ad03f
python2-debug-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
3e7704a761bd3ad81d595574ca315458a858e0ae769cbb76bfefbd34c5143cf6
python2-devel-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
4009f30096acfb9b0337901f47fd585a5bb0486a185a988c1b9bd1bcf3674662
python2-libs-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
cf5083603baeb48b91afdc0da35c2ce52ec937582fd8a57944e0dcb9dcfa6da3
python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.x86_64.rpm
1257203382679fe9daa7dee565a99b8ffdbcefd743bda938d3facb7c15e9a571
python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
25572a95e8bf9569de8299b089448780b81e5e779b0774b68bf59108982727e9
python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
4fc496d116be3dda2d1c7098f6ec73bff95cb7658d049665dd719fe3a971f66c
python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm
39aed45e2cc2566567c51178b449ea73bb83915836766617edf8d71b7757a31d
python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm
638e78f56731eef8b16824d23132cbeea2984e0cef742b02d8861fad02411768
python2-test-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
57b5085932b57f43f8f5359f190033586be37c14121eb5da7cfe8462118d345f
python2-tkinter-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
b7fa41bc91383b205ba3e8f20d8c3f397d6d353a616f88f9381a0c7974b86a6f
python2-tools-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.x86_64.rpm
1894967e20dd3a304945f1bdef29adcbee4ccf9d34fb14b7d7b0e47ac9566964
RLSA-2022:7594
Moderate: poppler security and bug fix update
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for poppler.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
poppler-qt5-20.11.0-5.el8.x86_64.rpm
43f58f930b820bd24c5e0f2937b59f98b2ac8e147e173bcde2b493ba594ab44a
poppler-20.11.0-5.el8.x86_64.rpm
6a337f32ddb1e52c1f81b62612990a2aac41f6e458765193ce30373621d5008f
poppler-glib-20.11.0-5.el8.x86_64.rpm
b8dbaa5539bbeae4a7d9190d083b1975a6330895e16e46e110c6b01098ac875a
poppler-utils-20.11.0-5.el8.x86_64.rpm
498d99a9b5a9f9636419f7397fbfff5fc6881b7e2f4f8e8c197985d0d474e11e
RLBA-2022:7595
bcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bcc-0.24.0-2.el8.x86_64.rpm
b43d3157bece9cf3d3140b27f39eb65b0e6098dd7660183af2506e36f415e808
bcc-tools-0.24.0-2.el8.x86_64.rpm
394c2506dd1d27850ca14d3f452f1bc348b6a290b70abc473a84b5a298504f5b
python3-bcc-0.24.0-2.el8.x86_64.rpm
742246525d38e5c6ec71e75544d4e4de06a004e0ae3451ca81afe84ce24e985d
RLBA-2022:7596
sblim-wbemcli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-wbemcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sblim-wbemcli-1.6.3-16.el8.x86_64.rpm
c3d4b7fbe0bffc67fa1f645f42cb02f7740ad77903ed01a37c3473057e6081be
RLBA-2022:7598
bpftrace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bpftrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bpftrace-0.13.1-1.el8.x86_64.rpm
e8a04ca8b6e3e2e02d815e31bbace35f1c90201bbd04c44dcb33c0ac129c2662
RLBA-2022:7599
xmlstarlet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xmlstarlet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xmlstarlet-1.6.1-20.el8.x86_64.rpm
e42355fc28e75e550270e7d44a037b4d5af17830fb2eac4acbd594c9561b5ee0
RLBA-2022:7600
boost bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for boost.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
boost-1.66.0-13.el8.x86_64.rpm
f9b5aabf4efd891eff03865b02a5216c09a3ed805813d7fee22967de35990d89
boost-atomic-1.66.0-13.el8.x86_64.rpm
81a52eb6c974139e40dcc0a2a0b0a74df75f8bafd69d4d040c8564c73a6f051c
boost-chrono-1.66.0-13.el8.x86_64.rpm
13d9d6b2e16d4ed399364fa302313002eda8954a1972660b00766f69603ca130
boost-container-1.66.0-13.el8.x86_64.rpm
ca0e76f6a19edd3f438282d1410f3bf889ff9743a5222c45c786e878ac1dd4c3
boost-context-1.66.0-13.el8.x86_64.rpm
51455cfaa766bd42c0a9b162c624d7907573cfea8afee2a583222ded31173448
boost-coroutine-1.66.0-13.el8.x86_64.rpm
9c1b1e698193294b66986bcd3f8860689a03cc2d68e037be6071d6f80ef0fd07
boost-date-time-1.66.0-13.el8.x86_64.rpm
0ccb46e0969c83decfaf0d1cc6e31eb7383d146828bf50ba01201be26d7b0dbe
boost-devel-1.66.0-13.el8.x86_64.rpm
c16446b23a0fb0483e9b0416e82cdeb09b2505efd3262e465d7744f35872fd1b
boost-fiber-1.66.0-13.el8.x86_64.rpm
e08d739334ce5b91b2e6778c0897ea96649dcac433e257d78e8a87a2ef1faece
boost-filesystem-1.66.0-13.el8.x86_64.rpm
7c7c3f708ab3908ab8c5ce9c24b4afd90f763fe81f56f61981b581221fbda82d
boost-graph-1.66.0-13.el8.x86_64.rpm
7846d71e0283f478bfe2881d5d54113176723b19f6188ce7361fc39048b1f91f
boost-iostreams-1.66.0-13.el8.x86_64.rpm
3ff6762969cc3795e195c79c57462271aa7cc0924a97a47f5f620d974ed9b159
boost-locale-1.66.0-13.el8.x86_64.rpm
73d5da8e7c6c2d9b7f2c744ee40c3bd2a20de668607bf657a1ec53d456fd401b
boost-log-1.66.0-13.el8.x86_64.rpm
2d4281a6f52c320656ec0942d8f2028342d0102a3de12187ab6b78bb5e0bab39
boost-math-1.66.0-13.el8.x86_64.rpm
03863ce72ac7080d25b1779b07bec8c7834275709b99cf69a76a6cbb515cd9d2
boost-program-options-1.66.0-13.el8.x86_64.rpm
4b5301b5d92d824990af374b3650f63d700fa46960d1459a9b8da95e6c4b5931
boost-random-1.66.0-13.el8.x86_64.rpm
e33fb27c611253dc3f4eafa516a83f9eb05c1f49bfd7d65caeb95e9de8edfde8
boost-regex-1.66.0-13.el8.x86_64.rpm
5aa01be320a94051756382fd78878cffb8fdf59a97fab23a6a750d0c9d99b254
boost-serialization-1.66.0-13.el8.x86_64.rpm
1dc4557a94ae44f131959cd41c5b993a0d71c0261bca77d7eea5b71d692136b9
boost-signals-1.66.0-13.el8.x86_64.rpm
9fcd1d616e52673d76a38c49956cdf51de61de1a6030c272f16dfa35c2861f54
boost-stacktrace-1.66.0-13.el8.x86_64.rpm
6826fbdd8457d8dc4f7a3a680d5b3b95d7a7febc99b5c667cdcd436f11262f15
boost-system-1.66.0-13.el8.x86_64.rpm
fcae1cd46f216c9c9741894d2c4995d7ad14848ad06139f07a2dfc59d886d5a2
boost-test-1.66.0-13.el8.x86_64.rpm
64665d9a04cafd8ba88d9e9ef8be6ce034900a97d50bc2b7c8db98b1792eb93e
boost-thread-1.66.0-13.el8.x86_64.rpm
e0091543ecc67f75c2d21f14c484f15e377045e9b885e37bda6c2ada4367ceaa
boost-timer-1.66.0-13.el8.x86_64.rpm
05a50d26202246200a9d8faf90434d990543a8f12e96b0f154c51666cf9a45fd
boost-type_erasure-1.66.0-13.el8.x86_64.rpm
5ef4a9474ef6b2f936ec8efe5e9836b87a088ba82def6b4b237863024149b652
boost-wave-1.66.0-13.el8.x86_64.rpm
cfa1377a69616dc1f5e6093f60432413e7ef3792aa23457e56b42a9bbe3663f0
RLEA-2022:7601
libdrm, mesa, and wayland-protocols bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wayland-protocols, libdrm, mesa.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libdrm-2.4.111-1.el8.x86_64.rpm
e394a9750bef7f85575b7b5e5757b07be87d3051f852e774d2c5dd349919c57d
libdrm-devel-2.4.111-1.el8.x86_64.rpm
fd8c0a4a0402c9c0f05a2e43e6bb499371eeb9d6d373a0a1118664409c2ce837
mesa-dri-drivers-22.1.5-2.el8.x86_64.rpm
3be36619d048768ece7290533bf33d617ebd67b90db9d3171d3504b794cdb08e
mesa-filesystem-22.1.5-2.el8.x86_64.rpm
491327bd259004a5d38d1fee58b6ca12bc6eaa66f3599770f41ca93a551a0b54
mesa-libEGL-22.1.5-2.el8.x86_64.rpm
06e5f5d2ff8a974d82445718d4916043a80122355d7e72d968cfbb8e08f57dd9
mesa-libEGL-devel-22.1.5-2.el8.x86_64.rpm
1594cbdbdf9c43dde0d882936359067bec1dc66e9bb44e4bcaf00caa10b524fa
mesa-libgbm-22.1.5-2.el8.x86_64.rpm
889f75f01e3c57b747dbc83b95a31effb102af0e50a2cd7f2b9d8b766d1c580e
mesa-libGL-22.1.5-2.el8.x86_64.rpm
06e712f139ac5a65db91a3205b6783b3a60239162628ed76e3d0398d3fa20e23
mesa-libglapi-22.1.5-2.el8.x86_64.rpm
c5280a195a74d5f001366d0d31c1ec191b10603c3d5ca343b72cb066fc0e1342
mesa-libGL-devel-22.1.5-2.el8.x86_64.rpm
69e1fc2457b342d69b24910675f128f847b6cf1a57eb6423be489bab3c277113
mesa-libOSMesa-22.1.5-2.el8.x86_64.rpm
3875805b55ea3fc9690d976cf0a8e2dd16ca4e8755d834cf621563634ace5974
mesa-libxatracker-22.1.5-2.el8.x86_64.rpm
bb90afd1968756802a6ce62cdc984d7e4ed311a5d5e58fbdd531341e3ea5866f
mesa-vdpau-drivers-22.1.5-2.el8.x86_64.rpm
145c2ad189ec7d23ce54d2b524b4bdd18abd7d5d665802c58657db38f3f547e9
mesa-vulkan-devel-22.1.5-2.el8.x86_64.rpm
72593858b56bb1ccb724d16a0f73f2ee08683ae211d1d4f1826dcce5101dcd49
mesa-vulkan-drivers-22.1.5-2.el8.x86_64.rpm
1e9297112295cf07fabc4adc15a20c50cff1cfb64128477deddb9e2053cd7b71
RLBA-2022:7602
gnome-initial-setup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-initial-setup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-initial-setup-3.28.0-11.el8.x86_64.rpm
b7a94ff496c028ce0c0b74219c1562d1d8aaac9c7efc618e732e5b04df08ac13
RLBA-2022:7603
gnome-control-center bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-control-center.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gnome-control-center-3.28.2-36.el8.x86_64.rpm
6006473bf42203f7f7fa2215e55a13a02d35a1dc077d726b7c2583664c1a3f48
RLBA-2022:7604
libtimezonemap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtimezonemap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libtimezonemap-0.4.5.1-4.el8.x86_64.rpm
3e70b5b2eb8c0a82d5ed985ce7968d62df94786c876b83b207c3a7c973b55ca1
RLEA-2022:7606
gcc-toolset-12-binutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-binutils-2.38-16.el8.x86_64.rpm
65ae6ef853b240ee9dbc1529e85e5eedefbc080ff7302ef345526079b3c8d650
gcc-toolset-12-binutils-gold-2.38-16.el8.x86_64.rpm
b63458b91e980c09020188726a13f5e1c424bcb263223ed8caa8ac95bfc1edfc
RLBA-2022:7609
sevctl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sevctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sevctl-0.3.0-1.el8.x86_64.rpm
8883794e71306e213b24089214bb8542019dbee94dc1119caae336131b4eaac9
RLBA-2022:7611
esc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for esc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
esc-1.1.2-24.el8.x86_64.rpm
098fa8a1f91412ca575bd4373786faecf3bba27e34276ee56f83fae4c7bb5171
RLBA-2022:7612
rpm-ostree bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rpm-ostree-2022.10.90.g4abaf4b4-4.el8.x86_64.rpm
f722c597248cbc9723af75f304b0fa74f21915a8bc5cdd9fc236705e85c6d828
rpm-ostree-libs-2022.10.90.g4abaf4b4-4.el8.x86_64.rpm
13595c7f0cf104651466f47bb5ace870a75b4c937816ef0e9e60154a4495583e
RLBA-2022:7613
linuxptp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linuxptp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
linuxptp-3.1.1-3.el8.x86_64.rpm
9a606032cab1fb5bc57189b012eb24fb8ae781c3014ff6f545d47cbbbf1db868
RLBA-2022:7614
xxhash bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xxhash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xxhash-0.8.1-3.el8.x86_64.rpm
5db7484a6872866a914fe5034367b65b4edc5cacd5e9ced0d095c22be4c410a9
xxhash-libs-0.8.1-3.el8.x86_64.rpm
ebf42d96569762da0c84a0bb45e671d8dbbec85c31be20970965d5861a349bf4
RLEA-2022:7615
alsa-lib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-lib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
alsa-lib-1.2.7.2-1.el8.x86_64.rpm
bf2a1da9089da0cb1bf360ebedbbcbee3f214cd2f5e455b6374a813ca971afe7
alsa-lib-devel-1.2.7.2-1.el8.x86_64.rpm
bc17c1bd17d5be661db3b056718e6995176d87ff645afd7d23de6756f4695b84
RLEA-2022:7616
alsa-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
alsa-utils-1.2.7-1.el8.x86_64.rpm
65ed99c2d71fd99a4fce0edbf33dc89bc5a34254600d4bba5bcc5e2c4aa54570
alsa-utils-alsabat-1.2.7-1.el8.x86_64.rpm
cb36cf54b2922d6b4b3841cc5708848ada801a8b3f1765b1b03f3dcc28bf95b3
RLBA-2022:7617
rt-tests bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rt-tests.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rt-tests-2.4-1.el8.x86_64.rpm
51a62e16f8c44ad2f798cdc626efbeac9b2190e32134b02dcf4ea2232ba0f629
RLSA-2022:7618
Moderate: gstreamer1-plugins-good security update
GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.
Security Fix(es):
* gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gstreamer1-plugins-good.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.
Security Fix(es):
* gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gstreamer1-plugins-good-1.16.1-3.el8.x86_64.rpm
2b1bce4000218db12aeb9b4d0d291379b50b74f1b76c104e397cc44be5b661d7
gstreamer1-plugins-good-gtk-1.16.1-3.el8.x86_64.rpm
17f9f05e985f6dfaf1a9aa9b749f4c3a6eb310e13dfacc864941b3a9a62f5b57
RLBA-2022:7619
libva bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libva.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libva-2.13.0-2.el8.x86_64.rpm
9e98a8ae933b9e8aaea6c3a644c15f6c86a1ee7c232b575444e1dbdebfea7619
libva-devel-2.13.0-2.el8.x86_64.rpm
3aff4ad2d1e2806565e5ac6462aa9087844f1226a5822f3c1ee968cac5e1a2cc
RLBA-2022:7620
sbd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sbd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sbd-1.5.1-2.el8.x86_64.rpm
82a8d02a85dba32889e969414148fe625138c53e8a1b16a630a88d0494666224
RLBA-2022:7621
make-latest bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for make-latest.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
make43-4.3-1.el8.x86_64.rpm
c2fb11b04b4f8f7c6b2fa99875bdd82750e9ba5a7c0cdd8b14d8770de5334f1e
RLSA-2022:7622
Moderate: unbound security, bug fix, and enhancement update
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735)
Security Fix(es):
* unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698)
* unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735)
Security Fix(es):
* unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698)
* unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-unbound-1.16.2-2.el8.x86_64.rpm
d54f95f9d67733bfedd7c020025d58fa8f3d0d01557de199df410d5a801f8db6
unbound-1.16.2-2.el8.x86_64.rpm
b76a482e3a7c9425c23e5a5522bb7d485542df4a6c7139fd23b20fdd9c840060
unbound-devel-1.16.2-2.el8.x86_64.rpm
ef50348b1d912f6a8c5d034a72d714343dd63479607610c721e1cdcc652d4178
unbound-libs-1.16.2-2.el8.x86_64.rpm
f886b2a5abf92299ffb510e03546a73c7bc9e522613b4de1babd37eec610f611
RLSA-2022:7623
Moderate: dovecot security update
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dovecot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dovecot-2.3.16-3.el8.x86_64.rpm
44ca3ac7e69ac7222188e9d81d0fd667cc6a68725e3fac7b72403f8b6ab56f84
dovecot-mysql-2.3.16-3.el8.x86_64.rpm
cca9ba93e14558a9aaa972ab1e3dbf17436747d28ee5dcb0bde3e4e90d45b8a9
dovecot-pgsql-2.3.16-3.el8.x86_64.rpm
d32ad1dd39a47a169f45d185c07f3370914e9aefb7b390629d677f99cd0660b6
dovecot-pigeonhole-2.3.16-3.el8.x86_64.rpm
7f2afd0df750de589752505a9d851dcaab761c2cce8ac41fb5bb5dc3a54aeceb
RLBA-2022:7625
haproxy bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for haproxy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
haproxy-1.8.27-5.el8.x86_64.rpm
a8e48a5349b6d288a406dedbc31c7172491f47ba5ed6ac6d986e9b18531acccc
RLSA-2022:7624
Moderate: php:8.0 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876)
Security Fix(es):
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876)
Security Fix(es):
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
a8348a286ec48a9d3604e12e82440c812e32ec26bffbce314d513c92462e01a0
php-bcmath-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
1a5b54671f55421133e8a529d85a3c123fa3d9c412ecc8e80f5b7c78f8d3749d
php-cli-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
eeff3851294f18425c968c0646b50475a97c14d92f4faa44e0b55e267c05a3b3
php-common-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
cf8bb97a63f5aa9530b5a0aa9bf858c03f33d258b096d6e47d738d0a792c9cd3
php-dba-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
b44dc57dac575f1db48001c3a949a1012c5e6716e4ea0042636f9a3db336ec48
php-dbg-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
4a83c25966e56dbc678c509c7d664351111596192d20abd18414c0959e7dab3a
php-devel-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
ad33a734ec731512f832cb3a510a5a0a7658e42374c66805bde88549473162d5
php-embedded-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
96273a2407460955cd7d5ef866fc5ad8e2d74b79095a245ffc07cbebcac2a82b
php-enchant-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
eeeead05af1841e28a23883f2578bce844218ede9ec90766022b53a20d030d5f
php-ffi-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
fc39512df234ac7e85f0987425123fadad54f2b470994414f523b62b3e49ad70
php-fpm-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
85cce205b19955a7a9ec3770fefc16f0061b8a4d61ca9f34606960894fc4051f
php-gd-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
a63857577a2659acb3e8fdec4159d54d224bac68a3ad71f860d8a74496083be2
php-gmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
69bcaa0999d4d5cc7fb7d0c79981ddabd1cfe8abf7636692f56e06c1c50a341a
php-intl-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
176d023d9815a6f42ec8375bb7edc889af14477516aba5ffeed19c802824303b
php-ldap-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
376ece7f191b43804cca3bed1cf5b1aa9665b76af448267837d4dff1e9731e68
php-mbstring-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
9f099e28b9115642ad1664564e5356f95f7be98f2dca22e400649619c842da9d
php-mysqlnd-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
7bcf84d79cb7c5ec676500c9e9256d9910e128d0f994e65f2166329403e00d98
php-odbc-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
0550ce31a2c0d310542d23a7740a5947e81eb1150f0c4694b58e064dcb031553
php-opcache-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
e307fa8123cb739f521b9f9eaab655c101ee5bb85cd926bedd1a5ab905064021
php-pdo-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
027d321cd414ebf60134f4470d4e7665b998d985b1641977da9b5bc3c4f19dbb
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
php-pgsql-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
1d0787eeb7308493c46ff4b628d31c0bda6d7befdf3ee3367e4495bede2b4592
php-process-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
ade3494b512052966b1b2f4e14702db8346dffa9e904e30359703afff35d8cfc
php-snmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
6cdf3693c3cf99f2f4c7134f5392e27fa6641440b9e382fb386b3996aaa8ccb0
php-soap-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
263b7bb09b0b49f0a1ec1770ba76acae857ce710699767df99fd4baf85587063
php-xml-8.0.20-2.module+el8.7.0+1068+7fd2c980.x86_64.rpm
fceb63064b3d0fa7e035f8b740f18c906402a07b4d503ae26a167b87aaaf24f5
RLBA-2022:7626
keepalived bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for keepalived.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
keepalived-2.1.5-9.el8.x86_64.rpm
0a98989f12a97ca3ee908954eeba644438d30a901453fc3e06ecad3ec7128fce
RLBA-2022:7627
fapolicyd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fapolicyd-1.1.3-8.el8.x86_64.rpm
b511d983bdcbf2ed43b5579fee089f69e516fee36d033905ff8263f4c717ffd7
RLSA-2022:7628
Moderate: php:7.4 security, bug fix, and enhancement update
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422)
Security Fix(es):
* php: Special character breaks path in xml parsing (CVE-2021-21707)
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php-pear: Directory traversal vulnerability (CVE-2021-32610)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422)
Security Fix(es):
* php: Special character breaks path in xml parsing (CVE-2021-21707)
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php-pear: Directory traversal vulnerability (CVE-2021-32610)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__php
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
php-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
07bf8f584e968dbf0b98dffe822d6902a58390fadaf72a50138edf455289e778
php-bcmath-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
4441262caee9f6d3d04cace9862cf9a07a2b822856c100e3030498776650e097
php-cli-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
e2128345e3a5577829de3a1a5db723802291bb3677ab173071dc787300f8c6f4
php-common-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
eb40689e613f9840ffb69f21ce9b6838b9fb29b235273464f21455949c49a37f
php-dba-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
3878213e84942a92122007f031a6ff9c05c1e2751a5a74b52ebe87383791e8cf
php-dbg-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
1a098917aa3e201a96cc3e7be2c8c5cef9eb044aaeccd389d6b1030ef937c607
php-devel-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
3437a0a07b72d5fbd5e206182cab7284f0405ed0058994f16c06ded39d44951f
php-embedded-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
0534fd869e31e07c74c3638041da0cdb90662726f06382f1f6fcb43185d2c8b8
php-enchant-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
0f6af66b1394ce147a2bea207f90c52c3d278dc7c0f4f161aa95f3a2a97f0590
php-ffi-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
85457c73a855e2d2bbc20242b56268caff452c107f2c81a6dfc744cfb7478e44
php-fpm-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
84f82ad8aa014b3dcb8549cd5e05d12c9ab2d812a508de9170e89de1b8ad8ac2
php-gd-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
0159f5632f9a7cab5584434e6a8f2d68f2cf44a6995e7cdbc43c3c13fc1203a9
php-gmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
d728cfa99a9dcaa967877dcafa771a14dd6c691787baf6258966abf32e6f5304
php-intl-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
56244aefd61b6a3880ddad75e55674f9ae961a75f948ebbf6ad5c9387622ba5d
php-json-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
306a11df0167f7855c7f8f208aa483c23f5d6bf23ade1e2650a765c445a4dae4
php-ldap-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
96ac971cda8c224e2944f8f7997716e1b75105c17473b218a8628c404f0ef1e5
php-mbstring-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
7cc7b8d3fed7f19f3897791d4666eaec1b439cdaf262052c25aa1e05fac9aee4
php-mysqlnd-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
8ac305f4fc4e8bcd0e0afb449a8059d55430ceeabeaf798e0c51da747af3dfc0
php-odbc-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
cc1be49394f375dd2c9cc316c8e056728df7c92172838f3e05eb29a7e5b68cf0
php-opcache-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
f9a1256c6aaa57bec937759f44d82e733da3ddf98c53c949e2e73e4363b06a0b
php-pdo-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
d015b7274a5c077db760c542e6b7209df1f79ba0eadcc12fd3ff446a22b8826f
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm
f9f172c7be7ee119792417166ec46207769c9a555aa16b4b1b1aeb1aaad97c6c
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
php-pgsql-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
44a36e0141ad3ccc42027a399e91e6fa053c54977c22a54c1df61d51207a7e98
php-process-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
9e1700636a03adba623c15fb1443db7f7c45e4ce564f5a42603d047f8f7ca8a3
php-snmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
ecb2ac8b9d3f7f5bf45c994e92ce77c78b9d7149ca6ae158a0b07ee4e3947276
php-soap-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
1ea8b82e08fba7c2de7f6d2fe2f1f8cf57585f9483ef0cfb861faf5e981cc49c
php-xml-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
403096f67c8103d7acd686e92a71fb695823898fb8b8247bb3cce6f582bde464
php-xmlrpc-7.4.30-1.module+el8.7.0+1067+0a7071cc.x86_64.rpm
4271876a92a4c98e11dfc9adc5e2b048203dc2c96cf7b93e3cbc0df911c6fc81
RLBA-2022:7629
nispor bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nispor.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
nispor-1.2.7-1.el8.x86_64.rpm
c5638d282ec04dae1f4cd901b359ddde09409be3a6f8b78e5f3d82533029f8c5
nispor-devel-1.2.7-1.el8.x86_64.rpm
af2591a8d7dac21598930b8ed06fb769b832d4333c6cc4c16a2b7995ee5098bb
RLBA-2022:7630
crash-ptdump-command bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crash-ptdump-command.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
crash-ptdump-command-1.0.7-2.el8.x86_64.rpm
041760d28c7f97acafc1b90f5d9f12a19c001a3fc90f7d7eb8778daf6d7e34fe
RLBA-2022:7631
ghostscript bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ghostscript.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ghostscript-9.27-4.el8.x86_64.rpm
c3828261c8b05bbaea42f43f46f9e8ab5b1bf542227e498d7ebd8b23126f0b73
ghostscript-x11-9.27-4.el8.x86_64.rpm
f366356687683723112cedcdc9a3e7cd047fa03e5c0dbc4dfc357f663ebb3511
libgs-9.27-4.el8.x86_64.rpm
a8b1846f370ddab492cfd21485d9a6b13ac3d277417bf7ede7d585ebbfef5f99
RLBA-2022:7632
thermald bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for thermald.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
thermald-2.5-3.el8.x86_64.rpm
2105e8ce92fcef71236a602ac7be02308c6b102ed635b07fa07c8e5316bdec5e
RLSA-2022:7633
Moderate: dnsmasq security and bug fix update
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
* dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dnsmasq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
* dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
dnsmasq-2.79-24.el8.x86_64.rpm
8ef40fd4da1fb82b7c274ecf4b1f66c5aa0459e2668d0c8bc4d2bce70fedbec2
dnsmasq-utils-2.79-24.el8.x86_64.rpm
9219bb674aab79fd7c6c460392f97be226e6a5004eb17d20f3b6fc9f705d4ffc
RLBA-2022:7634
usbredir bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for usbredir.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
usbredir-0.12.0-2.el8.x86_64.rpm
b62803bfb0ff52df6796bba1f5ed2502a6811a7d1a41a218e1ba907eacc97f9a
usbredir-devel-0.12.0-2.el8.x86_64.rpm
f00e64939bed144aec7c61fc9a4a5d723941b806d24e641b350128667e2e88ff
RLEA-2022:7637
maven:3.8 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__maven
jansi-2.4.0-6.module+el8.7.0+1082+b3a88d23.x86_64.rpm
a23782fdbb258ed7ae58fc86b4859d70c66fbffa501f9258efb1c4403a2ba1bd
RLEA-2022:7638
mercurial:6.2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mercurial.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__mercurial
mercurial-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm
52bc1386bcfc64bf99b1f1c1346120b24532e839a29bee2c91a6958a460520ac
mercurial-chg-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm
18c97d8f3e8b7e3dcea459e047cedbf5ce7f7d47ca527ff5daa68cbb2a8c9456
mercurial-hgk-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm
9c945841d9eb5ad2cd4ad36a358f426569bfb95040683ed02f9640258325c276
RLSA-2022:7639
Moderate: openblas security update
OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version.
Security Fix(es):
* lapack: Out-of-bounds read in *larrv (CVE-2021-4048)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openblas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version.
Security Fix(es):
* lapack: Out-of-bounds read in *larrv (CVE-2021-4048)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openblas-0.3.15-4.el8.x86_64.rpm
a6629a2491ae9fac85e928c9d1397a912a9eaa5a1ced7dbb4a83560ed3be1966
openblas-threads-0.3.15-4.el8.x86_64.rpm
5afed1f25fc67c5aad9935e6655ba61da0d26a974c1b387c040fd8fecdef3e54
RLSA-2022:7640
Moderate: mutt security update
Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP.
Security Fix(es):
* mutt: buffer overflow in uudecoder function (CVE-2022-1328)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mutt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP.
Security Fix(es):
* mutt: buffer overflow in uudecoder function (CVE-2022-1328)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mutt-2.0.7-2.el8.x86_64.rpm
15b13b12c60465cd9da41f83afc017da0d515a17b91dfa14956e532e72d6603d
RLBA-2022:7641
fstrm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fstrm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
fstrm-0.6.1-3.el8.x86_64.rpm
009be413cbe00ebcf5cc349e0db8d6913273bb26dec2c187860e69056b69bb9f
fstrm-devel-0.6.1-3.el8.x86_64.rpm
e5d3ee7dd9fc8a676544e1c9292a6cfe104da22e04bb79262578f31e8d939620
RLBA-2022:7642
setroubleshoot bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setroubleshoot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
setroubleshoot-3.3.26-5.el8.x86_64.rpm
edbda7d3a6ed4c6cc0cb6448ee20b063fa2da9a9732390cf0817a275b4381c84
setroubleshoot-server-3.3.26-5.el8.x86_64.rpm
98a9ec6cb83707587e8cca917a9c439c81767a814560807fc9caf01d6e24677b
RLBA-2022:7644
clevis bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for clevis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
clevis-15-11.el8.x86_64.rpm
7b1661586fc311cdbc1e9f476968c2dde04253a852c5f527d9d2435114d1eb11
clevis-dracut-15-11.el8.x86_64.rpm
0fb789c732ce81f56014c82ff1a145d917fdff04ff72eedb6cf78d365318a96a
clevis-luks-15-11.el8.x86_64.rpm
afda820f581b0fdfffd83e4c84c834ec3413291db1061d07b3d0f197bea52eda
clevis-systemd-15-11.el8.x86_64.rpm
ac473976855ebcdb18d17dd0fd52173ba7991cba4e2dcf2878ff04deed4c6a76
clevis-udisks2-15-11.el8.x86_64.rpm
85e206ef9a26491b946ac8aac5497e1c37f2e370ce1311ea4b609f1219a4c519
RLSA-2022:7643
Important: bind9.16 security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: DoS from specifically crafted TCP packets (CVE-2022-0396)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind9.16.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: DoS from specifically crafted TCP packets (CVE-2022-0396)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bind9.16-9.16.23-0.9.el8.1.x86_64.rpm
2a2f8c93e2cf8dc978845e2f946a10b46673a7b88cca2f46b4e3103374d51090
bind9.16-chroot-9.16.23-0.9.el8.1.x86_64.rpm
c85fc4eefeb37b2918f95cd2902973374f64d5d83f02a3771d1fbc574c7f501e
bind9.16-libs-9.16.23-0.9.el8.1.x86_64.rpm
21941367dbb4bbedc8dbdafe8df4e5c1beb98309d3d5062821ea31e2a7dacd4b
bind9.16-utils-9.16.23-0.9.el8.1.x86_64.rpm
c1c3d62196778f140ba4176cdbf89951f3ec4747e2606fb43f42cd92f6f9f33a
RLSA-2022:7645
Low: openjpeg2 security update
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for openjpeg2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openjpeg2-2.4.0-5.el8.x86_64.rpm
3f417bd20c742a615ead7114343b3dec930d6a74593f8120bb0cc89d8a45f5a3
openjpeg2-tools-2.4.0-5.el8.x86_64.rpm
1eeca900463ae48d084ef5a6579c884c5b641a2357ff78afb7ea6bf979206ba1
RLBA-2022:7646
libblockdev bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libblockdev.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libblockdev-2.24-11.el8.x86_64.rpm
5da174eafaf69af62408a4815a01f3dc246ef681fcc8e7014b0fce0403a674cd
libblockdev-crypto-2.24-11.el8.x86_64.rpm
2d4d820490c96a4d9c5c75b7cb3ae1520b579e609356fa336cd7fe4800f9f23d
libblockdev-dm-2.24-11.el8.x86_64.rpm
ddb1077966da4cd352a7e5054ecbd6393c5294c45a10185f794f19e1f5213924
libblockdev-fs-2.24-11.el8.x86_64.rpm
1ad19562185e8206dc5175b37b20453977bbeeaf4e69c90f0c2701f6a3297be8
libblockdev-kbd-2.24-11.el8.x86_64.rpm
cb09b43aa55feab2e48ba005abfedfb8e8bb0170aaa731daeeecea050036b1d6
libblockdev-loop-2.24-11.el8.x86_64.rpm
f99218c09d4e71cb3da31faf10c85a3e4e324fa30a2a499104bb554ee7ae9394
libblockdev-lvm-2.24-11.el8.x86_64.rpm
5987c9cd3365981b4e3f0c03f572adbedc4e6e2a27909cbc164c3f2f1b518235
libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm
95c137f79bd41a9f791c48be71008650e3aa7354ab5ac0d6cd54b5bc961cf294
libblockdev-mdraid-2.24-11.el8.x86_64.rpm
40841584b5e8ba50c0316fa6a41a6bb20e470fe8486cc8868bfd1fbf47b55186
libblockdev-mpath-2.24-11.el8.x86_64.rpm
6c11510d841ff0405a0630e37d1ed79d9f741fe85a18a6dc366a4daf7c6165e7
libblockdev-nvdimm-2.24-11.el8.x86_64.rpm
8f5f06d54c67ec053c3268a228e95c91c46741a9976adb23df6f7627ea27989b
libblockdev-part-2.24-11.el8.x86_64.rpm
979ebb94b393928e80524a055ced8c32914e3bb69fdbeb7548d61e86048b49d6
libblockdev-plugins-all-2.24-11.el8.x86_64.rpm
fd8cdb42a8c71a3313807d62340daaaa650588184e86a039197d94a44b31d7e8
libblockdev-swap-2.24-11.el8.x86_64.rpm
1a319f5063476b8af2207e8d0d8b8564ad66412886b4cf3c337e069c443b5c23
libblockdev-utils-2.24-11.el8.x86_64.rpm
c954d6b891f0140d997e1f3106e9cc023ee920288c017910fed598501e321ee1
libblockdev-vdo-2.24-11.el8.x86_64.rpm
3397635712651d00661b4f91563eb6aaaec753824b97fb4e8de64e6a17d9de49
python3-blockdev-2.24-11.el8.x86_64.rpm
00fcf1707621b8ff4a0de879d5e401b5b738a05783621ec8e85c4bfef705300f
RLSA-2022:7647
Moderate: httpd:2.4 security update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for httpd, mod_http2, mod_md.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms__httpd
httpd-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
bf0f17b753398917bd78b469b9522c1c69623c39d74e2e072785b506b5fc1394
httpd-devel-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
7e2a0eb54d1df679fb968511c68566e4577d12e5dedc8272b426a7613415bd89
httpd-tools-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
61d0353ca9006ce117284db172b80a31bd2ef425e0337cb67bfdf1e611da8a7a
mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5
mod_ldap-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
835cfd3c56a0b13903a0ad8f0e3184664a2ba5d10eb801785b659ab2bb813b48
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
mod_proxy_html-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
7fb626480ab451a56be9818d127bf95ff3a867d94c0e6bce114562b063d08a7e
mod_session-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
54e3780fd2bc9471198a3f222cf7ff9d36e72321ae82092959bf1624c9221b10
mod_ssl-2.4.37-51.module+el8.7.0+1059+126e9251.x86_64.rpm
7b2e2dba432aa6e941a52067aac0d10e918366742756a7331fe139258a36f5ac
RLSA-2022:7648
Moderate: grafana-pcp security update
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grafana-pcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
grafana-pcp-3.2.0-2.el8.x86_64.rpm
f51b7ad4d487e5d4704112536ba57dfcf6ad0c993bd63117298c5045be1a4948
RLBA-2022:7649
hyperv-daemons bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hyperv-daemons.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
hyperv-daemons-0-0.33.20180415git.el8.x86_64.rpm
dd8a73fb9d5128b96c6aa9a9df743b3e0c66d45677dcb76cd14e8bd669f46810
hypervfcopyd-0-0.33.20180415git.el8.x86_64.rpm
b83c98927e6bf767536cb0255761884c0d9c88ee0614d9652a2b3665e7263f89
hypervkvpd-0-0.33.20180415git.el8.x86_64.rpm
6ebbb520fadb104c5082bee707a22e062a3a579f6d145ee2ce81613bba565c59
hypervvssd-0-0.33.20180415git.el8.x86_64.rpm
69cb064a0ee993002e232507b1ff8d181f3089001b8458aa7186ed717a5ce073
RLBA-2022:7650
xinetd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xinetd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
xinetd-2.3.15-25.el8.x86_64.rpm
7caf679d6b941ca0c4b3fc40bb80a54c50dc631f1c6364e886eaacb25ca24769
RLBA-2022:7651
cyrus-imapd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cyrus-imapd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cyrus-imapd-3.0.7-24.el8.x86_64.rpm
037557455d8da217bdfe6df1621de585d9427f70beae4256a6ed99ccafe03016
cyrus-imapd-utils-3.0.7-24.el8.x86_64.rpm
bd6c2b4f212689e7858b86acb0e3bd1d1ad7f779b85ad3c8b4a3e2c02a249940
cyrus-imapd-vzic-3.0.7-24.el8.x86_64.rpm
c38b07ae2373e61aa5091f1649071c17374d41acb213b325fb7eb6378529c7fd
RLBA-2022:7652
oddjob bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for oddjob.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
oddjob-0.34.7-2.el8.x86_64.rpm
a481f325a915f2d704474ed8b4d1df97dd1c58fc168a511b2a1d937fb4039c15
oddjob-mkhomedir-0.34.7-2.el8.x86_64.rpm
91959c72f5382176996bd2a73d968ec84527d0ce3e79ad464d30296f0c630825
RLBA-2022:7654
rear bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rear.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
rear-2.6-7.el8.x86_64.rpm
c2a6c74dc0e8d4954a23b5aff5f33444a5b2127e65f41b0bbd3e317cf66c12f2
RLBA-2022:7653
cups-filters bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups-filters.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
cups-filters-1.20.0-28.el8.x86_64.rpm
f13e08457a6dd13449b5ac3d38c2d6536504d876287388fe77d00fa760d5cf3b
cups-filters-libs-1.20.0-28.el8.x86_64.rpm
891cec03132923ded16005a191ba9c86b595e647f3eba52e58aaaaf00f4d9707
RLBA-2022:7655
xdp-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xdp-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libxdp-1.2.6-1.el8.x86_64.rpm
ca9a4c47c93fa78dda88d3e0877dccd474673e4b27eb0882dc7c728dc929613b
xdp-tools-1.2.6-1.el8.x86_64.rpm
3d85888491af2f38a37afd748d9e0b8c808561aae77b35e3b66433c596361e3c
RLBA-2022:7657
openslp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openslp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openslp-2.0.0-20.el8.x86_64.rpm
bee056de851dff0654790c1a354a461c5aa5f45e6cad2690ac62d6271431e94a
RLBA-2022:7659
gtk3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gtk3-3.22.30-11.el8.x86_64.rpm
29a2f90df2465bdb2e4798d90e6d43933bb34cf742747f97efd77db0832c06c6
gtk3-devel-3.22.30-11.el8.x86_64.rpm
197af38646506159cb952caccb7bcbd054ff35f7d5283ae67d730c968af02f59
gtk3-immodule-xim-3.22.30-11.el8.x86_64.rpm
edee3fe26bff0a288b5f1c754933e759991b2e77c006e02c8ee540f695a66612
gtk-update-icon-cache-3.22.30-11.el8.x86_64.rpm
c574da0954ff6ba85c0eabe58a7acbded426be845d408c57e57cb443fe560933
RLBA-2022:7658
freerdp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freerdp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
freerdp-2.2.0-8.el8.x86_64.rpm
ee604c4fd7fef6716c1d342119560a2a7b2cde11d3fb089957633db2515e6dbb
freerdp-libs-2.2.0-8.el8.x86_64.rpm
9f1ea5245ed7d523776a64a596d8bf686ece476548c7197578992d258ad228e1
libwinpr-2.2.0-8.el8.x86_64.rpm
fcd8eed3c1863160827b0cd8a4ec6b38656765537e30213bd2c2855e14f0c716
libwinpr-devel-2.2.0-8.el8.x86_64.rpm
98e2869640d82f85e40a5e5c7712e5a5fdc5ea337a44cc277f7ec3cee64dbd82
RLBA-2022:7660
coreos-installer bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for coreos-installer.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
coreos-installer-0.15.0-2.el8.x86_64.rpm
b965acad95abc501de61f10b0212329849bd0e097160287ad4d3611a37769b53
coreos-installer-bootinfra-0.15.0-2.el8.x86_64.rpm
443ab391cac10e8d56d6f1e09005da0386fbe89d4ef371cff6a50a6a4bf450f7
coreos-installer-dracut-0.15.0-2.el8.x86_64.rpm
f330db1a24ea0e10aaeeb76f70e62c3b93159c5ee68b1d5375ce89235f9f24c0
RLBA-2022:7661
vulkan bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
spirv-tools-2022.2-2.el8.x86_64.rpm
4a1a23d9d2ac7da4c9bf89d16a203d55c6f6b539c82436f979eedf2e4eb03620
spirv-tools-libs-2022.2-2.el8.x86_64.rpm
4d25bc22840ed42e1e7e2e5e2cafdc808561de408112e85daa62dda183d78c53
vulkan-loader-1.3.224.0-2.el8.x86_64.rpm
04f8daa017250796784a780b73af1def53d4e83cca26aaf802595ddbe2182910
vulkan-loader-devel-1.3.224.0-2.el8.x86_64.rpm
46b79f8228dc0a0f36bd9c52ba433c4fd204aa274b90f6a98bc58306507bb029
vulkan-tools-1.3.224.0-1.el8.x86_64.rpm
52f91b57a908e181714bba6fbb51eeddd52ae1e3e960eacb23d3ad80e797163f
vulkan-validation-layers-1.3.224.0-1.el8.x86_64.rpm
d9cfa39a9d367a4058bb95303cce3ea2e6473ff387af278c30c4226c0ea9c153
RLBA-2022:7662
opencv bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
opencv-contrib-3.4.6-8.el8.x86_64.rpm
57166933fcf4f60098b559813ff422da3f55b01077a0a6457200ea4cf49e4293
opencv-core-3.4.6-8.el8.x86_64.rpm
c552fed8cd103e91ab4f5901dbf6c9c0464c90a9b712f376731067c97b6f4fd1
RLBA-2022:7663
wireshark bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wireshark.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
wireshark-2.6.2-15.el8.x86_64.rpm
b011d4ee0d747b9d6329f622fa29b009cdf39cdd8454526aeb1a18a6b691c6e9
wireshark-cli-2.6.2-15.el8.x86_64.rpm
28750481e1ed6bcf20b13b29bd17e173bdf3be4c40fde886d3452306753df0a7
RLBA-2022:7665
ksh bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ksh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
ksh-20120801-257.el8.x86_64.rpm
11dfa340af7b52321ce90b0425c10c3e90835f6b400cba4b70fa48e107529779
RLBA-2022:7666
qatengine bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qatengine.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qatengine-0.6.15-2.el8.x86_64.rpm
7e82a279e2d83cbd406ebbb2b32b1893fd63554c0c7f77e60f8c5314309c9e34
RLBA-2022:7667
qatzip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qatzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qatzip-1.0.9-1.el8.x86_64.rpm
d646b323481492a0ad52a4de12caaac8991d881b8ad4b882af159ec09c61cd9a
qatzip-libs-1.0.9-1.el8.x86_64.rpm
33c3fc3aff60b4a339db9471d2e33efe9b4748081e9d0416223fd2dcd28d8cf3
RLBA-2022:7668
qatlib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qatlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
qatlib-22.07.0-1.el8.x86_64.rpm
5107cb43c0648ca8f388dc30335e064d74c738a2f21f4ef95baade1d59244b80
RLBA-2022:7670
mod_wsgi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_wsgi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
python3-mod_wsgi-4.6.4-5.el8.x86_64.rpm
ab58858a5e243f8fff7e96f7d9c5c995716545147cd4f152cfa660fad8b95d67
RLBA-2022:7673
wsmancli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wsmancli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
wsmancli-2.6.0-11.el8.x86_64.rpm
e5a175e6790a3a221f3c12f816a95fbb8d7f2b8655ab0a18269dd93ab3af505e
RLBA-2022:7674
openwsman bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openwsman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libwsman1-2.6.5-9.el8.x86_64.rpm
c91dc44a1f1b1e194acfc69be256e06b98b1fc9586790179470cdc3653ec7381
openwsman-client-2.6.5-9.el8.x86_64.rpm
3c8034aa23cff3e5b9bd6c0703da3fba9f1c519a8e44caa8946d4a0dd5c08d59
openwsman-python3-2.6.5-9.el8.x86_64.rpm
8ada5656aada9c3bc19e296c9c229b5b9a247b45684b41aa55c8c7452bff87b1
openwsman-server-2.6.5-9.el8.x86_64.rpm
c478858538547c9457032f0e016425f9a3c2015b69f70d20fc531a147f155d05
RLSA-2022:7704
Moderate: webkit2gtk3 security and bug fix update
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for webkit2gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el8_6.x86_64.rpm
6f9d418c7ea1f1201d9fce9c29a452dd5ff1e50186607bac1d8d5c36e9d0b081
webkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm
f264c4563e2b6ed207ecba5bad82bc211e855fcabe1756b92db6001872f5118c
webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm
857df66bf8107734cf442e7e59feab3e0d62c626e8738c46f676b57c99fa221a
webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpm
022a74acac9929975cd817c2e8820af36362c80ba18c35525aa3143c238e2845
RLBA-2022:7820
virt:rhel and virt-devel:rhel bug fix and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for
Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages
which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix:
* irtiofsd debug log's timestamp is NULL (BZ#2132391)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for
Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages
which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix:
* irtiofsd debug log's timestamp is NULL (BZ#2132391)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f
libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45
libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f
libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd
libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f
libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645
libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0
libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b
libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea
libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100
libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52
libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0
libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
ea41423cb9ccd317d1a5ebbcb070b9e1a74f99ecce9c3e5051267bb64c188eee
libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
7ed71d62ecf427822af3a0b9e20fc93f9e05bf2004fb7be9511d6ab5e9b3de7d
libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
0ce8f2e8e6dca56e8a76186d1dfa73130956079bfd6f2818c1ee50944fc0b416
libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
d0cea4e0b6167849fb7edcb91531b3716e01887bfe9faea099bd0b8c7fc51858
libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
0c0d39b5bfd236922c883c4367c39d9c711ccdace73f36ece10088d466b889de
libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
092bc77167d3a1d392f4f214a08a4eaec63d5b25c12f7f3f0850b48c2de205e5
libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
c484e35d7ad61b87ad9662109aecb110158136240c797bbc126dae3078f4414a
libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
830a30966b383cdc2ed0cf28870c8af581d8a2b1dff4d0ed3fc1b4e6ec9941b4
libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
1f37a92b9f136ee4e4fc8f9bed72ca1cf858bbde132596cd5fcb789018e40a8f
libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
97350f3e49235032387990bfadb529874b4cc8fdaa39edc6f13d69e36253b4ad
libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6df6e0e49b97c69ff5b065e574b4c9eaa08c0ae4de46832fd1dc5c8b19abe6c0
libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
e8d54db9bd04dc675d8b44bab42de599af7c56fa68d5715135c1742056a0c6b3
libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
c87e4f8cb42bcbe09ed1c043fe3d57ffd7bc2e7f5adc56814651901db5f79a40
libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
ef4b347f15c6ab94fb348337c7856ba6acad1fbd7d425486741be6a5640a73e3
libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6c4b97bcb6b615b8c2bf886459f22fe782c05d2679c56fc1808e044feb60658b
libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
087db2ba93134a2c732b4fa5fa37b3c9fc2369447398a86a1a6c10de5f467609
libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
a791d8f7e3badb26d0385db4d3c03fbc0c8c800c6f5e4b984c3fcb093ba36d15
libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
57a656c3775cd30fb0e46818c56616b2083bb5a6fc1268ef52cb2ba0bf11968d
libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
b382f68a7b9146a952801ceeadf99f7ffacd5b3cdff873278f4c5e87dcf12169
libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6233e0708101c4fab6f867a5bd7081aea83c1b813f0b73b27d2dd066424feab3
libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
cfbadecd26551afc63bb73ffff83ed1a575276d71fae78783579b7200030e03e
libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
6118db5d391e5ea27aeb8131ed3f596d918706291f0cb7a0ad2df37aa7d8eb26
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
e2a47a6cd93b6be3cb6cfe5b2db5852bd9934cf0e959f37ee82ac6bbfadffe93
libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
4330e66821e29bc2d1412a0480aec1bcdc1f942a81da56d43653bfb9172d9636
libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
fd055f2146f2f2210fe413dcd3500896cfaaa4683cdd3ca9cb6d130f0eb56e51
libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
5853e8e20b37b510049a488594a5e92bfd022747013a2854fcbdcc21bae08757
libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
decc7c7175a8a8456aa9fcb8aa312d9a0aac9657b8cc8a427af79f203bcaf0cb
libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm
108e8b905f821306c1a18e368b647482898b6726e56268f57f967ba8ca263ee6
lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776
qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
f53d318c4b0613a22aebf4e177ad1f9105fce5fd18dc993e0229980aafc36b93
qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
c6429b4d1d9f6ac6162a7b0a6686ed3f2e1f856b1819d953dd73fc7207946275
qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
0adb29176532c04f3da5718b171484e4116fbdeb09cda55aecca84efeb2a8e98
qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
5fcca46736dc69adb0f7ff4f057607527a15031d5a13d87446cd377dc6eefe04
qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
9625fe3e4a5fffecfa1eb5b6451dd7c5a666bd468c0032198ba9dcefd2fb62cd
qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
d587a9dbc9af15a3c4408189098dd620294b95f6673b0614fead295697e1b4d3
qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
13cb392b10b20cfae2cdc32435b6177b26180bbe18ad6108cc9af993090a6c4f
qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
5ac7b977816ce165fed7737e3aba3bab5a7150730d979f1d12fb4d1a7ba62832
qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
f4cd7b44410c2c3a1c15413d45916901c818cdd79e8bff1535c416a4a74b3d33
qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
9f1769ac46cca5dd72edd4f2d7cc088d5c10dea45ec6802835aee4b2cdb0e79e
qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
e38d06d10d96bf278ce730343fd70de5c90521a564c7b739839c1e24f78a0dd2
qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
161c40f475f3129578d666dc0e8019573443ef59be07e7559618b7ccf68fae31
qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
76329de8d248dfe414a30907f835662cc25fa1bb03823724d7a87c3f32aad717
qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm
631ac3650401c6f558dff57a24626a58aa7ad05e7dc8549e8bde07f483087b02
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada
supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70
supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b
swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838
swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf
swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe
swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9
swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c
virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4
RLSA-2022:7821
Important: nodejs:18 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750)
Security Fix(es):
* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750)
Security Fix(es):
* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm
4a190f09bf708f5a45330129aa5663853fb49b007921d4bebcd2198b56ed9f65
nodejs-devel-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm
e997573653d97bb0a0566ab66f16846f7a9e5416cbbaa9c836eee72b487842c9
nodejs-full-i18n-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm
7b243705740ff8777e283fba19ea10341b014068ebf1ec1adc6ab6ef63fe5f7a
npm-8.19.1-1.18.9.1.1.module+el8.7.0+1072+5b168780.x86_64.rpm
0f5f81cecfd33ad56c588cdd18631041e491dc3098b1458aa1a064b04851bc6d
RLSA-2022:7822
Low: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: possible information disclosure and modification (CVE-2022-2989)
* buildah: possible information disclosure and modification (CVE-2022-2990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644)
* (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645)
* podman kill may deadlock (BZ#2125647)
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648)
* containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686)
* ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767)
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234)
* containers config.json gets empty after sudden power loss (BZ#2130236)
* PANIC podman API service endpoint handler panic (BZ#2132412)
* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390)
* Skopeo push image to redhat quay with sigstore was failed (BZ#2136406)
* Podman push image to redhat quay with sigstore was failed (BZ#2136433)
* Buildah push image to redhat quay with sigstore was failed (BZ#2136438)
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295)
Enhancement(s):
* [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911)
* [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360)
* Podman volume plugin timeout should be configurable (BZ#2132992)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* podman: possible information disclosure and modification (CVE-2022-2989)
* buildah: possible information disclosure and modification (CVE-2022-2990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644)
* (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645)
* podman kill may deadlock (BZ#2125647)
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648)
* containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686)
* ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767)
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234)
* containers config.json gets empty after sudden power loss (BZ#2130236)
* PANIC podman API service endpoint handler panic (BZ#2132412)
* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390)
* Skopeo push image to redhat quay with sigstore was failed (BZ#2136406)
* Podman push image to redhat quay with sigstore was failed (BZ#2136433)
* Buildah push image to redhat quay with sigstore was failed (BZ#2136438)
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295)
Enhancement(s):
* [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911)
* [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360)
* Podman volume plugin timeout should be configurable (BZ#2132992)
rocky-linux-8-x86-64-appstream-rpms__container-tools
aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d33e11f32b7ca8bb1ab9de7144786d8b949b688760adc1785e2fe70d5f39168a
buildah-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d1f697d951572b67c4d0ab80a30722a3eda303306f5904ef8cb1d6c3733632cd
buildah-tests-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1839a75a6f2fb5593d36c7e2d36012fa706711bf29077b42426eb8858ab34ac1
conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
containers-common-1-43.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
201e2826e656e125b7a753e73fe57cf4c4189315ddc4a4e1fc329bb45f8387e6
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
119f90778569a22466b4a90fa278b1af63d137005aaf3aa5945f28a5514bec92
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
podman-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
a58af6159401ae01e54b33eff11fc07b6b40a20c6d09e375c6276451942c409b
podman-catatonit-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
4e36ac569c72abc680821c471ad1a26236816c0c45769c2b627f0bb327c368ab
podman-gvproxy-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1e0d9f6077e42fcdcd44987496509b9f68d7cc1165c49d1c5f013b100a04309f
podman-plugins-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
5af440d5ee2dab182636926e7cf4b71c62847b6be75607dd95efb5b75dbd3ccf
podman-remote-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
6aeee569dc76847d740d8863907786a80e1918abcaf6fa880a7ab58740538025
podman-tests-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d1c73fb86bcca0c43027e3bf83fd7fdf5ca67a46cd96dafae46cda06ec918e82
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856
skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
b2dbacf676bb36b7d618c125bba63b03b16206500f903f8ce4b76e368f16dd26
skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
8d4dda0fee2dc95c05a961422237e3ab97a7f32f0371cd7dc91c447a09ce5b0e
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
RLBA-2022:7091
java-1.8.0-openjdk bug fix and enhancement update
This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm
745a98184ac9a5515249b7cd168a5790d2b07407b3eca941cbb9bf9400d2f689
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm
10be3aa175d2b7be220ed364679366f5b90ce479d11d65443fabba8fb5e23aa9
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm
a64f5fe29ba875659ccd0a3d6af6f3a1f5e87b0c4e5e93cbabe16cf8ed68ae68
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm
6facf44a3ef195fb6c7f66ffce323acf6eccf4f331d5b9059e0c03865fdcd5ac
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm
01819f766f0cfdf6b035db3ead2f50c9539d65fb760d89728a34771c4b44a31a
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpm
f0b9eb21a54ba79a63a963b57f7a2372954a3c88686a340713fa88332ab3ce4a
RLSA-2022:7830
Moderate: nodejs:14 security update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm
401ad24969db74e1989ecab2aafb6192bd816113db6eca267893d54ec506446f
nodejs-devel-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm
a258182e176403cf51af2c6dd125924212ab63c9059b2e2a4c40506b638db5ab
nodejs-full-i18n-14.20.1-2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm
f01702069e9268a2594987a91eb54adb343b4236983b1d300c8aa032a2c0bf19
npm-6.14.17-1.14.20.1.2.module+el8.7.0+1071+4bdda2a8.x86_64.rpm
e25f3c8f2935111f4012a42737e70b79bce180b49aaeff9c720e169dc08279cc
RLBA-2022:7833
pacemaker bug fix and enhancement update
The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures.
Bug fix(es) and Enhancement(s):
* Running crm_node from an OCF resource agent's metadata action will hang
until the timeout is reached because metadata actions block the controller
(BZ#2125588)
* Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589)
* Resource agents that call crm_mon in their monitor action, such as
ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown
(BZ#2133830)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pacemaker.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures.
Bug fix(es) and Enhancement(s):
* Running crm_node from an OCF resource agent's metadata action will hang
until the timeout is reached because metadata actions block the controller
(BZ#2125588)
* Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589)
* Resource agents that call crm_mon in their monitor action, such as
ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown
(BZ#2133830)
rocky-linux-8-x86-64-appstream-rpms
pacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpm
3140cfc42a7891db48ccd246e8e9cbbbf6bd63470ca182d69d41b638bf54d33c
pacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm
98c2f138e3b705ee8a47cb1649347a579fedee8fe73edff425f2e45b9d22e96e
RLBA-2022:7835
mutter bug fix and enhancement update
Mutter is a compositing window manager that displays and manages desktop
through OpenGL. It combines the window-management logic inherited from the
Metacity window manager with a display engine that uses the Clutter
toolkit.
Bug Fix(es) and Enhancement(s):
* [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mutter.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutter is a compositing window manager that displays and manages desktop
through OpenGL. It combines the window-management logic inherited from the
Metacity window manager with a display engine that uses the Clutter
toolkit.
Bug Fix(es) and Enhancement(s):
* [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746)
rocky-linux-8-x86-64-appstream-rpms
mutter-3.32.2-67.el8_7.x86_64.rpm
fd4986a6c4ca4ba62462427c6b76264a5da45a7923a1253f78ad2671a8fb5b84
RLBA-2022:7258
java-17-openjdk bug fix and enhancement update
This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for java-17-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
java-17-openjdk-17.0.5.0.8-1.el8_7.x86_64.rpm
4c83e47265fda2ce1754ddb46c2ade5c95d13e82851ae0d3a0c2ed6d69943ccd
java-17-openjdk-demo-17.0.5.0.8-1.el8_7.x86_64.rpm
ea691a070f8fcf9e1389200c0b89f2ea21ef6f4edab9af535789127fae32b81a
java-17-openjdk-devel-17.0.5.0.8-1.el8_7.x86_64.rpm
9d8b71e2adced4576633c77a2607e532e1655149b2eaa4a38f090089e83b2e57
java-17-openjdk-headless-17.0.5.0.8-1.el8_7.x86_64.rpm
7ffee64f4d6987f5a2ec5be9980b2066dd61f7f865d5e81ee88646d13a63dd41
java-17-openjdk-javadoc-17.0.5.0.8-1.el8_7.x86_64.rpm
6846aa5cd7fae8d5ff1287646c43d7ad3747b43f0a39a0cd8fbcd6060bf8c880
java-17-openjdk-javadoc-zip-17.0.5.0.8-1.el8_7.x86_64.rpm
5c4784b2b0d76728db5459e983aecf854cbc19a0e01cfc48cfd60d33b5618368
java-17-openjdk-jmods-17.0.5.0.8-1.el8_7.x86_64.rpm
cc35eda49192a3b003c507ba2364e6da75fa46d1f89e7e7c656aa42e5202cfe2
java-17-openjdk-src-17.0.5.0.8-1.el8_7.x86_64.rpm
14adfb04f91d8b7b41309a93093602f1daf21c41193d7b6834db657f22e5ce3b
java-17-openjdk-static-libs-17.0.5.0.8-1.el8_7.x86_64.rpm
aa95e8d2da7eef7c20406839ea98ea1f42af0a38e20dbeb5023d6c77d0ed3d8d
RLBA-2022:7438
java-11-openjdk bug fix and enhancement update
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Bug Fix(es) and Enhancement(s):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Bug Fix(es) and Enhancement(s):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862)
rocky-linux-8-x86-64-appstream-rpms
java-11-openjdk-11.0.17.0.8-1.el8_7.x86_64.rpm
b4b8298d97ec3a0b3729caa82149c0e482625e9c1bae71d57102330281a9c249
java-11-openjdk-demo-11.0.17.0.8-1.el8_7.x86_64.rpm
413e2059917a6cfb0de0fa9b48b638181769d8c3962e7541033b49992e4150fe
java-11-openjdk-devel-11.0.17.0.8-1.el8_7.x86_64.rpm
cc2373fa88ae86db0f9056422882b00a8aa63a784241e40484e9f67bbfd5d26f
java-11-openjdk-headless-11.0.17.0.8-1.el8_7.x86_64.rpm
d7291c0e1bada7525bb4b9d11a516f3998d2faa1f6b441cf1cb765c6d465d326
java-11-openjdk-javadoc-11.0.17.0.8-1.el8_7.x86_64.rpm
c69eaea884949a91c731e8bd382d39501f2466fa39ac40b79687e3271eb160c7
java-11-openjdk-javadoc-zip-11.0.17.0.8-1.el8_7.x86_64.rpm
203c475c5749084c9ce2838a10cc8fa4e060ce23daf07c194612b0a4c17f437c
java-11-openjdk-jmods-11.0.17.0.8-1.el8_7.x86_64.rpm
376a70b9294fdf208cba2f3a18dbb4e998f7704ae3185f4f764a5b1be53516c0
java-11-openjdk-src-11.0.17.0.8-1.el8_7.x86_64.rpm
f4e5bee82d6228dfeff59c4b3e29c4d49a89ae298983607e3745c623c7c2048a
java-11-openjdk-static-libs-11.0.17.0.8-1.el8_7.x86_64.rpm
09c1f027ff03b8fa877f02900e2aaa9fdd746ba76c94b2fbcb92c0b91dc0f094
RLBA-2022:7861
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943)
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.0-1.el8_7.x86_64.rpm
878f9d6b5c38bff3b31ad21dabd579b984b8b4cadbd09a106e9daacdaadcaa38
aspnetcore-targeting-pack-7.0-7.0.0-1.el8_7.x86_64.rpm
151c726ec77a0463322cf8e6d85228f433bf9d639fc69d2ba2a62d97afddeb4e
dotnet-7.0.100-1.el8_7.x86_64.rpm
206e2ee7237a5c0a55d1043be0537b58a162814fe44fe93f7592ca10a52e702b
dotnet-apphost-pack-7.0-7.0.0-1.el8_7.x86_64.rpm
7fa30d5707209477c273499e8c19bed4f6ea19f18ffe37d1b7d050d4855f4942
dotnet-host-7.0.0-1.el8_7.x86_64.rpm
aa043a73b66ef2e40266073351cd663c22223c3b1b4fd1f6acf6ed9c51efcf04
dotnet-hostfxr-7.0-7.0.0-1.el8_7.x86_64.rpm
421cb3357b477659fd3b7cb534ee9a3a735ff44b5a69f32e3a3088787c59a251
dotnet-runtime-7.0-7.0.0-1.el8_7.x86_64.rpm
8f9b1c50019b172719d57cde37b02dc769d3332898a710f3599ee174849b11dd
dotnet-sdk-7.0-7.0.100-1.el8_7.x86_64.rpm
0461180b438eb7121f3f141e50d7bcf1a7d3b0e271b0c099fc512c82a0c9ddad
dotnet-targeting-pack-7.0-7.0.0-1.el8_7.x86_64.rpm
25415080e2c9cf1d0ca5f3c304dc60566c490a4528aadb723ff6479feb685d54
dotnet-templates-7.0-7.0.100-1.el8_7.x86_64.rpm
21fde39f57873fea6b2bd78854959699ac14f8b88298aa0cc711dcc1b88693e7
netstandard-targeting-pack-2.1-7.0.100-1.el8_7.x86_64.rpm
b24fc1b37cf501c6ee212bbfc5b112433b475ce0292b5f164529331848c30e1d
RLSA-2022:8492
Important: python39:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-toml, python-urllib3, PyYAML, python-requests, mod_wsgi, python3x-pip, python-chardet, python-psutil, python-ply, python-wheel, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, python-cryptography, scipy, python-idna, numpy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__python39
python39-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
7a8ee5a5cd1f0de76f24260d131d89147cdbe8050e0fdd8498bba2e7a02ec868
python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
5c02447c8ff2136db89ec9e460b648ab94d693c856f31a935b954ee4685a0a58
python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
fca470ded214eb9f8d29350903d475c5a7344cb1290558422e91a501509ef4e5
python39-devel-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
3b10a486f9f18d09c1172822d0bc10f4839819625b8485997d7ee0686f0e39b6
python39-idle-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
e549dc525b65cd3575243e24e0d3a8a0de0d8db72fc5485f889e74e7db2cdb4c
python39-libs-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
25c78438938258d4a4a38baa2ff0aeaeb5d2b0681305e03194c8a61721c44143
python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
bd303526c559993208ecddefea9dcc939a2901a05d3497d1327114a3eb560b17
python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm
603e3ea442bedc2f6a2ab4f9b17eb4b50ee5bcfefdf2a90ac14eb32fdf1d3938
python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
fc796515ca07eebbffc5ca84841932966e29a6fb4380f1d965c3261447bd4b57
python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
49df5c8b576de7003ad00c034012b1d55317038db70b701e3e2e276bb171fa12
python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
8d30543fa2b3bbb8ff23245a4e6e39c7a07916dd3b5a1e6690624003a313388f
python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
580638056f73fc025475f527bab6d7c2755cf9fb476ce0d07cf890202fed0002
python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
d2bb997a6dc10710673e8057bca7f7519330565c2d8c71f03bdffc47e76f5396
python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
b246597ef8add02d1f6ad3d596ad9b6f12a81960a961611eb206b0bf8cd9ef4b
python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpm
5def45a1d2ecf22f5d1205fcc802cb925f9aa7c6e3ffef5bc1611f7b54e8d1d5
python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm
66f39869504356ce4c7894fd8e48302c9a798ece5598c4ea1ac9ec1d1f563a5d
python39-test-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
15257bab47c339067d514868f259751b4dc1ca12c07ce14fdb09f774d106dad0
python39-tkinter-3.9.13-2.module+el8.7.0+1092+55aa9635.x86_64.rpm
c4cc624bba9ec5d36764ff31594acbe09f464a8227bb79851b38f252a8d1a33c
RLSA-2022:8547
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.5.0.
Security Fix(es):
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.5.0.
Security Fix(es):
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.5.0-2.el8_7.x86_64.rpm
475f1d6df087435fcefe313a755054f818a67bba03b9dd066bf99dcbfdd5ec8e
RLSA-2022:8554
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.5.0 ESR.
Security Fix(es):
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.5.0 ESR.
Security Fix(es):
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.5.0-1.el8_7.x86_64.rpm
f96ae8017c6b8ae8fb7e05d01518c9e16be3bfc1d8cce9ca70672b6d2387762e
RLSA-2022:8649
Important: varnish:6 security update
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: Request Forgery Vulnerability (CVE-2022-45060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for varnish, varnish-modules.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: Request Forgery Vulnerability (CVE-2022-45060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__varnish
varnish-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm
5a1fa7ed104adb107faaddafd8e877beba1351a69a607642a63c0379a383a4dc
varnish-devel-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm
ee7ce281889256348965d2ee8adbbcd754e77829762f455806fd8e514550afe4
varnish-docs-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpm
de9011b3a31dc1bef73344bf0eeca380405f881f2975d3bf29ae06cc7412454f
varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm
9f142580bc9ff006c18a2d86bd0a1c68b27695311f4ad7156ba397100734a20e
RLSA-2022:8833
Moderate: nodejs:18 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818)
Security Fix(es):
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818)
Security Fix(es):
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm
aea785debf4481bd0e02678272a77396bbdc8dcf6b0f02d0a0c355ee25c67bde
nodejs-devel-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm
de3833917292c5c7473db9db975ae6ac53fe8887d0bf4699c0812ae1da27dc21
nodejs-full-i18n-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm
8dd89c09e0bbc8a8671c8f310147558f61655eb1147da5cbfe8de9bf1bca1257
npm-8.19.2-1.18.12.1.2.module+el8.7.0+1104+549f92a6.x86_64.rpm
5aba9b1c42407f8e82c505064fc689e153c0939e96827320a17e7d389829d550
RLBA-2022:9018
.NET Core 3.1 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet3.1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219)
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm
321a9227f7a51654049bc09e0f2ce8a754e420e11c71a9fab4bc2a456dc2eb88
aspnetcore-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpm
ef7b433a72ec8356e0bef8fcc4a48e4fa039b188abd2e815e0ef06bf31db9551
dotnet-apphost-pack-3.1-3.1.32-1.el8_7.x86_64.rpm
61ff6e071d2e85056d0211ad5d8a1983c9e10a8db1da945567f4f38a1396907b
dotnet-hostfxr-3.1-3.1.32-1.el8_7.x86_64.rpm
733b0d67480937424b1628b33545714519511b60b4266f9418c8cbcf7b00484b
dotnet-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm
ecc3c698aa2fc5ffc1a4ae5af831423e80972178883d6897dce35692e0aaf976
dotnet-sdk-3.1-3.1.426-1.el8_7.x86_64.rpm
40687d8ce0358edb1597c22c456ebc8fdebb0b9af4a6839261b1b92d1a37b77e
dotnet-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpm
e9cfa562100cd5d4ea75e21d0f6f308b00ae1303c73b4e4ccce82e70145506e8
dotnet-templates-3.1-3.1.426-1.el8_7.x86_64.rpm
2eab8aa7fc541ef65617ebdda07745ffd3f98abca35ba60dcacd00df4332ff64
RLBA-2022:9019
.NET 6.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147)
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm
40eb805b34e75308a953b764f740cffc0b52ff48354e118ee2f8c0e1a9fd2f54
aspnetcore-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm
24679a9fa18db67d5e4d5af2f59bf8419100ae01076983c95f32ba3e70edf059
dotnet-apphost-pack-6.0-6.0.12-1.el8_7.x86_64.rpm
5ae896ebac661ffda075e21ce8d41cbca61f4ea1cf93f4126b64b98adfc0f8cf
dotnet-hostfxr-6.0-6.0.12-1.el8_7.x86_64.rpm
e053fc0aa64ba6a7eb3d21bb6e152838b3cf2bbff56e956a934df59c06444f8c
dotnet-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm
c8fd6a01a6d2dcf00f64cb90b6b821ceac85408d4928ff5205836a2709a7e6d8
dotnet-sdk-6.0-6.0.112-1.el8_7.x86_64.rpm
0caf19b488f04ef0674893521e5fcd92e8680d7c8fb2aac8a6ed3ceb4c7d3fe1
dotnet-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm
7dca74b8041934891ebadf7bf016390e64745223173672b9631a7b855c50d1eb
dotnet-templates-6.0-6.0.112-1.el8_7.x86_64.rpm
67a7dc47e75c39a9743bff3cdc0551b7853024e017afc27773943f3e5445c83a
RLBA-2022:9020
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151)
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.1-1.el8_7.x86_64.rpm
7e43fe0a5c4c88b1ddcf2d7f507ad38377da00a50e66b1936097cc9d029a2c0b
aspnetcore-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm
fd7290132750d545aa8c12072861ab647811219242e5e211961a357ee86f2cd7
dotnet-7.0.101-1.el8_7.x86_64.rpm
a95b04fe3de2a4793f8cf8db2bb6e7485ab0c699784446a68a904c2dbad7446d
dotnet-apphost-pack-7.0-7.0.1-1.el8_7.x86_64.rpm
0cf19b555eb333bd7382da6c3115543948caf0925634212e8b3ce9c415d9fbc0
dotnet-host-7.0.1-1.el8_7.x86_64.rpm
99fae50921aca12abcd7cb7df97937e13193d133912668f4e10d47b6d6335684
dotnet-hostfxr-7.0-7.0.1-1.el8_7.x86_64.rpm
8ee69163ee0f44a2503eca39c62712330a04830ea711776071004e83fa3a11f2
dotnet-runtime-7.0-7.0.1-1.el8_7.x86_64.rpm
9afab5eab6fbcfffadfb298c1abcdeb421a48d3dd3778e68b1e05d1698ed9905
dotnet-sdk-7.0-7.0.101-1.el8_7.x86_64.rpm
840928e1999fa87024dd8309803d3392288dfa6c08b7aa80fac6940fe14fd14e
dotnet-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm
fa4ccf679be8704480c144cba45ed10f2c7b3679c42b0440ecc5a98f32cf0f5e
dotnet-templates-7.0-7.0.101-1.el8_7.x86_64.rpm
868aa99c208a5ee4098322b5142a27c51c0a9e093092a9c6601cb32a556fbe9b
netstandard-targeting-pack-2.1-7.0.101-1.el8_7.x86_64.rpm
f0fcc000efcb027874d095cd43fd9210fd8f2f5e61d40f2190bdf833506ed278
RLSA-2022:9067
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.6.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878)
* Mozilla: Use-after-free in WebGL (CVE-2022-46880)
* Mozilla: Memory corruption in WebGL (CVE-2022-46881)
* Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874)
* Mozilla: Use-after-free in WebGL (CVE-2022-46882)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.6.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878)
* Mozilla: Use-after-free in WebGL (CVE-2022-46880)
* Mozilla: Memory corruption in WebGL (CVE-2022-46881)
* Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874)
* Mozilla: Use-after-free in WebGL (CVE-2022-46882)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.6.0-1.el8_7.x86_64.rpm
34955a1b826608022b8a34be29ca7e0fc0a075a4a22577ba07aaebaf3b9b814e
RLSA-2022:9073
Moderate: nodejs:16 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* minimist: prototype pollution (CVE-2021-44906)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* minimist: prototype pollution (CVE-2021-44906)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625)
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm
9627a638967cca454e0eb74aadfba8c320a4f90aff79b91ff116fffca8858675
nodejs-devel-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm
8f759716abc41be055e7d194521e5b8c294942f9a4d69cc8b7fdd2011ccafead
nodejs-full-i18n-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm
299c1e5c4de5ad93ac8947a3ff0a1e96cd9f1a4f7f3c4022b0adbf6e287e42fb
npm-8.19.2-1.16.18.1.3.module+el8.7.0+1108+49363b0d.x86_64.rpm
63e6c5dbb05c4244de9d5ebe69fccb1c9ddff7b735d232b69d4237db460e5ab8
RLSA-2023:0016
Important: webkit2gtk3 security update
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el8_7.1.x86_64.rpm
b66f4a20f2cfa416c253e59f5abdae4d60ab0c8eb6fa108b62e5dc437ab2063f
webkit2gtk3-devel-2.36.7-1.el8_7.1.x86_64.rpm
80c833250fea9c202b88609c6b4ab83d58dc8c614c4ae61a711f0625e4c82053
webkit2gtk3-jsc-2.36.7-1.el8_7.1.x86_64.rpm
4e1275424c38905ac892ce8c1c0da21f05575d77cc349c53d2ef10e38b11aec2
webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.x86_64.rpm
ebcdca510922906cce63a30a560158cc97a434cc1187796aa7a6ca34006f7ac5
RLSA-2023:0050
Moderate: nodejs:14 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* minimist: prototype pollution (CVE-2021-44906)
* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* minimist: prototype pollution (CVE-2021-44906)
* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__nodejs
nodejs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm
56b0c87890dd9e9563794ebf5b65af30a92acddc18d7ae8c378a704621d1946d
nodejs-devel-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm
17d8ad3686b58b35212ce357b7ce43e5fc656bdec8d101186f00e5a411b730ac
nodejs-full-i18n-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm
8f0511b89a54ea41b1e6e274cdd6e243a084b083d0edfe2d9ddfa5d55b37c2ad
npm-6.14.17-1.14.21.1.2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm
a472fd1bc022b9a378a5db241fda34d0fc6c16d234ec9801494fd3c3c32e79af
RLSA-2023:0079
Moderate: .NET 6.0 security, bug fix, and enhancement update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13.
The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458)
Security Fix(es):
* dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13.
The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458)
Security Fix(es):
* dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm
19cd947e3adc70c742d707df2cb6d5002f3d6ac755bc76cb2de3e0967810c3ff
aspnetcore-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm
e92089de7ad5c684dc22fd190cadc07b0c50a97ad4c82c1d63b0f57b435104e6
dotnet-apphost-pack-6.0-6.0.13-1.el8_7.x86_64.rpm
428b8d78d564a4e70047245b632fdf13b7056b1092fb0f5ca3e9edbe8f6ac64e
dotnet-hostfxr-6.0-6.0.13-1.el8_7.x86_64.rpm
1efcffd0ba52bafde6dfab411848e1254daba7bfec6e409a9c16ef31d3305084
dotnet-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm
0e2b60eb3232918cbc31eb82b3b894b49307ceeb33d8c99b72780cc8ea4c114c
dotnet-sdk-6.0-6.0.113-1.el8_7.x86_64.rpm
1473d96fd6aeef8aefb3aa4a131ec9b1e20504d940aa8976d055d24aa85078b6
dotnet-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm
513d42eed786b52bac7a89debf53982b79f9c6c97df7dfb8aa82696e464697d1
dotnet-templates-6.0-6.0.113-1.el8_7.x86_64.rpm
8f3a7f3e4b65d6772d56ce60ec525958af78c523c41799386a585c1df0f52edc
RLBA-2023:0081
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466)
rocky-linux-8-x86-64-appstream-rpms
dotnet-7.0.102-1.el8_7.x86_64.rpm
e095f2d0625ef0686b6ea540ca45ac81f23bfc9153b5bd7203d31c27453a6298
aspnetcore-runtime-7.0-7.0.2-1.el8_7.x86_64.rpm
2b42f45d82b387cecbe3b41339bcd839a3bbbd0c8194a333a2a7db656bde81ba
aspnetcore-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpm
bd1b9b7f2c4bd7939c8f6322eae6aa599a18da3f560b2662ecb1a88db6671fed
dotnet-apphost-pack-7.0-7.0.2-1.el8_7.x86_64.rpm
2c0e7c8657f597286fdbcb586b1ee995b4f3803c22cc704106a01cded0ec0af0
dotnet-host-7.0.2-1.el8_7.x86_64.rpm
8a4b1cbdf55add0651ee4fd080ac818067fb824fad3178069ed5c337cf2e0347
dotnet-hostfxr-7.0-7.0.2-1.el8_7.x86_64.rpm
ce335e7036bf94cc18dc46791b19a44dd51bc2242377448e7df0bb324f51a42a
dotnet-runtime-7.0-7.0.2-1.el8_7.x86_64.rpm
6f9a221cb96bfc8a8b3f5f62cfe7ca30ac568c07ff53d47a12c67f8ac97fb3c1
dotnet-sdk-7.0-7.0.102-1.el8_7.x86_64.rpm
3c283655f110b4aa7485baa93ae12f0d3de144d1beb0d7de2d61ab034d611608
dotnet-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpm
53ad722510b3b550ac22e53223f07d2e60a856009a55011a38e66c109ddbd5ca
dotnet-templates-7.0-7.0.102-1.el8_7.x86_64.rpm
d2dcf7c46309ce7ef4006d7dbba0c28b4d1a44c2da56ab9936fd71d6ccb608e7
netstandard-targeting-pack-2.1-7.0.102-1.el8_7.x86_64.rpm
7fd06fac7c6ed0309f2bd4fa26ea6bbd890e3be7cb59638a13fe9c46ba9cd7ee
RLBA-2023:0084
stalld bug fix and enhancement update
The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system.
Bug Fix(es) and Enhancement(s):
* Stalld is running in unconfined_service_t type (BZ#2126494)
* Rebase stalld to latest upstream version (BZ#2136559)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for stalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system.
Bug Fix(es) and Enhancement(s):
* Stalld is running in unconfined_service_t type (BZ#2126494)
* Rebase stalld to latest upstream version (BZ#2136559)
rocky-linux-8-x86-64-appstream-rpms
stalld-1.17.1-1.el8_7.x86_64.rpm
c87a345a98e19f757a1d558cbca24f977cd2fbbdb2017d78e9c02f7567f3b292
RLSA-2023:0087
Moderate: usbguard security update
The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature.
Security Fix(es):
* usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for usbguard.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature.
Security Fix(es):
* usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
usbguard-1.0.0-8.el8_7.2.x86_64.rpm
bead5d977d07d2d41fabef3a978ed0f2989c063e606ea9a758a1faeb5f65e7a8
usbguard-dbus-1.0.0-8.el8_7.2.x86_64.rpm
749989aad3eb094437083a29d3bd008e9931e285c123bece253553ab47ddb502
usbguard-notifier-1.0.0-8.el8_7.2.x86_64.rpm
2bfaaafc8666861af9200e1252999f34c139c92a668575b7f2d1c5bbb0549a0c
usbguard-tools-1.0.0-8.el8_7.2.x86_64.rpm
dcb2b90d6dadd791ede0fdede5e3dd072b8b11c883bba4b0a38f149f88574108
RLSA-2023:0089
Moderate: libreoffice security update
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Macro URL arbitrary script execution (CVE-2022-3140)
* libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305)
* libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306)
* libreoffice: Weak Master Keys (CVE-2022-26307)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libreoffice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Macro URL arbitrary script execution (CVE-2022-3140)
* libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305)
* libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306)
* libreoffice: Weak Master Keys (CVE-2022-26307)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libreoffice-base-6.4.7.2-12.el8_7.x86_64.rpm
9deebcb58ac4783324552f21a1f2f403c46efaaf2c849b29bbffd55cc149f4b7
libreoffice-calc-6.4.7.2-12.el8_7.x86_64.rpm
45f20bd885d9ea95ad3d38da587efd34ab8566aae1fc16b9edd8b799efe6b081
libreoffice-core-6.4.7.2-12.el8_7.x86_64.rpm
3cbd9785ee4477918182a0d4b8771efcc1d520d53dc900c0318a29804204a9c8
libreoffice-draw-6.4.7.2-12.el8_7.x86_64.rpm
da2bf1fe25abbc8e25f9a27f00a70e09d77b385673f280252b6cfeda0cd0eccf
libreoffice-emailmerge-6.4.7.2-12.el8_7.x86_64.rpm
5f909c8f53dcab427922a6fc30fabac33790535014bcd5c1e3c1fa3788e293e2
libreoffice-filters-6.4.7.2-12.el8_7.x86_64.rpm
90208aa5a9fb3dff1e62632a77c50cfe9f1c89b014821bf24cb9937006fae00d
libreoffice-gdb-debug-support-6.4.7.2-12.el8_7.x86_64.rpm
c1057c33b91da23d108669763b6f62c85628bd14806d4ca8360acabfb372c2a0
libreoffice-graphicfilter-6.4.7.2-12.el8_7.x86_64.rpm
b2f5c65f1f9e81f470b062510beae2623009f6f0a3e531f6091c54e26cc6bda4
libreoffice-gtk3-6.4.7.2-12.el8_7.x86_64.rpm
31f275dfadd60e75590b981f5e2e3d350ca435eebb744f252af0449475bd3db1
libreoffice-help-ar-6.4.7.2-12.el8_7.x86_64.rpm
03fe1c78cc0fed63f87e2b58b02a94360ccda0a533cd603ce90b28ffd3c057a8
libreoffice-help-bg-6.4.7.2-12.el8_7.x86_64.rpm
fdbdfcd0a4a4e575d5f655a7ceaddac1ca11fb33c3e83d5f7c8b913f22d97e6c
libreoffice-help-bn-6.4.7.2-12.el8_7.x86_64.rpm
d8a96b6f2015428cefa02cfdff90902e5ae27554f0be3164696b09ea50870ce4
libreoffice-help-ca-6.4.7.2-12.el8_7.x86_64.rpm
7179140afd77d3875e0d7c9ecd43e19a654ef96fb595ffca3f59c319a6d320e7
libreoffice-help-cs-6.4.7.2-12.el8_7.x86_64.rpm
3d0747ad197014f6ba2587c7606896fb34d877a51f6f9af6915427c63393a362
libreoffice-help-da-6.4.7.2-12.el8_7.x86_64.rpm
4f0d8defeb48b46dcb66115009dd6261449ac7460fd7bb83b9d0c2e963661e36
libreoffice-help-de-6.4.7.2-12.el8_7.x86_64.rpm
5fd82a98933a3c13395abf683e16582005f6ceaeed874da10a5584b584e4050a
libreoffice-help-dz-6.4.7.2-12.el8_7.x86_64.rpm
061daffcf62d23b770309154ebc96c19cc8abb0efae134b87db778fc29b223ee
libreoffice-help-el-6.4.7.2-12.el8_7.x86_64.rpm
905d4b9c9ad8867b4ce77b46854e59cb419cdb71aed4156ebd130c8e7320f9b4
libreoffice-help-en-6.4.7.2-12.el8_7.x86_64.rpm
63abd46aff7062d541a9f7e153f8a7b4b5386fd77fb3e9ac6b8c401582bfd79a
libreoffice-help-es-6.4.7.2-12.el8_7.x86_64.rpm
1c85f4ffba87630dc09ccadd412dc0ed175478979946ef297a58a1bb656a30a0
libreoffice-help-et-6.4.7.2-12.el8_7.x86_64.rpm
f4dbf53da1e2d0d0720616421abbcdcfc883b358d903e580ebed80d16c28a7eb
libreoffice-help-eu-6.4.7.2-12.el8_7.x86_64.rpm
775d73a53772925ee49bf373319613ac438a1f1129fdace2c7de5ac5911639ad
libreoffice-help-fi-6.4.7.2-12.el8_7.x86_64.rpm
bd195ccc3acc49c1d308eec2c61be26235758c7f4d095b92692ce3330fba6121
libreoffice-help-fr-6.4.7.2-12.el8_7.x86_64.rpm
e36bbcac8772045a802c2c3da20c842fb38bede9034866b92a0ab60bf8085705
libreoffice-help-gl-6.4.7.2-12.el8_7.x86_64.rpm
cf44888c78e8b61c7d611bf573987395e9bb24c769aa5c0a39590aa52db4834f
libreoffice-help-gu-6.4.7.2-12.el8_7.x86_64.rpm
0964e9568867d77881795baaabf001b6b1b83cfc545ad6656281f3e7ed2352d3
libreoffice-help-he-6.4.7.2-12.el8_7.x86_64.rpm
2019265a6a8c3f1fb76433e67772bd156628f247a7065ac4ee814f671b3a87a5
libreoffice-help-hi-6.4.7.2-12.el8_7.x86_64.rpm
550c3ba6e15ba8a62da4e5f958ec8d20984b0623a6198eb30e51c6cb17c56bcd
libreoffice-help-hr-6.4.7.2-12.el8_7.x86_64.rpm
e07ca69bea41a1a569a8401f609c5a54f549388222785ceca143578b8a987bb2
libreoffice-help-hu-6.4.7.2-12.el8_7.x86_64.rpm
32104e85d1d031346f887858c704e16d70190ec07fb7555ddeed1adbf8b4f271
libreoffice-help-id-6.4.7.2-12.el8_7.x86_64.rpm
07a8b6ef05bc1a755c7d3e520d0bbcf97c6ea1e79e81a42f71e5037379b8aefe
libreoffice-help-it-6.4.7.2-12.el8_7.x86_64.rpm
b71f395d01167807bdbd5002e72533eedcc5fece8194d5e88dd6e938781d36e1
libreoffice-help-ja-6.4.7.2-12.el8_7.x86_64.rpm
d838bd3b65267a5ad627fc7dd5c30475a87087eeb8cec473dcff61a652ba883b
libreoffice-help-ko-6.4.7.2-12.el8_7.x86_64.rpm
9f16281ca9e6b11a806965017526ee8de81302d5292db4f0a183e61e5a4225bb
libreoffice-help-lt-6.4.7.2-12.el8_7.x86_64.rpm
df83459ed931fb894b00b7982486dddf4b56b76c53ac4155ec6bb639ebfb2fd9
libreoffice-help-lv-6.4.7.2-12.el8_7.x86_64.rpm
d9f30c2d7bbea6f8781a95f323822eba6cf5f131df607db0fb994969487e5950
libreoffice-help-nb-6.4.7.2-12.el8_7.x86_64.rpm
9ca2b4619438b7641e4c9d0abc5953c443b4a9560859f3802df03ac89d8c2bf2
libreoffice-help-nl-6.4.7.2-12.el8_7.x86_64.rpm
656922d1e3e46d135682be6c0217e5838d4e52a47efaf9c53845a4afb206de14
libreoffice-help-nn-6.4.7.2-12.el8_7.x86_64.rpm
df201fc5e2502d02a02df4c764d56ff8e0c3278f54a4621f0827c8f5c9cab9a0
libreoffice-help-pl-6.4.7.2-12.el8_7.x86_64.rpm
140c982b96d38129606fe56e2261d8f0ae0ed185370bf7789ccd89d4970d15f5
libreoffice-help-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm
a45a07329a4cf98a0764bb99741585c406b1772d8f5be084b4308f8a75cad4a4
libreoffice-help-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm
eb226155b12d7226a5f0c0b48eb4a98286b5bbc22c0e57b5284acbc518144975
libreoffice-help-ro-6.4.7.2-12.el8_7.x86_64.rpm
fccc471b6ee0475dc03a207ae980e6dd6ed74e0734e60a255a4484ce8966f347
libreoffice-help-ru-6.4.7.2-12.el8_7.x86_64.rpm
390774ed5168088441725a2b5e7eb34e8626d66867b5980c421911831e977e3a
libreoffice-help-si-6.4.7.2-12.el8_7.x86_64.rpm
4094a72260b9c4bd81bf99ff29b977e2a5e87677c94fe3d5393de0b6cf3b2c5f
libreoffice-help-sk-6.4.7.2-12.el8_7.x86_64.rpm
e4bf9168efcfb7d0ecb9ee06356f99c2e75ef4e2efede5cd203f57bec12c4f66
libreoffice-help-sl-6.4.7.2-12.el8_7.x86_64.rpm
de5a992db120952cb0f0b613680ba963859f360f0120e7069ca482b154ebe1a9
libreoffice-help-sv-6.4.7.2-12.el8_7.x86_64.rpm
e62ba73a3ca1b85f88b7841e433966a4dab2b8df1c97284c8ba9f2e926cf1011
libreoffice-help-ta-6.4.7.2-12.el8_7.x86_64.rpm
249b6a093b879d4cea82077a601fee34f28550ac80614f91bbc477f77b3cde16
libreoffice-help-tr-6.4.7.2-12.el8_7.x86_64.rpm
4bebcd0b5d9c03d0fa2d7ce9183fcfa23734c370e829ba059bdf2f42aabf50d5
libreoffice-help-uk-6.4.7.2-12.el8_7.x86_64.rpm
b3f2b9baef677289e1895e22a5d0260d5a96dcd98110ce697ae60367a64c5c77
libreoffice-help-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm
aeb00838fb4028809963aa331b5bdd4780cd4ae0aaadd485dcbb5bf9d0868bda
libreoffice-help-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm
252db31dae8a5646f2beb4bed1d7d45452adadcd40122ebc7c3860d89db30372
libreoffice-impress-6.4.7.2-12.el8_7.x86_64.rpm
67be3a38ec41a6a2a601c6581065badf857931b4c4913778dd308ba92026a849
libreofficekit-6.4.7.2-12.el8_7.x86_64.rpm
b6bdbc45d9331f47f98f51365a3319370c23504399231f50c0621b5a2edd6fd6
libreoffice-langpack-af-6.4.7.2-12.el8_7.x86_64.rpm
988d4bb624e4092d22428ba3c02418a8daf433889d326f9442b2c17432efba12
libreoffice-langpack-ar-6.4.7.2-12.el8_7.x86_64.rpm
b7d0ea249c8860ca81b86340caa2f478d74b592db6a65d78c2299cd49392975c
libreoffice-langpack-as-6.4.7.2-12.el8_7.x86_64.rpm
9cce1c70933c751dd20d1a544fbaa0478291b6cb12b906b3f199cfa68f27b034
libreoffice-langpack-bg-6.4.7.2-12.el8_7.x86_64.rpm
cc813cecf999bcb5328f6c513ae04b04ef3733c601c503b917ef58ec6b1d0e0e
libreoffice-langpack-bn-6.4.7.2-12.el8_7.x86_64.rpm
d022d597fe34c30fe08a21759530fcd70cdf22ecf6134bb0c49831dd492cdb6c
libreoffice-langpack-br-6.4.7.2-12.el8_7.x86_64.rpm
b5cc2916adb880104a19c834aa5b78ce82b6d3fdd5bc8db8a4e9fd4547dbb41f
libreoffice-langpack-ca-6.4.7.2-12.el8_7.x86_64.rpm
67853fb62255bcf3402bf99bddb7146187f9ffe7ed15359a26171beb96ed0682
libreoffice-langpack-cs-6.4.7.2-12.el8_7.x86_64.rpm
ff597264ac48be32cfeb88e4f3f6f0cd2bc4b919e2b8ca72ab4fff490e726671
libreoffice-langpack-cy-6.4.7.2-12.el8_7.x86_64.rpm
f167869e5da9c0f90cf7863afd4c3108aeb232d25c24e069477acc6105735b1e
libreoffice-langpack-da-6.4.7.2-12.el8_7.x86_64.rpm
71dff527ec52f21588c691391242da382f280eff6d3d2a58aebb5903e576afb2
libreoffice-langpack-de-6.4.7.2-12.el8_7.x86_64.rpm
7fa65109052fc759a641b02af8f0c62872d801f8cc7cc10cd78cf323bce336a0
libreoffice-langpack-dz-6.4.7.2-12.el8_7.x86_64.rpm
0fa381039a2d67ccd8c7b99b8a0e9a6d80cf3a683742a31366ff84b3584d863e
libreoffice-langpack-el-6.4.7.2-12.el8_7.x86_64.rpm
f835835d16e9840a1965d89fcc2866de00260d0dd60835c10e9cb17e6c5a85de
libreoffice-langpack-en-6.4.7.2-12.el8_7.x86_64.rpm
2ec84959ce5836675aa81ad37aca5d28b8aa1d6ff1221605d24b74f61fd0919b
libreoffice-langpack-es-6.4.7.2-12.el8_7.x86_64.rpm
34cb6e5d14a5d01f304ec9305da161db14d817c44cc03032235df8997dbf8d4e
libreoffice-langpack-et-6.4.7.2-12.el8_7.x86_64.rpm
9d067670e2d1e873b76164c19d4c64883c11ee6c84da0968bf28f3e59ead02cd
libreoffice-langpack-eu-6.4.7.2-12.el8_7.x86_64.rpm
5d1041d87c60aa7a925569fdade1d024b6eac454bc6f9a3289a3e659f6ffa5f3
libreoffice-langpack-fa-6.4.7.2-12.el8_7.x86_64.rpm
2daad575be18ab653d9c941c50f93e1ca3d0e58215b02b98a628639649be0ac1
libreoffice-langpack-fi-6.4.7.2-12.el8_7.x86_64.rpm
ec659e9d5b7e6cdba759a28a157f1c0df8daaefbd10e091097b73faaf7a6b3f9
libreoffice-langpack-fr-6.4.7.2-12.el8_7.x86_64.rpm
edd7b8db2de740f9f6cb4dd98582a662ffbad17c750ddac737d2e5c5e023db9f
libreoffice-langpack-ga-6.4.7.2-12.el8_7.x86_64.rpm
851999159c382c1b90712630287801476a7e9d263374523bb77f9cbf6fa81df2
libreoffice-langpack-gl-6.4.7.2-12.el8_7.x86_64.rpm
979da47e05ad699f615140ff8023ea06bf9111f9904f1293803dcf79b2d58384
libreoffice-langpack-gu-6.4.7.2-12.el8_7.x86_64.rpm
1c278eb3f5a666c5ab131a702ec45df4afca8ab843dc482f014a470a755da3ba
libreoffice-langpack-he-6.4.7.2-12.el8_7.x86_64.rpm
7a49ecc4b338b44bc9a1735c732fd235c27b44e7975501a176738d47ae5ecaec
libreoffice-langpack-hi-6.4.7.2-12.el8_7.x86_64.rpm
a8f1719030de272608a23246c6b570baec60ec9226eda53121be1837f7394775
libreoffice-langpack-hr-6.4.7.2-12.el8_7.x86_64.rpm
cf01d61302e7a2be6894af3ad56aeef65c0684f293ce33dc5b0299621b4a1928
libreoffice-langpack-hu-6.4.7.2-12.el8_7.x86_64.rpm
db1590dc81257b73a5ece23a5a1b5b0d84fbc04358c9f449e5ad6c163d0fe09c
libreoffice-langpack-id-6.4.7.2-12.el8_7.x86_64.rpm
d25e6f6b4cca141b5c095803714a386db9a3ff4dc7681ffeeb82510a42f313a1
libreoffice-langpack-it-6.4.7.2-12.el8_7.x86_64.rpm
c533b032b03631ad895b6b25a6ba2c4c80f2e2b9569f57f105c73bc01d4834ae
libreoffice-langpack-ja-6.4.7.2-12.el8_7.x86_64.rpm
f80e02f8ef9b9a2622f4331ddce869eed199bf9840bd883b356233c0a3d3d88b
libreoffice-langpack-kk-6.4.7.2-12.el8_7.x86_64.rpm
e8b0d4061c628d08444a9f5aa8b9335d04e5d5a9e2f7b38454e586f91e673ae5
libreoffice-langpack-kn-6.4.7.2-12.el8_7.x86_64.rpm
270d35513dd77f54c0d1ca36211595616122ff259ac05a2620a3f9925bb9aa13
libreoffice-langpack-ko-6.4.7.2-12.el8_7.x86_64.rpm
9283ba31d93a13b3f55377a470dc1de640fcd206c336eb5e519e51abb81f4cab
libreoffice-langpack-lt-6.4.7.2-12.el8_7.x86_64.rpm
0f7c47353e9ab31a8fb5458ba201ec9f94cd1011478fb367ccd68febf35eed3d
libreoffice-langpack-lv-6.4.7.2-12.el8_7.x86_64.rpm
7195b5abd97ca239e1d3864c82283abdd8e04881af0b3492ba1ef85cd19a7d54
libreoffice-langpack-mai-6.4.7.2-12.el8_7.x86_64.rpm
2fb567b2c0480151158ef5cc67f7ec04bf74400103609688f21c5622f7b97d7c
libreoffice-langpack-ml-6.4.7.2-12.el8_7.x86_64.rpm
7cc4b7f6788ebea37e668fe237832a8a66a6d442421edd8d6229d109d9ec7ae4
libreoffice-langpack-mr-6.4.7.2-12.el8_7.x86_64.rpm
91c115e543b49a5e78530f17c379e25b5cf9c78d7c93d9df2291e374d432a1b0
libreoffice-langpack-nb-6.4.7.2-12.el8_7.x86_64.rpm
581bd3d33b559812190568278625c2c39b4320d8d7fe74a85f01cb5eb87225f1
libreoffice-langpack-nl-6.4.7.2-12.el8_7.x86_64.rpm
20bdfb91d94dc101ec3d9bc2721ffbffd997fc9132119fa27db0b4ec06326769
libreoffice-langpack-nn-6.4.7.2-12.el8_7.x86_64.rpm
3016cb44ef0366306cb0078aac79e7f0a0c0206c575306c9008145d66ee95b80
libreoffice-langpack-nr-6.4.7.2-12.el8_7.x86_64.rpm
db77dc0b8ec143e88acdc36da1d1bbb9e4084170010e03e2bf58b79c9d29ed8b
libreoffice-langpack-nso-6.4.7.2-12.el8_7.x86_64.rpm
3155dd4c34722016ddd10eeafc9a24e81c1cb879e88b61c8223d3f4b84fdae96
libreoffice-langpack-or-6.4.7.2-12.el8_7.x86_64.rpm
f4a92984a0239b5b27e5668681ca50a0f49e356eff6f03432c30d07d4a277e97
libreoffice-langpack-pa-6.4.7.2-12.el8_7.x86_64.rpm
a76a68ec57ad97c6ac55c66508b85034731ff9ac6e4ddd68170c74eb1996abea
libreoffice-langpack-pl-6.4.7.2-12.el8_7.x86_64.rpm
0e3273e0b23351a66d89d1b92906ef57dfdd8eba202391c7c3a84de0ca41296b
libreoffice-langpack-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm
c26e0a1df1c5978da0157481215ac413a68f0e0b434334e79d3e87f050e98c56
libreoffice-langpack-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm
76f0e47cdb1a1a74d5bebf594514dab49d7df026e3a38fce97905f0845327560
libreoffice-langpack-ro-6.4.7.2-12.el8_7.x86_64.rpm
392226e87c926f15bccdc29363d14c5eddcdb85d266dbda11f36fd5e9432d5e1
libreoffice-langpack-ru-6.4.7.2-12.el8_7.x86_64.rpm
cd343cc7d2863559f675b94dbad89757e754d5461e82120d8175ea044ecf9e37
libreoffice-langpack-si-6.4.7.2-12.el8_7.x86_64.rpm
deed82170b53eded2a2aa0c1d60837f073643ec999000c7ce0adc765b3ef6d77
libreoffice-langpack-sk-6.4.7.2-12.el8_7.x86_64.rpm
ea1f596b1a278d77e25da670aaeb8216e7cd1b6292844e56fa9ab38d34a59882
libreoffice-langpack-sl-6.4.7.2-12.el8_7.x86_64.rpm
cc206c8173612f9bb5b535c3328b54306b4833937c6fafeb21b16eded49a7bf3
libreoffice-langpack-sr-6.4.7.2-12.el8_7.x86_64.rpm
b042a537c159401f41ef2e0126653ba8d024b6576dc51ea2a5be99b552591152
libreoffice-langpack-ss-6.4.7.2-12.el8_7.x86_64.rpm
314ab9d62b5f2ef1507ec47263b0814cea690d1d667e7a9fd475e651c2d469e3
libreoffice-langpack-st-6.4.7.2-12.el8_7.x86_64.rpm
19da6a8cae53dddf989aa0c8e80a6dc0cb984705171c1d3620fc7d1679f0ee4f
libreoffice-langpack-sv-6.4.7.2-12.el8_7.x86_64.rpm
be6a63714af0510293eb3948795f94187a9e00c3776a7c91d56ece689da948a6
libreoffice-langpack-ta-6.4.7.2-12.el8_7.x86_64.rpm
bae0263723972988cd74c2a2007794067ab952d28e0fd551388e3ba37d5ec795
libreoffice-langpack-te-6.4.7.2-12.el8_7.x86_64.rpm
0815ac0b02309c801410f56820727d1c28461270a2fd72912b3bae3012ebd403
libreoffice-langpack-th-6.4.7.2-12.el8_7.x86_64.rpm
5937680a0666d69f4da85e0191a0ea83c9d09a8ffe87eb37005bc985539326d1
libreoffice-langpack-tn-6.4.7.2-12.el8_7.x86_64.rpm
9b510f83317401bbdbc8c69e7f4da8f16ebff05609a43e39c3a6daa14d735d2b
libreoffice-langpack-tr-6.4.7.2-12.el8_7.x86_64.rpm
44df604dd9e2db643afbdd09cadb46e467e4d5590ca7093c36649c1905c61a1a
libreoffice-langpack-ts-6.4.7.2-12.el8_7.x86_64.rpm
16bf5c549b119d19cc564f05ab68486ca081f0e9aaa4532055464e65c079d30a
libreoffice-langpack-uk-6.4.7.2-12.el8_7.x86_64.rpm
c3bef6a2f758a0d5699fc0be420705186cdbdf81b168b067233ec51269083c24
libreoffice-langpack-ve-6.4.7.2-12.el8_7.x86_64.rpm
23f86455843a306a63e0a33bd3bb1507ca273020fbeecb9773f20d891a0c4576
libreoffice-langpack-xh-6.4.7.2-12.el8_7.x86_64.rpm
692659385202977ef41b5fcbac8e5a15d08f171857881e4b7e705c96a932034c
libreoffice-langpack-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm
a1ebd7b525df5d4a043a61559927f8395f2b3d0787e939a1017fa08fb851ea92
libreoffice-langpack-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm
1bae9af8241b3121500874b11585917219e7e869436d1812a188c5bc31d7177c
libreoffice-langpack-zu-6.4.7.2-12.el8_7.x86_64.rpm
ba355fe119f5c58816bcf23497b6641c519847deafc51a29cd896b5768abefd0
libreoffice-math-6.4.7.2-12.el8_7.x86_64.rpm
f37a4dbcdf9be4062d951074c8f4c7e1b225db426320fbb23b2eb79d8e09d21e
libreoffice-ogltrans-6.4.7.2-12.el8_7.x86_64.rpm
877458794cb0df1f0fb61d3ad42a0438f7598474b1203d1fd62e1ddb55983fb6
libreoffice-pdfimport-6.4.7.2-12.el8_7.x86_64.rpm
3275b3a571322c4ec901e81348a05f9a2904d493752cf9362c1c2c5bec3051db
libreoffice-pyuno-6.4.7.2-12.el8_7.x86_64.rpm
f21111acc9a9675d026cb4b0f9de7c61626e41263ae84dcacb261213fcb15e64
libreoffice-ure-6.4.7.2-12.el8_7.x86_64.rpm
5d5a232e7d047d4916fff8f25dcd7eb1e006f67ab3dce3360cb13b3bf0176884
libreoffice-wiki-publisher-6.4.7.2-12.el8_7.x86_64.rpm
9e7273ad2d9312b23c505ab5a5012b56a6dfde9950999f0c3b5ee648644072a9
libreoffice-writer-6.4.7.2-12.el8_7.x86_64.rpm
85547a305424608f8050c5276bd51f33c6e06cb67a288d36d1296d3475c2fd76
libreoffice-x11-6.4.7.2-12.el8_7.x86_64.rpm
cf0552c2b966545f00c5731c45675c250650b86e64e0ada61e86610347dabeb5
libreoffice-xsltfilter-6.4.7.2-12.el8_7.x86_64.rpm
690cb561854811ecb4df05a9e2ba6100eb826f141cd9f32b5fce436b914b1a43
RLBA-2023:0091
idm:client and idm:DL1 bug fix and enhancement update
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035)
* Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050)
* vault interoperability with older Rocky Linux systems is broken (BZ#2148255)
* rpm -v ipa-selinux produces warning (BZ#2150243)
* ipa-client-install does not maintain server affinity during installation (BZ#2150246)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035)
* Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050)
* vault interoperability with older Rocky Linux systems is broken (BZ#2148255)
* rpm -v ipa-selinux produces warning (BZ#2150243)
* ipa-client-install does not maintain server affinity during installation (BZ#2150246)
rocky-linux-8-x86-64-appstream-rpms__idm
bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm
615d759274eb3f3f8c28657012cfec65b67d8a47fbf38b897955cec7bdde1495
ipa-client-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
b08c20bbe1ddb56b9a845e76ca57d91289061d67f2956ea7ee44fa3891564691
ipa-client-epn-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
d4104096325d2375fab854ab7c562dd7613429b1c06608829bbf3322d63930c5
ipa-client-samba-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
62e6bb5cf85e591fa9fef34727767c0d6797b68424c1df291a4e318683d7486c
ipa-server-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
e4104c83e28300dd34f62a6690fa552cc6ad508ae449b8fd903612c566f1cff7
ipa-server-trust-ad-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm
f1263ee2cc3474f99aaf58d505cdb4fed7528bf191c4536c0d4f8c95b8825ab6
opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm
449d4e5e4da333bba8957071dd9bb27190cb0a0d973ec9bb6545acb9a1af86ca
slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm
b8d36c443220ba115f87e509688c414361dfde0fbe82eb6776a5b6e3963cbce9
softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
7740f70af798f2585f0625a2f89eddf094b7ea21353cc936484d1843736cecce
softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm
f4694b440cd7ceb2fa94452f6589b3f6bd4d61f8f34e4d942960c5484ff59063
RLBA-2023:0093
gnome-settings-daemon bug fix and enhancement update
The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings.
Bug Fix(es) and Enhancement(s):
* Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-settings-daemon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings.
Bug Fix(es) and Enhancement(s):
* Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962)
rocky-linux-8-x86-64-appstream-rpms
gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm
12d532418b7da766e204a26fc637341aa39bc050f3969afa65f3d4bd6ab3bc94
RLBA-2023:0092
fapolicyd bug fix and enhancement update
The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system.
Bug Fix(es) and Enhancement(s).
* statically linked app can execute untrusted app (BZ#2137251)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system.
Bug Fix(es) and Enhancement(s).
* statically linked app can execute untrusted app (BZ#2137251)
rocky-linux-8-x86-64-appstream-rpms
fapolicyd-1.1.3-8.el8_7.1.x86_64.rpm
df7e09dfb8ada037f0b86b5514bc92c5160a6005016fb8f7c293e1960f071ef1
RLSA-2023:0095
Moderate: libtiff security update
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)
* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)
* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libtiff-4.0.9-26.el8_7.x86_64.rpm
731d996009cf80a502bbdfbbe30647ef6e0bfbdd3f66554f9f48181308f6f50a
libtiff-devel-4.0.9-26.el8_7.x86_64.rpm
25376cf67f42de475ae2ef2dcd44e7f27195cd1da1bf8e87927cec11f2a04fb0
RLSA-2023:0099
Moderate: virt:rhel and virt-devel:rhel security and bug fix update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for
Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages
which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176)
* VMs hung on vnc_clipboard_send (BZ#2148504)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for
Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages
which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176)
* VMs hung on vnc_clipboard_send (BZ#2148504)
rocky-linux-8-x86-64-appstream-rpms__virt
hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
1cd7a2329492772f37ba40b4c3a122bbee45583ca4cee0de27e2e1dceecfa8b3
hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f7be605f5a83823fe87d21cfdf779b9861fa550eccf6e218683d1d5e8e781686
libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
28bcf6823aa0187ea1b89f2888a7e944d42674e1d43e60945434149e5a06da1f
libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ed320ca7561091a4862e66f90731518982077ef0bc7ab7a84063370c0e11bd45
libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
65d6ff1b26f650ca0cb7cd59b365f35c234875347610d8011ddd10e720b1c49f
libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
5370c98abd39858cabd340fbd84c0e24ae471616dc5d45f6b1892f853c4368dd
libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4326c48321989b6afcdeabd5bdbb9a9fd011deb340a64bf117ef59cf51a1fc3f
libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
88836de185b9a3a05fb23a38d22905b834929f9b3452816db6b5316e3b298645
libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
7227b9ed833725a4ef3b359a41e516acf9da0552dd98196fa3e75c0f516476a0
libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fcb7e8f766fae90e6f82e47d1856db36d86aa17f0abbf3c30350685f8377161b
libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
159f8feaa1d92d7c587a2a8de47a75d23583a97c338e4657fe497b7a01b302ea
libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
191880b8475cb8c064ff20fea7182f28c2c0626f5265a9f78158cdd97ff2b100
libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
fbb8a8027f46b81439bb0a5342d6d806c9de5b87efe857eaee5954cd16b057b5
libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
35247cd03a6425ea947919494a3eccf565900dc540141480aa4548907c9102d9
libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
ebbc17d7275f1a71550d52e043b878ae57e5321d8286b7745621a2b62ebf58f4
libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
4f70b5aae16dd56726c3d442ef366958471ec707aeab1f5b0ee921261400b495
libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
97075ab8cb82c787f9d356ef5f2265d3a5c7f8f5de88d32fb7d8f4e8fa93dbe4
libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
8ae1c7bf8c139f91ca6034a109a7afb434b978b403232df0292585d1db69063a
libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
fbd44270d95681c4a0210f9a8fd5039b03aff6e4a5e36d620bb8dce84413525c
libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
3a01cfa80f118bf38c3c411ac498ac95fa22bf5055a124b40aa8111bbb67c8db
libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
ad385e684a9c32cdb0838de973c5f599e0d61e0ae0e78c197d67fc8f6b7a3a52
libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpm
8aed7622be115f15c719c0a4effac065584c1617b4d2a916fb3bd8c99a6d22a0
libvirt-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
b9ef5d92b48763563bed303770260432928ebcf2644488ae404bb74cc990a15d
libvirt-client-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
ce89204be0bd94f46016523a96a5b389b42edfb1f04ef2ba1689bb05a5f911a6
libvirt-daemon-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3c2ee70a5dfdfafc14132ab8c1da3137cd2c36a4b283e33cfcba41a4c8a924dd
libvirt-daemon-config-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3bbec6e9b75d574eddd90a32fe68cf134e78eac5bf68d3bba1d7403da60fc624
libvirt-daemon-config-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
7467b42dd7c33d8cdeeb8a170c514ac0fdf35eebd3ab435926003cdcdbf60df8
libvirt-daemon-driver-interface-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
25787b85f42279a7a61c2267e81f2232668dbdecf49cbb5c4d70b8a96bf39d54
libvirt-daemon-driver-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3b6628a226e05e3c523bc8339df005e46743aa3c6763f8155b6160f5e91aa166
libvirt-daemon-driver-nodedev-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
ec35ee6d270ef5590cbc5be2742753e2e6ed38a55d2b41a1abb8473d8ae89682
libvirt-daemon-driver-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3c311b6cbc8d7d7b0be31e792b5c7bb93abd77cd7b997004d28b7d96b73680ac
libvirt-daemon-driver-qemu-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
5b20d7d9542e3cd825eb9fdceae64234fdbfe6f62a2b53876f10a7e5ccbdd361
libvirt-daemon-driver-secret-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
623bd9705a5d7e75633710957002c53e941cc33728959c4d4a8f948173e8108f
libvirt-daemon-driver-storage-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
b8a434b2b8ff4852d9cdde198f94ec1543a2c667dbd6ad597982940f20855f0b
libvirt-daemon-driver-storage-core-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
68f20d69d3aff90fcdd916be2fcd9610030bd42c906f481df249e3e6a42fe8a6
libvirt-daemon-driver-storage-disk-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
fe835c82f15c31348503730b4b4e57b85829152e9c0d8b58dc2a48231b4c942f
libvirt-daemon-driver-storage-gluster-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
add36e2a88b056a3fe1ca77c9da9f8029962bd7179cb5e138c02e097697d9c89
libvirt-daemon-driver-storage-iscsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
9186d8c082047bbfa659071f508a90374ca06563ff98973a89659630d4c44d2e
libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
fee3b3f22d8c449e4e8e4f319a8f167af737d249942f18b380838caec7e14351
libvirt-daemon-driver-storage-logical-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
e36dcf2ac32139fe7c3ac8b3fb23d3bfa0cecddf1c6be2bf5b35675964d1038f
libvirt-daemon-driver-storage-mpath-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
b4894c09aa627a04ace291333e127be2c75f3b31973dfd587cb3782543176b9f
libvirt-daemon-driver-storage-rbd-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
a7c64cd57ef47df61152c1c9993f16452b532e64f81ca56d95b872546cac88a4
libvirt-daemon-driver-storage-scsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
d8875d26478fbcea076efa4e89d4f75af2d3f086608613e9f13984c3fd3b6beb
libvirt-daemon-kvm-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
3c1c5073aae25e492ab9f6421542564e1dc6b52bb005d39a865e39695355476b
libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
beba9fd4473b08d6815f57602055ac2194ec229614850f57affe6ca5234232fb
libvirt-devel-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
69d009e43bf2e2c7c755d75a87e473493860fac49398b681c245fe4f9681cd9b
libvirt-docs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
663c0e30efd09e486901471d7d97cd20e7bc3e247e31a12b50628c52ed3719da
libvirt-libs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
718445c64a09e6ac9c9212279808804c8a25a2b826f130e9baf9c4c8a40f6928
libvirt-lock-sanlock-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
136bb6f44e439667a04e2ab2748e53990861904b2c7ad6dc2d0686a24af9bb63
libvirt-nss-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
88f45182a3be869343f5dbe202488c5b25250b5f9ff44755a152877868175cd2
libvirt-wireshark-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm
1a86899f54ca4946dc2aeca213014b6bfb7549e1fbda3bf63aaacce2c38da254
lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
4ec85903192f6e3319884fc5ec33beb029c3df23d6daf9859960b3cf7cb976fe
nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a7bb4fbbc8683c8aba251d33eb2b8dd22545790881ef007d4910fec335e374b5
nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
8d52cf3e6eabc934b0c0684e501c818bbac600fe982d4e0ff58f66b7da1be4d6
nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
26fe7a636f996ff65e3e4898d622294b1889e80ae6f2ca42c0bb6e3b2e617480
nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f4024cc99881d68b5ab77db747c44ed4c9d3a8c4a19f734753c35669e8da5445
nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
6dd770eedd24f0ae29ea2069f42214a3b41ba9f0234b3082e5d84b87356d421d
nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
c65e68e34d3cfa98505b4a7b621dc8dc4c291f4fee5f175fa589d5b5cfcb546f
nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fb2c104fef6d8330c7e75f8e851f76947f51396075c15fbc67373cfa6088a35e
nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
5884ffba48615ce38009f844e0e4659d4f264b1a0d36cf391a400d1e05ca52f0
nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
b81a9fd5f4258e64d6c084f1451470dec7ec2a81edbda58a3951e1cb704e948e
nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f0db8233413ff49e2d6a658f7072361d17fb05332990cdd4bdd0131dbf8ea0be
nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
1570b8d3c5e1e7ff70e71b68c02240956ebe6fb62534a17e5e577c799aae3a46
nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
eb694c98aa23ebb129e9a9d0f60b7b2add4ba57fd9849f5c3f202a15db59d3da
nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f1a4a900b1ebd64820985f5b247a721c9cf4026005077ef5e3079d7eaf669e20
nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
f9b0100c385bdd3e7aef2e2a3065c5872b793918f9e4d49f060d235b4c2b5d74
nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
ee54fa0f78646e5ee441e7367e3c365cac3bc216924611ffb161698c95ff23a9
nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
fab3d3f1d6aef61862cc60086fe797092ac2174d5d62d410f5fb3eba38ec10e6
nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
0c533df23debcbbea9cc4285ec422cd23347f81540bc942feaea8157ba51a255
nbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
3d3d7ade067cbaec7244c87504c444976eae668f6583d072b1c8d82a1d4fcff7
nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm
21fdc4cfe8f855c97a4a1fd22febdb886e94719d13e096b705b2423bc3b67c98
netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
a9d3d0b3cd478c9de3a238d1630c12bbc262bb82948f4f762eaa665acf15a558
netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
8e910b81e24f16127eb3a7adc3c8ef3174e0d53eace7a2147136f2a31d7de319
netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
95a3598390dceecf4cb9d96cee9c951dcd9a18ab4bb4608fb2b6e15ec1958eb6
perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
7e62e618f75f631b982543cade10012d6f91968fa4aaee10d0e3ba09c5d6e2a2
perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
a537452a42505e73d4f5d1357b10bb3fe05b8d274c84e54d40456b0ffc44cc6a
perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpm
a1991ca34c3e1c04db6475eca09408ca98a54ccacee49db6a6ae5417d140a83d
python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
f95140dd5f3cb152b624c33bdd82220f1816533f3dbf188162b27ac431a388aa
python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
9f377ddb0026ba94fa35b7e44e6dcb4262ea8d7e50c3bb9f42ff2e04dde27c89
python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm
a603928c95b02faa3191ab754166ab6b6fd91a2dbeba2742d3c3b4e037c0140c
python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
d9941f0cd36a3b72b465d3f57a6c6bfa58da88538eee812ea4a8b1bc896f7776
qemu-guest-agent-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
3e138b0caef20c972d92060520af3b08a1518c82f5ca8b17b3f5b7b471570d43
qemu-img-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
651d72ca540d04b24dc11018280dd00e4c031b45375b309bd428f0232f29332b
qemu-kvm-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
17c16353ba08ac5c95435a0a2ab3f9b810f1527f9cfed3b4a2a6eeb3fae7d723
qemu-kvm-block-curl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
98c6b056792d932a19c11652131dafe24b0d08c2d97554b884bab625769dc9f1
qemu-kvm-block-gluster-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
f7042d9588143e625436adc1f3816824ac1789a702f9cc616b22eba51a56b6ea
qemu-kvm-block-iscsi-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
a722b24823c0f1b17b36541665e27dc84baad2c510014626ff634e47bea3b649
qemu-kvm-block-rbd-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
e9c4de50d97764c921d79310ff6424d158c9c36434e7c49c374b1792a7327198
qemu-kvm-block-ssh-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
82cfea9ba87ec3e13349e52154a44f554f40091a06d56dd80dfe70f41a9aef51
qemu-kvm-common-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
b326ed3e1cfdb993752f5e44abc7d0a49d45cc4184ae6a8a78a513195457a3b4
qemu-kvm-core-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
fd293f5bac296f23c3f05498709c2b157829277249d99d12bc2dbd981da1b9bb
qemu-kvm-docs-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
bab4c84407fd9367dfe99eb8c738315d880e57cdea467a03bd6c8774cb5f190e
qemu-kvm-hw-usbredir-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
893ce35525c4fb2096c4e55ac749b5e5d90a608c8399b126b0b123dbfd3fbe83
qemu-kvm-ui-opengl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
ba95df516f1a674f91291cd9bacea148e341b71ad4d3edec266f8dbbd17b3b9d
qemu-kvm-ui-spice-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm
06cdca54b6dc044056cb4b127704eeffefdf5264eedd57e6c89812f339756088
ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm
5e67f8942402aacf85dd0265627494e135c4db4394ffd89134e6981f86dda39d
ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
286310b078259e3040f4009ac228c80a3a8e4bbc3e8f44f43962732fc245dada
supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
f0f871487bddf759a61240aa0d690fe5942f5911867ab95deee36652c9acde70
supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
9361df77d187d9bd0ae1453c2f3b3f9d2f33b40413128870af4d03f5e637442b
swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
e57592bf71ab32749738901069d25af8f9df7d6f9a42452e429d1aecda6d4838
swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
9b1349b9110905f51aae33209ddd5d3b39a7d332ea2619cb403458fd704139bf
swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
4e0e4fe42b6a98435ad15889afc6db805de437a8c13340d03626de3938367ffe
swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
b5f91f5b5e82ab79bbed86d501c43794c6ee31f20256dc448f2d3f471e6ccce9
swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpm
105cf02ad3dfc1b834f871c47c54e404f41921d1aacaec2f054f2760bffbd45c
virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm
63cbfafdcf792234b158623af9ff493eea6c215caabd276efcd4332937c831d4
RLBA-2023:0102
nmstate bug fix and enhancement update
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* nmstate verificationError on OpenshiftSDN (BZ#2128555)
* kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698)
* Addresses configured at different order than specified at state (BZ#2149048)
* fail to create many veth interfaces (BZ#2150705)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nmstate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* nmstate verificationError on OpenshiftSDN (BZ#2128555)
* kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698)
* Addresses configured at different order than specified at state (BZ#2149048)
* fail to create many veth interfaces (BZ#2150705)
rocky-linux-8-x86-64-appstream-rpms
nmstate-1.3.3-4.el8_7.x86_64.rpm
9963e8fdf78582885c9e319141a036c2be07928e6fa6fb28aa3fafe17ea0fda6
nmstate-libs-1.3.3-4.el8_7.x86_64.rpm
b5fff4e8d7d1b685e45fc80c8ca93c92e1a1a469c94f58e707044b71ad0f8fab
RLSA-2023:0113
Moderate: postgresql:10 security update
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for postgresql.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms__postgresql
postgresql-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
b5778e3c960ecbf1c282ae148a86bfeb5a8f7703cbb13259a35734462e5154f0
postgresql-contrib-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
312cce0ec240fd7f0cf098d08c895c5d07e85d3d503acce17782878be5f0b533
postgresql-docs-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
9573d11bb8b959f146b64a9e99357def762484c8db8863e2c5db2cdcd2b59ab6
postgresql-plperl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
8824a8921b5af548c5bba5be9934a9bdda71a115ef6f2e29b40db5dfb9733cf7
postgresql-plpython3-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
2d7b8151757f6b5457e7abed902a33208f721b8e109592daabeab886094c796b
postgresql-pltcl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
a169e67733e21d3c80e7fca6a54ac834ec2b89cd37a4c4681f92c9e67660d860
postgresql-server-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
67d43533117445da9b60e89fb6e107491d9d3948bb6280032cea8a8097bd7e46
postgresql-server-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
bb1d784e73d49c3aa92583d77247412b2002d6bea658258db9fc8471cbd2542d
postgresql-static-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
360192b1246b3462f2c05b04991a80ca8b16e1a736b3e672e5ecae64f7e44168
postgresql-test-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
37fff25b576ac9319660475eb135c592f227c4fbe1ea142cf59f497d46d03efd
postgresql-test-rpm-macros-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
736329addee977b43c340be5e022888d76f657f36187ee6671446e8ea27f32f0
postgresql-upgrade-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
37cdc4fb9262b144f50b09476d2650147bbcdca92b540b55359e5b00ead4f660
postgresql-upgrade-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm
577e4c656a2c95372939bfe9b2e0902a17a5ec2e8e1a12d40ddd84947e680398
RLBA-2023:0115
container-tools:rhel8 bug fix and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es) and Enhancement(s):
* [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294)
* The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171)
* FailingStreak is not reset to 0 when the container starts again. (BZ#2149775)
* SIGSEGV: segmentation violation on s390x (BZ#2150416)
* SIGSEGV: segmentation violation on s390x (BZ#2150428)
* buildah: ubi8 sticky bit removed from /tmp (BZ#2152017)
* podman: ubi8 sticky bit removed from /tmp (BZ#2152027)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041)
* podman gating test issues in Rocky Linux8.7 (BZ#2154403)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es) and Enhancement(s):
* [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294)
* The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171)
* FailingStreak is not reset to 0 when the container starts again. (BZ#2149775)
* SIGSEGV: segmentation violation on s390x (BZ#2150416)
* SIGSEGV: segmentation violation on s390x (BZ#2150428)
* buildah: ubi8 sticky bit removed from /tmp (BZ#2152017)
* podman: ubi8 sticky bit removed from /tmp (BZ#2152027)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041)
* podman gating test issues in Rocky Linux8.7 (BZ#2154403)
rocky-linux-8-x86-64-appstream-rpms__container-tools
aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d33e11f32b7ca8bb1ab9de7144786d8b949b688760adc1785e2fe70d5f39168a
buildah-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpm
9f0c8864b500eadd5916215775f4378bbad990f39cda2b4247d11721b0db555d
buildah-tests-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpm
457b0e8e2753f67ab411239d353bfb70f9cbe5ff92064182824159d43231bebd
conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
7566506968909bc562f0514b2c7225f1fcc333185a41a25a32232630fd7d236a
containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
63d8e875be930467888b8ebd275d8551ed8c506e3a2b9cc2bbbabe94356d3036
containers-common-1-44.module+el8.7.0+1122+04a7498b.x86_64.rpm
6354760e20840a090eec3a3222a796c67849c5fe6910c3fda36aafedb764f763
crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
536e6b13c94f27e4a846ebb1c128eeadbf410d0196413abeec848a3bcc69a270
criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
0098eebded844528a43c278fbc1e4faab35f1cf6c41dbe30420b94d8023eca0b
criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
84d153cb4b4bcb1debd3ddb2bdedfcacdc52fff702b3a90a5ce7e2767740b632
criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
4f2ae06cd6ca95e43be1a17c74da9b7eba0e9d102fb153119e355904d6c35aab
crun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
9918736d2f65654653cbca99112a83aa5a31c124b1e54978d51eabae59f9f310
fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
c2fb3049945cb1d853aa31e0777cb7ad148f78c76135512c658bc4a429834a46
libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
d7becedcde7fc19f0c2c064798b0e87124f19bc8174973dc9cfe74d2543b9570
libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
2cc6f06fbf09e36763d162cff2c098075e0c27cde5b581e6f210497ccb8ab6b8
netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
119f90778569a22466b4a90fa278b1af63d137005aaf3aa5945f28a5514bec92
oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
bf288b4250e5582309f69075e6a3bc6839e26778e74d7716fb4f6bb774c35a6c
podman-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
74f931fd657a10723ac15ef27d2397fd89faca721ad7fe60c194623d8a199c84
podman-catatonit-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
9e61420bc7d316ea9a7177590cb1c40f1cefeef5a32867bf5f3efc68f5b78bc9
podman-gvproxy-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
83da4ead1d4252fa4e7a371dcfe027d2c9238e66df135ba4e4085660f990a9c0
podman-plugins-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
b960dcc969cd8fbdc34056dab7aaaa0c952f6e1276b4320a5fac779f7f76bb9d
podman-remote-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
17133a616cd92572e037cffb207203389c6dae38052742912719b1c678834dbf
podman-tests-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm
71ec468e01f86958f0ea70ce32eb9b514c56b445b8a0ef370fc4817aa1c66fa1
python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
b5d3ef222d58b459748adfdc2722118c8581fe7350bb40bdbf9e970d3956537d
runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm
264f415944d487fe966f81046648a1aa1f3931d884ca9e1ea47b5f1224456856
skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
b2dbacf676bb36b7d618c125bba63b03b16206500f903f8ce4b76e368f16dd26
skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
8d4dda0fee2dc95c05a961422237e3ab97a7f32f0371cd7dc91c447a09ce5b0e
slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
1380a153fa064d6b928a4ecaa1cbb0a8bf3c06f8b5f0ad5a95dfa1e64866efb2
toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
d6fcf89eae8429196d80f56d8fc5021a55730361d3d163b31629b96b832367dd
toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm
e80c1c58afd3b802dcab107714d1c788289984d26dd8c0a14ee2d36c13035a04
RLBA-2023:0118
gcc-toolset-12-gcc bug fix update
GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix:
* __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131)
For more information about usage, see Using GCC Toolset linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-12-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix:
* __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131)
For more information about usage, see Using GCC Toolset linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
gcc-toolset-12-gcc-gfortran-12.1.1-3.4.el8_7.x86_64.rpm
03e13ea95319e3d645ea2f2775cc0ccea2621e466ff5c74dc010e167a98048ff
gcc-toolset-12-libquadmath-devel-12.1.1-3.4.el8_7.x86_64.rpm
338c60ca232485761495e5da958d652b5330b1ccd65d3e261b5cdc9f5762fce1
gcc-toolset-12-libstdc++-devel-12.1.1-3.4.el8_7.x86_64.rpm
ee54399f0565380b7b194f11584e5d6ebdd7101e200810af5c47bade1dc57be3
gcc-toolset-12-gcc-12.1.1-3.4.el8_7.x86_64.rpm
9b5f7a5010bc4cb9dabfa48d27f209c3f6e963269738c66b6f08326099b0b2b2
gcc-toolset-12-gcc-c++-12.1.1-3.4.el8_7.x86_64.rpm
781f245ccae0add23839d4278b321cf5b9d0ae2e5b331bb91855c52aa1947ca9
gcc-toolset-12-gcc-plugin-devel-12.1.1-3.4.el8_7.x86_64.rpm
2baf7899cb43579f8e5cb74f042fae21115f7efc0b92d5299d67139aa34d7f85
gcc-toolset-12-libasan-devel-12.1.1-3.4.el8_7.x86_64.rpm
a586e52094f104dc0a73fecf7e362f0ac2ac152cf6ebddffc4fda259e67caee4
gcc-toolset-12-libatomic-devel-12.1.1-3.4.el8_7.x86_64.rpm
66c0661ce6dba20c42cb9fa1cf04c1822b105a5b7d6ff0f6df06d2c4b617c397
gcc-toolset-12-libgccjit-12.1.1-3.4.el8_7.x86_64.rpm
9d16c50238884ed4b02b99e704d75852304956efd5727bb61c37336de641c021
gcc-toolset-12-libgccjit-devel-12.1.1-3.4.el8_7.x86_64.rpm
41b25f295df072de2e028e63b8f80b0988197a44b02f7c977384f8f1ac902c74
gcc-toolset-12-libgccjit-docs-12.1.1-3.4.el8_7.x86_64.rpm
76c1ec66d911cfa17ec5fa210e59646b66681be32b85f704b1a1bd36d341aa3d
gcc-toolset-12-libitm-devel-12.1.1-3.4.el8_7.x86_64.rpm
9801969984b980d98355a12aa4f3ac935473f916ebaaba28e876b9d499a10aa9
gcc-toolset-12-liblsan-devel-12.1.1-3.4.el8_7.x86_64.rpm
d09572b0ab246d1b0e908639d8499c93b9e5c75f4c6918829cdc4c927fdb074b
gcc-toolset-12-libstdc++-docs-12.1.1-3.4.el8_7.x86_64.rpm
4042323654ab887b49ad764815f849518606ab569f15867dd48761efeae307c7
gcc-toolset-12-libtsan-devel-12.1.1-3.4.el8_7.x86_64.rpm
6a1892832e34258a7f2d07f12f091240d29e0ed1eee3a433d738f8a4ca43e005
gcc-toolset-12-libubsan-devel-12.1.1-3.4.el8_7.x86_64.rpm
ef5b84a88e6a7c18168f2e18e87c4d42a142826522d4e84f422fa7f8528e887e
gcc-toolset-12-offload-nvptx-12.1.1-3.4.el8_7.x86_64.rpm
f66d3ad97d0c2fd035b402ab9e21022acf0564d0f18dfb5591ad39d6ca369bb4
libasan8-12.1.1-3.4.el8_7.x86_64.rpm
307361224e4fb47633ef6951e403bd7c322357d3065bfada304232c528b02c74
libtsan2-12.1.1-3.4.el8_7.x86_64.rpm
a8195ff5331c531630c0fb049bdd7f2a741caefa72995441f20c09490e3eea79
RLBA-2023:0119
tigervnc bug fix and enhancement update
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Bug Fix(es) and Enhancement(s):
* x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tigervnc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Bug Fix(es) and Enhancement(s):
* x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915)
rocky-linux-8-x86-64-appstream-rpms
tigervnc-server-1.12.0-8.el8_7.x86_64.rpm
cf3ab5e942cc1a5e393cd9e5acc1d0e8ed1397ff53ef65b75081e509de13b400
tigervnc-1.12.0-8.el8_7.x86_64.rpm
ff93f0dcd4015fd3f3006b4acb04bd9a67b5a63a1131811eb98155fe8010cc68
tigervnc-server-minimal-1.12.0-8.el8_7.x86_64.rpm
a28d235028fbb8d31fc91e6e498973f686176edfabd61b2f47094464c7e042a7
tigervnc-server-module-1.12.0-8.el8_7.x86_64.rpm
27655616e55c29e91a07a8bc0fa7fd8d77df71f03c1232ca7dc95cf1ebd0c267
RLBA-2023:0122
ansible-core bug fix and enhancement update
Use python re to parse service output instead of grep
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ansible-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Use python re to parse service output instead of grep
rocky-linux-8-x86-64-appstream-rpms
ansible-core-2.13.3-2.el8_7.x86_64.rpm
acab7391f2aa87d836824ce414bb373fb1bcfe619db49a8976f24c74e4a988b6
ansible-test-2.13.3-2.el8_7.x86_64.rpm
bea3cd7956329c0cf0e6cb9a4a588d1a50d1d838a73e86bae4b2ba1281ded275
RLBA-2023:0125
sysstat bug fix and enhancement update
The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity.
Bug Fix(es) and Enhancement(s):
* There is no option `sadc -f` in sysstat. (BZ#2153422)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sysstat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity.
Bug Fix(es) and Enhancement(s):
* There is no option `sadc -f` in sysstat. (BZ#2153422)
rocky-linux-8-x86-64-appstream-rpms
sysstat-11.7.3-7.el8_7.1.x86_64.rpm
d210af3b0b24e1bf4fc87bb15608fe57d20a25ab637e8d0864e4754ec7e9bc54
RLBA-2023:0126
hyperv-daemons bug fix update
The hyperv-daemons packages provide a suite of daemons that are needed when a
Rocky Linux guest is running on Microsoft Hyper-V.
Bug fix:
* Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hyperv-daemons.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The hyperv-daemons packages provide a suite of daemons that are needed when a
Rocky Linux guest is running on Microsoft Hyper-V.
Bug fix:
* Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255)
rocky-linux-8-x86-64-appstream-rpms
hyperv-daemons-0-0.34.20180415git.el8_7.x86_64.rpm
b91f33dc859fed5149f7b43190a8faa33098b35a50f6c5b132f836f261dceea0
hypervfcopyd-0-0.34.20180415git.el8_7.x86_64.rpm
ca77af9b558f062a22f512e0ed57c043f3f00e20980dcfd13165d6ee8f23458d
hypervkvpd-0-0.34.20180415git.el8_7.x86_64.rpm
61994e50a0a399493965113fcfa8751c50af20eb85daa469a447ac7de4a598f4
hypervvssd-0-0.34.20180415git.el8_7.x86_64.rpm
2224846553a41b8b982cec8989b766d76875fc6cc4b0c6186becd0f71b406bdc
RLSA-2023:0171
Important: dpdk security update
The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.
Security Fix(es):
* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dpdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.
Security Fix(es):
* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
dpdk-21.11-2.el8_7.x86_64.rpm
22ca5300970c260c52b0ac7bbb1867cbba7b37cfacc18d0345188740cf1486a9
dpdk-devel-21.11-2.el8_7.x86_64.rpm
669089120d28a19848e177ff43b5195e44a34fcb44ff8fd94a61c121366f2278
dpdk-tools-21.11-2.el8_7.x86_64.rpm
d7744abc8e0a9411d5f0356a5d727b4d04e7644d7e37e524e03c92d676eabf7e
RLSA-2023:0192
Moderate: java-17-openjdk security and bug fix update
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010)
rocky-linux-8-x86-64-appstream-rpms
java-17-openjdk-17.0.6.0.10-3.el8_7.x86_64.rpm
e9e7771e03089060558746cbba588207ae8eb9cc34e47e325025055dc20fc931
java-17-openjdk-demo-17.0.6.0.10-3.el8_7.x86_64.rpm
56ecebee6f99d42d0e8387ea87d0d09981712b6709aed998190cc8bc3b9d3c86
java-17-openjdk-devel-17.0.6.0.10-3.el8_7.x86_64.rpm
04cf59b2a2441495ca5d0f4076bb9cc7b5891649361009470aa723efcd58174d
java-17-openjdk-headless-17.0.6.0.10-3.el8_7.x86_64.rpm
74bb8ea1814f2a4229c0720451f2f21cf0c82e14ad5edae44b223dc42ee63b0b
java-17-openjdk-javadoc-17.0.6.0.10-3.el8_7.x86_64.rpm
6c6b0e7c4e618fb98c586eee72ef86342a6570e01776db4fcea08267afad09a2
java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el8_7.x86_64.rpm
1d269804aa7f62145a3591d94dfc51416a3776e123868e1e0cf26671965f99af
java-17-openjdk-jmods-17.0.6.0.10-3.el8_7.x86_64.rpm
116c46fa6b3ab8119f821a2051d1d261baec9e2f69fc04d5b6706f8ad5a6ee2b
java-17-openjdk-src-17.0.6.0.10-3.el8_7.x86_64.rpm
66123b657e97f8e17488451422f7665b99684c4c7fac04d453b90f99d36e485a
java-17-openjdk-static-libs-17.0.6.0.10-3.el8_7.x86_64.rpm
a50a6f999802c4e741f2b8a2e0387de74a5dc76f1fcfe70abced24fe988b7cee
RLSA-2023:0200
Moderate: java-11-openjdk security and bug fix update
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797)
rocky-linux-8-x86-64-appstream-rpms
java-11-openjdk-11.0.18.0.10-2.el8_7.x86_64.rpm
18caaa5e464fc13acdb83da92d7c3b53e8db27105452dd287ca7e09e19fe73ac
java-11-openjdk-demo-11.0.18.0.10-2.el8_7.x86_64.rpm
707064838c229e1146437aa01c8c3ccfed3f8d69b0d25a27f268cab3c08e4c3e
java-11-openjdk-devel-11.0.18.0.10-2.el8_7.x86_64.rpm
fda01db703e1d2bd2ed4aea3246fffde8fe63cda80f7721463e2f408cebd765c
java-11-openjdk-headless-11.0.18.0.10-2.el8_7.x86_64.rpm
54403a144e1cab8e5928f3737dcf8a0a4bd030b13e533c6e40c1a34cb355b1fe
java-11-openjdk-javadoc-11.0.18.0.10-2.el8_7.x86_64.rpm
0e874d5fb7bd8dab939a6d1aaecb4fd1b19be7bd04db32a0dbdef2f891f3ffb5
java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el8_7.x86_64.rpm
73c7ec6923bedeb6894a69ed0d6c0b2aeab5491140cee92596c1101f1a88e661
java-11-openjdk-jmods-11.0.18.0.10-2.el8_7.x86_64.rpm
be5f0e58cf493c61ce58e2bb1bfa51e602d9eb28dd93a40bc1e8e448a5ce9dc1
java-11-openjdk-src-11.0.18.0.10-2.el8_7.x86_64.rpm
7ba5c173af6b4e35d477dc83f7807c4edd9bf0e7955ba4c08add6361c69ebd36
java-11-openjdk-static-libs-11.0.18.0.10-2.el8_7.x86_64.rpm
a649cac5b71ff161fc487f3d548fa87d8b4d4fdc52f6408f04c222b9214dde86
RLSA-2023:0288
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.7.0 ESR.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.7.0 ESR.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.7.0-1.el8_7.x86_64.rpm
12dca0ca292da0d77916e0a6f49faa74bf5100d6cbc63ea1d71d0a6c8d00e4d0
RLSA-2023:0379
Important: libXpm security update
X.Org X11 libXpm runtime library.
Security Fix(es):
* libXpm: compression commands depend on $PATH (CVE-2022-4883)
* libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)
* libXpm: Infinite loop on unclosed comments (CVE-2022-46285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libXpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org X11 libXpm runtime library.
Security Fix(es):
* libXpm: compression commands depend on $PATH (CVE-2022-4883)
* libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)
* libXpm: Infinite loop on unclosed comments (CVE-2022-46285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
libXpm-3.5.12-9.el8_7.x86_64.rpm
ab919e52846cb18cae305efedecf9d19fc6b679f6ccf024467ca77f763bd289c
libXpm-devel-3.5.12-9.el8_7.x86_64.rpm
f8bb3f4c75ef5a7e0d73e6d9774990eef9da575028c0e36cdcad25389c127c96
RLSA-2023:0446
Moderate: go-toolset:rhel8 security and bug fix update
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Internal linking fails on ppc64le (BZ#2144545)
* crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for delve, golang, go-toolset.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Internal linking fails on ppc64le (BZ#2144545)
* crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313)
rocky-linux-8-x86-64-appstream-rpms__go-toolset
delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
be45db0ede57b9a9918c621811a3aaffb944f36ae3770ac645652983d9c3e4a7
golang-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
8603fffe30255d5b874e1ace361b73ff274824c1be47c5464935479de82601eb
golang-bin-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
cfb35da59fa55edb3068ce3421338462b997fb411f465feeb7911c2bab26eb24
golang-race-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
2368396421ed2c5be2dd5c94f8ab071b2422e9602e160ed5c0982611f5938b05
go-toolset-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
6e6d2cb6025b922df55b69d54f8b40a5881b26e5c467f75f896e3bf93165e6d7
RLSA-2023:0463
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.7.1-1.el8_7.x86_64.rpm
fe994e04fe4e95089fae7ddca1706ebccc59912375901c75c119d626178200ca
RLBA-2020:4718
aide bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for aide.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
aide-0.16-14.el8_5.1.x86_64.rpm
cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa
RLBA-2021:1808
clevis bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for clevis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
clevis-15-11.el8.x86_64.rpm
7b1661586fc311cdbc1e9f476968c2dde04253a852c5f527d9d2435114d1eb11
clevis-dracut-15-11.el8.x86_64.rpm
0fb789c732ce81f56014c82ff1a145d917fdff04ff72eedb6cf78d365318a96a
clevis-luks-15-11.el8.x86_64.rpm
afda820f581b0fdfffd83e4c84c834ec3413291db1061d07b3d0f197bea52eda
clevis-systemd-15-11.el8.x86_64.rpm
ac473976855ebcdb18d17dd0fd52173ba7991cba4e2dcf2878ff04deed4c6a76
clevis-udisks2-15-11.el8.x86_64.rpm
85e206ef9a26491b946ac8aac5497e1c37f2e370ce1311ea4b609f1219a4c519
RLBA-2021:1934
mod_auth_mellon bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mod_auth_mellon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpm
4e2af6902d8948be02387c6a9ce5db3423f38ce4f60913a06e463b6ce72e7b87
mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpm
7b1ffed1c79ced0755d2f174d7e67f5d933ad0cc601c2c11f0010cadb54fdc3a
RLBA-2021:4247
abrt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
abrt-addon-ccpp-2.10.9-21.el8.rocky.0.x86_64.rpm
5ee629b2dfe6da1292ba48a1ddcadb9a5fdfb979fdd83099bc50cad4641d1cc7
abrt-2.10.9-21.el8.rocky.0.x86_64.rpm
4ca848af1c32062ac9b90bae1cd4a1c01d6a865d1dd63826b88c30a3adf6998e
abrt-addon-coredump-helper-2.10.9-21.el8.rocky.0.x86_64.rpm
112aaf826cb796f829d006f3eaefcd3233ee4ce96668fa543ba7c8b3f0dbe07a
abrt-addon-kerneloops-2.10.9-21.el8.rocky.0.x86_64.rpm
94a71406aead2da319c9552db798d8a7806fc8f5cc3164b69ca2718d894dfb6a
abrt-addon-pstoreoops-2.10.9-21.el8.rocky.0.x86_64.rpm
2f6a3f38e08fceca19cff8c252cf4b141e3be530480a2521f90ec2d2578fa2c2
abrt-addon-vmcore-2.10.9-21.el8.rocky.0.x86_64.rpm
366cb174ca0120fbd00f243b5bd83dd9052096d51db307805079e8cb3a90d110
abrt-addon-xorg-2.10.9-21.el8.rocky.0.x86_64.rpm
b3dc7d6e6e4a33c4973231ff25e888cb32371846962411641d3460b438f7ec69
abrt-cli-2.10.9-21.el8.rocky.0.x86_64.rpm
334b657d7240155d9864880cf4cef67b74efd775d4227f276e67bad5dec4fd1c
abrt-cli-ng-2.10.9-21.el8.rocky.0.x86_64.rpm
4d168d7ebe5a74cbd850cc605756c2d86e5aa82a2af8aabec1d3a2e339d78e79
abrt-console-notification-2.10.9-21.el8.rocky.0.x86_64.rpm
fcb189060ef963e226a2b8923b9fe76394e4991d0e254becefe1f389a707ba56
abrt-dbus-2.10.9-21.el8.rocky.0.x86_64.rpm
e7d2887ba2fd8cdc93e57060c72fd46a288d9716236da90ab8713d9029b71a3d
abrt-desktop-2.10.9-21.el8.rocky.0.x86_64.rpm
c78976d5bf0c77e0b77154aad0ac4090d567bc9cef6100cbadf993a36920c2b2
abrt-gui-2.10.9-21.el8.rocky.0.x86_64.rpm
2c4ae5e3e0f6adcc902dae5eb2446d2cec7acbb0fb9678f7b8e8da3cd234d586
abrt-gui-libs-2.10.9-21.el8.rocky.0.x86_64.rpm
a6d1295d2465947ced80cb78e665d6776c5c0286d03a2587267fa8e94ca986c2
abrt-libs-2.10.9-21.el8.rocky.0.x86_64.rpm
27e4e0818f02c70f3e48301bf8207987a4ed22b6677152a9a81a392adcb43668
abrt-plugin-machine-id-2.10.9-21.el8.rocky.0.x86_64.rpm
791ab7a14fa6a55bd2a4399b1825a67fdf918128e55e375c67994ed5d34e26f4
abrt-plugin-sosreport-2.10.9-21.el8.rocky.0.x86_64.rpm
7a63914d9526e7d6100c91fa14aef1064ca9ea59725be17d18d94fcbf9b1a607
abrt-tui-2.10.9-21.el8.rocky.0.x86_64.rpm
dbc9d102f654163ec08b5d34381c36b2b9b12c9edb72615d472bdef0d638865c
python3-abrt-2.10.9-21.el8.rocky.0.x86_64.rpm
f8ffcab298928db5b191a820fb31b01a3843521f4372ff711fcbbe9fe51ade67
python3-abrt-addon-2.10.9-21.el8.rocky.0.x86_64.rpm
2626a7d26f1a525796bc5a4a2a26634a579357a36c1d69f8df797153454dc8cf
python3-abrt-container-addon-2.10.9-21.el8.rocky.0.x86_64.rpm
e1d2344320275136cb943025c4df9bcbd51f5feb97bdce9015ce06fb38849021
RLSA-2022:7070
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.4.0 ESR.
Security Fix(es):
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927)
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928)
* Mozilla: Denial of Service via window.print (CVE-2022-42929)
* Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.4.0 ESR.
Security Fix(es):
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927)
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928)
* Mozilla: Denial of Service via window.print (CVE-2022-42929)
* Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.4.0-1.el8_6.0.1.x86_64.rpm
aa4a64a6c0ff90a5258aa86aeeac315fdcb81a784e8308fc90dd393415542e94
RLSA-2022:7190
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.4.0.
Security Fix(es):
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251)
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927)
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236)
* Mozilla: Denial of Service via window.print (CVE-2022-42929)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.4.0.
Security Fix(es):
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251)
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927)
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236)
* Mozilla: Denial of Service via window.print (CVE-2022-42929)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.4.0-1.el8_6.0.1.x86_64.rpm
d93cc63434e71cb0382a5d749f1d03ebb223967aac8e90377764b005d8b0b483
RLSA-2023:0208
Moderate: java-1.8.0-openjdk security and bug fix update
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910)
* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910)
* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595)
rocky-linux-8-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.362.b09-2.el8_7.x86_64.rpm
f3f3e5d43c714c292338655d64120f56e0458bd17d277521d2e63a069d2649e2
java-1.8.0-openjdk-accessibility-1.8.0.362.b09-2.el8_7.x86_64.rpm
d9963e64a08609dd914326a9f0fc3feb67b7f54635a609ba8212afac72ad52f7
java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el8_7.x86_64.rpm
3a6f8d6c9bb0e787948318bbcdac0c69249056b296abce7237c977bbf1befe2d
java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el8_7.x86_64.rpm
b2ac3e7305bc865c7225ee004394e2ddc8fdacf8b804ca0f5ff14d4b0ba074a0
java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el8_7.x86_64.rpm
4033ab8d78a462dd4edcba2a5908b47dee03b2a8b112eaa6f1f46d55c333cae5
java-1.8.0-openjdk-src-1.8.0.362.b09-2.el8_7.x86_64.rpm
58b5c066c073e979b3277b0f56a0925d40762970e99bfab0d4f51de97d4e09f5
RLBA-2019:1957
python3 bug fix update
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756)
rocky-linux-8-x86-64-appstream-rpms
platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpm
e061be87d99f859fe7cac6853a43d7957ecc17ea0ded870b5850a4f24224df14
platform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm
588192663a8a3e778eadad56f14130aef027f3871a811e207c8c7a8771ac9649
python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm
c70ef43afe7f308fb8412fe1fe36a7c555cc62e2ae5a26ff9afa96618997353d
python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpm
d5c856183b44e0e8769cc862ad7cc38d3d220ae3238d6bb3213baa7c6c0618db
RLBA-2022:0315
glusterfs bug fix update
Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
Bug fix(es):
* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593)
Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glusterfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
Bug fix(es):
* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593)
Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages.
rocky-linux-8-x86-64-appstream-rpms
glusterfs-api-6.0-61.3.el8.x86_64.rpm
4245c2155884aaea53a2fc2f47de6963d11dc63c14e860a4fedd4c8711ccfcc5
glusterfs-cli-6.0-61.3.el8.x86_64.rpm
74338514784fd16f87af53856fe909b14bf953837b22c2077051132190540f6e
RLBA-2022:7739
sssd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
sssd-idp-2.7.3-4.el8_7.1.x86_64.rpm
3c6c95405c3b4e996b6bf4f2cc6485b989ea323907be522fad24fe0c3956679c
RLSA-2022:7790
Moderate: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bind-9.11.36-5.el8_7.2.x86_64.rpm
21abee84a89028d14ce98980aa383f28918bde55413fbd9e0cac50b19fb800df
bind-chroot-9.11.36-5.el8_7.2.x86_64.rpm
c0145d2d72c77b41ddd899f6cfbe5f616b0b9dff9c142767a31144375e78e082
bind-devel-9.11.36-5.el8_7.2.x86_64.rpm
09a84b9fa5fad18116b216c46c47aed57687a4836220f1efe46ccfab229322be
bind-libs-9.11.36-5.el8_7.2.x86_64.rpm
91e2c3e97c80d3bf7889b9a54a56b5023f0f836b5ff90fa0d9d89c57daaa7dc0
bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm
1076cfd8cf8a54db16a2bd8ad4afac3af11af0c7b64efca9f099001be25abac7
bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpm
e92594606ed4e209aeee470bdbbb0f914407eaacbaaf51287dd0b87d2c11f9e2
bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpm
ff6eeac2c720aa70d0833d6f67674797320f7a604bd0e89d7e3b104dc218a09d
bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpm
ac101cab9169d403cb52c7102ccd5464f7bd937c8433402506275a1888b2f367
bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpm
f4b183526a9aa05136adbb5e85f751d999d7890304108ba2398bf1d7c6c15684
bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpm
dbe7c50b37b95e2cd134a1985e23e9c31573b20a06870e7e81280c52f78a7cf8
bind-sdb-9.11.36-5.el8_7.2.x86_64.rpm
0c54ec1aa90b2dbd9db277762b9c87e5c203662c7e9fb4e4f339fd5d0e508127
bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpm
4b1f0cbc1fb7fb538f4dfaffd41e20b56067054ab12452ead829aaeadfeba5f1
bind-utils-9.11.36-5.el8_7.2.x86_64.rpm
32150af88921ca072ecb2c37e21606693effcba9264fbe9b9acf52fe11a5df5c
RLBA-2022:7832
python3 bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages.
Bug Fix(es) and Enhancement(s):
* python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages.
Bug Fix(es) and Enhancement(s):
* python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436)
rocky-linux-8-x86-64-appstream-rpms
platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpm
e061be87d99f859fe7cac6853a43d7957ecc17ea0ded870b5850a4f24224df14
platform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm
588192663a8a3e778eadad56f14130aef027f3871a811e207c8c7a8771ac9649
python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm
c70ef43afe7f308fb8412fe1fe36a7c555cc62e2ae5a26ff9afa96618997353d
python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpm
d5c856183b44e0e8769cc862ad7cc38d3d220ae3238d6bb3213baa7c6c0618db
RLBA-2019:3504
bacula bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bacula.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
bacula-client-9.0.6-6.el8.1.x86_64.rpm
c346095d229f1528a36c8a82ceb7da20dba9df90e898cfeed6675b8f84030554
bacula-common-9.0.6-6.el8.1.x86_64.rpm
d74736d715f0460f6e99bbb53a8b294d73322d79b44f72aff61cf67b6fd9368f
bacula-console-9.0.6-6.el8.1.x86_64.rpm
328188f833994e665854f6e9dac0318f0d5b3b173cf61e99c9e90db263d83f1f
bacula-director-9.0.6-6.el8.1.x86_64.rpm
223f0598bccfe7f7f701accdfb7ab1319b8dd5e2cb0fba0f3af8c019116e29d5
bacula-libs-9.0.6-6.el8.1.x86_64.rpm
c807cfdfb40d327febd118a75b5b28cbecbca8a646b5a374043b48c0f29d51d4
bacula-libs-sql-9.0.6-6.el8.1.x86_64.rpm
c72d1f9187711a8d0a2db2d266bfcb3becd60a04f626f95604e68ed4bd9fef60
bacula-storage-9.0.6-6.el8.1.x86_64.rpm
086250c48ad4da8f952c482078834afc9e206ed6a51d07011e34cca7c7994f72
RLBA-2020:1362
.NET Core 2.1 and 3.0 bugfix update
This is a bugfix that fixes some issues in .NET Core 2.1 and .NET Core 3.0.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet3.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This is a bugfix that fixes some issues in .NET Core 2.1 and .NET Core 3.0.
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
03b09603d78a15dc7eba4508d4f9834f441d2a3b832b9f005870a5142c1da8dc
aspnetcore-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
80d6ad709313d91d603c9381cf205260c7bcd17bf47ee5bde3dc1576e762d8ff
dotnet-apphost-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
80b4decbb49a7acf692aa1a600e111e3f4ef7bc71cbe210da7e5ca674b84e559
dotnet-hostfxr-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
e7fe9237eddaf12854c060c75672919cbb6e254d1db07b90aba09261a939ee71
dotnet-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
24ae1890686f4b846d5a6de6bcf5901f72e998785e38b444c716b76be73fbfac
dotnet-sdk-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm
1e1712cf06699de75847284e234a4fc543a981e1d29adc4126d70c1d18be53c8
dotnet-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm
cfd5643b251f02203de9ae5c584d349f43645b586ae8d4438b6507ac21c1e8b2
dotnet-templates-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm
98baacba1ce69bc37424dc56bacf75b27d3dbdeff537c94f5912c02fe6724ea6
RLEA-2020:4672
autogen bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autogen.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
autogen-libopts-5.18.12-8.el8.1.x86_64.rpm
e75151160d3fc3958dce91ffb51953b00e93a8cb3cb5a43b7f93bf59fad00ca0
RLBA-2020:4734
libblockdev bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libblockdev.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
libblockdev-2.24-11.el8.x86_64.rpm
5da174eafaf69af62408a4815a01f3dc246ef681fcc8e7014b0fce0403a674cd
libblockdev-crypto-2.24-11.el8.x86_64.rpm
2d4d820490c96a4d9c5c75b7cb3ae1520b579e609356fa336cd7fe4800f9f23d
libblockdev-dm-2.24-11.el8.x86_64.rpm
ddb1077966da4cd352a7e5054ecbd6393c5294c45a10185f794f19e1f5213924
libblockdev-fs-2.24-11.el8.x86_64.rpm
1ad19562185e8206dc5175b37b20453977bbeeaf4e69c90f0c2701f6a3297be8
libblockdev-kbd-2.24-11.el8.x86_64.rpm
cb09b43aa55feab2e48ba005abfedfb8e8bb0170aaa731daeeecea050036b1d6
libblockdev-loop-2.24-11.el8.x86_64.rpm
f99218c09d4e71cb3da31faf10c85a3e4e324fa30a2a499104bb554ee7ae9394
libblockdev-lvm-2.24-11.el8.x86_64.rpm
5987c9cd3365981b4e3f0c03f572adbedc4e6e2a27909cbc164c3f2f1b518235
libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm
95c137f79bd41a9f791c48be71008650e3aa7354ab5ac0d6cd54b5bc961cf294
libblockdev-mdraid-2.24-11.el8.x86_64.rpm
40841584b5e8ba50c0316fa6a41a6bb20e470fe8486cc8868bfd1fbf47b55186
libblockdev-mpath-2.24-11.el8.x86_64.rpm
6c11510d841ff0405a0630e37d1ed79d9f741fe85a18a6dc366a4daf7c6165e7
libblockdev-nvdimm-2.24-11.el8.x86_64.rpm
8f5f06d54c67ec053c3268a228e95c91c46741a9976adb23df6f7627ea27989b
libblockdev-part-2.24-11.el8.x86_64.rpm
979ebb94b393928e80524a055ced8c32914e3bb69fdbeb7548d61e86048b49d6
libblockdev-plugins-all-2.24-11.el8.x86_64.rpm
fd8cdb42a8c71a3313807d62340daaaa650588184e86a039197d94a44b31d7e8
libblockdev-swap-2.24-11.el8.x86_64.rpm
1a319f5063476b8af2207e8d0d8b8564ad66412886b4cf3c337e069c443b5c23
libblockdev-utils-2.24-11.el8.x86_64.rpm
c954d6b891f0140d997e1f3106e9cc023ee920288c017910fed598501e321ee1
libblockdev-vdo-2.24-11.el8.x86_64.rpm
3397635712651d00661b4f91563eb6aaaec753824b97fb4e8de64e6a17d9de49
python3-blockdev-2.24-11.el8.x86_64.rpm
00fcf1707621b8ff4a0de879d5e401b5b738a05783621ec8e85c4bfef705300f
RLBA-2021:1864
initial-setup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for initial-setup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
initial-setup-0.3.81.7-1.el8.rocky.x86_64.rpm
b0679fe50c82447897f0c44b29a54a9a9687350456cd7ee3cc275ad7190c2efc
initial-setup-gui-0.3.81.7-1.el8.rocky.x86_64.rpm
93a078d2f9570a23ba553f45d203254502708391e176eab4ebefb876761e70b1
RLBA-2021:3240
.NET Core 2.1 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* BUG_TITLE (BZ#XYZ)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* BUG_TITLE (BZ#XYZ)
rocky-linux-8-x86-64-appstream-rpms
dotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm
a4d8e71402fc6bd36ccae8ba4395eb873b0f3c784db09d3084e6ca440cda925d
dotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm
cbfff6de30501753f7e3e22633e6bb2b79f127fe1aa3852be5f49569a0197f4c
dotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm
b01ae5a57232950f63cd3847d35e22abbbb6ed9546f798908e4f2c4f5e491649
dotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm
c366fad3118e4a8e74178c05148f40faaf4f058e720a4bf78926f6713b259deb
RLBA-2022:7462
anaconda bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for anaconda.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
anaconda-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
14306fbc0585ea126092684577dd78c997a03dda55f075c5e860447729b820ad
anaconda-core-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
a72b8c6d78e2df066d85d66436287bbe54e8681c738df026216680fcef5620a3
anaconda-dracut-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
decf0a6c4cf9205f0d5b7cf816b59d941dbf6989e5918b3fc267de57407d8869
anaconda-gui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
b489cf953ec8e843d54407de768f8a265835e8ece54f30de57de15722dfee29f
anaconda-install-env-deps-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
62f966ca820588e7047171e4cce1ac7bd5b15f0da633f9fd83afc77b9fe82ff5
anaconda-tui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
bebe596166ed2e9ce70c6108d011b8fab5e168af9a5b1e61c0ba387755736b14
anaconda-widgets-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
ef49cafda3feb4032b7c9d025ebc15ada7809a5c0e0394b0094ecfcf039a4dfd
RLBA-2022:7573
pacemaker bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pacemaker.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
pacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpm
3140cfc42a7891db48ccd246e8e9cbbbf6bd63470ca182d69d41b638bf54d33c
pacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm
98c2f138e3b705ee8a47cb1649347a579fedee8fe73edff425f2e45b9d22e96e
RLBA-2022:7635
openscap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openscap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-appstream-rpms
openscap-1.3.6-4.el8.rocky.0.2.x86_64.rpm
a9c8fcf39e5a3c78777fd13e99ab9e9068ef7bc27f2e6a31d44a653e8a82af4e
openscap-devel-1.3.6-4.el8.rocky.0.2.x86_64.rpm
797332aa46d047b77da8e2aeed59d299e90093423d0b5cc36537180d4c0bc7ec
openscap-engine-sce-1.3.6-4.el8.rocky.0.2.x86_64.rpm
096db4413ec320ccc6b4b90a8e61a5e060e6bd03fb54a67eb454f348812a6dc0
openscap-python3-1.3.6-4.el8.rocky.0.2.x86_64.rpm
2029d8040215779088eda229a66dd9d8c62f21a263e1c2347a228f4f41dc0312
openscap-scanner-1.3.6-4.el8.rocky.0.2.x86_64.rpm
b7434cd2d2fa7a294c62d1ffe0573d2c156d108cdab0f98d30c02253cceef8cd
openscap-utils-1.3.6-4.el8.rocky.0.2.x86_64.rpm
2fb8149ec7f11aec5578c45ba7e146d7e149bc57faa6822371a661cd0acb6bb6
RLBA-2022:7831
osbuild-composer bug fix and enhancement update
The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients.
Bug Fix(es) and Enhancement(s):
* osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for osbuild-composer.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients.
Bug Fix(es) and Enhancement(s):
* osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532)
rocky-linux-8-x86-64-appstream-rpms
osbuild-composer-62-3.el8_7.rocky.0.1.x86_64.rpm
8262e7655a6fcb6b2d662e008a04b7dd6cd220d068a5b5cc6bf988c18aab8ae1
osbuild-composer-core-62-3.el8_7.rocky.0.1.x86_64.rpm
94dc3d530421be596cf771a39fae7c08cb7e0b07ef95c95904f6ced4fc08ecb6
osbuild-composer-dnf-json-62-3.el8_7.rocky.0.1.x86_64.rpm
e2bb916e89a9eb86f7d8bcdf96038cf6085cf44f3040692cecb55cf4a96131df
osbuild-composer-worker-62-3.el8_7.rocky.0.1.x86_64.rpm
77c71158f924058584b2df864b8224a5e5f39b0d1a0361a9f87bac257a257184
RLSA-2023:0606
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.7.1-2.el8_7.x86_64.rpm
397c7a3d617f303fa340ad25ca56e7a82e592fcd0ee0b605fc3c7f7cca736eb7
RLSA-2023:0610
Important: git security update
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: gitattributes parsing integer overflow (CVE-2022-23521)
* git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for git.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: gitattributes parsing integer overflow (CVE-2022-23521)
* git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
git-2.31.1-3.el8_7.x86_64.rpm
9220dd3b23a10da6bb25972c39c0fb7b3c7c15b73e364a3f81d87a795a29b9b7
git-core-2.31.1-3.el8_7.x86_64.rpm
20674b16cc56df61db92841fbd59588ca24fd21806c703c808cb44ecc4fcc770
git-credential-libsecret-2.31.1-3.el8_7.x86_64.rpm
69ec8410420bc70ac0dbb562dccfaed5e5ed1fd82b11a629eccc839268483144
git-daemon-2.31.1-3.el8_7.x86_64.rpm
9357f576178574808fe508bd81ff93896917981e7b757c1fe814d39768307c5f
git-subtree-2.31.1-3.el8_7.x86_64.rpm
1cac01052d2d6fe529ac48eb17744ff28fb715cff5adb010892a8b57c50585c0
RLSA-2023:0662
Important: tigervnc security update
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
tigervnc-1.12.0-9.el8_7.1.x86_64.rpm
4c5a4f86b80bf7056ddb8958cfe88bf79f4dec20a575de0e2cafef9515696da6
tigervnc-server-1.12.0-9.el8_7.1.x86_64.rpm
7dff90cc4f543e04b61fee3f36d80e84a1e9c4adc6b5ecaf9b0761c87d4af68e
tigervnc-server-minimal-1.12.0-9.el8_7.1.x86_64.rpm
9ee941199be3911ecfa7e203ad129d6292653a77032950edc91b07afa2259ecd
tigervnc-server-module-1.12.0-9.el8_7.1.x86_64.rpm
d12a5a5e1a1258f6e3eeb25acfc8d1c1013a6470d300bcbd232cd3a138aab396
RLBA-2023:0783
.NET 7.0 bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3.
Bug Fix(es) and Enhancement(s):
* 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z]
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3.
Bug Fix(es) and Enhancement(s):
* 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z]
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.3-1.el8_7.x86_64.rpm
20884c95c3afd7e70d88c2f8f8eac26a0bb8e897cba25df6ec8e09dd208b1884
aspnetcore-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpm
5a3c338518ec311c7dfcdb9270e18deb939be1d94433ea3011d93f1428143271
dotnet-7.0.103-1.el8_7.x86_64.rpm
d3477447a067a18b36414603d7b523732a183752f8aabdb393aef93fbc31c813
dotnet-apphost-pack-7.0-7.0.3-1.el8_7.x86_64.rpm
990241696c3ca0502378577dd827ee5c384ba879251d7c931c38e17d04430b29
dotnet-host-7.0.3-1.el8_7.x86_64.rpm
c062a02e6fb5bcb5278b7d51d10ea2e4dfb458e26b0640c0162ccb9f59bfa53a
dotnet-hostfxr-7.0-7.0.3-1.el8_7.x86_64.rpm
68a035d80d6084f2a4ccec5ccb69c6e78f0fec825405c60edf1c27cfbbf3875c
dotnet-runtime-7.0-7.0.3-1.el8_7.x86_64.rpm
2fa8101d8215618813e9ba6b2c184944084f046d5267ffc7f898a83a454a2b0a
dotnet-sdk-7.0-7.0.103-1.el8_7.x86_64.rpm
9861a45dcab2dc661af7ab31eecfdb79f08a56b60236cd938fb28038241f83e5
dotnet-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpm
4f2929540b08ed3f22ea26382f07cb2eb865fbb1025021c9357bb038c012360e
dotnet-templates-7.0-7.0.103-1.el8_7.x86_64.rpm
187896b19f8a806dcd357ca1e720e92e93bd5436531f71fecc5679f5f682f186
netstandard-targeting-pack-2.1-7.0.103-1.el8_7.x86_64.rpm
dceeaab4ed466a0f86ea384ef902e4676aa83653aa6e7ac708694b9de89b57c1
RLBA-2023:0784
.NET 6.0 bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14.
Security Fix(es):
* 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z]
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14.
Security Fix(es):
* 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z]
rocky-linux-8-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm
d927a4505fdcad23195573f6d52c80434f5b4a621449aa24f516c9fe811239c6
aspnetcore-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpm
370d95f0e7be0454313071af1368521fbe6731df7e916787f93c6356c6d298e7
dotnet-apphost-pack-6.0-6.0.14-1.el8_7.x86_64.rpm
f8bec232847567d9a518812b09dad2c46e721dda2a6b0408ee6aedd93f4a4e81
dotnet-hostfxr-6.0-6.0.14-1.el8_7.x86_64.rpm
eae9ca989c5f4371de03757903e575490f006ace86b401c6cd138a43f0d3a071
dotnet-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm
25c974c86d5834beba5c58fd787b021f792c2b994514b7373749acf5c84aeff4
dotnet-sdk-6.0-6.0.114-1.el8_7.x86_64.rpm
8b6f7fe708e0d43d3c23a47f58a7ee148b609532c4403337c00d9d9854919635
dotnet-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpm
60e6b60fde9cbd89bfcb3ff099e9491e38ade49488d2285cfc50a3f06e736b2b
dotnet-templates-6.0-6.0.114-1.el8_7.x86_64.rpm
7d68bed970785a9e9640e7f78e1d18b8e409c5763b25ead6eca982b665122d4e
RLSA-2023:0833
Moderate: python3 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)
* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)
* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
platform-python-debug-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
936765318cdb96d7a45dda4bf78149a39f9f22d22573c9f4c8ac0a938145df70
platform-python-devel-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
f146e3879b706ef315779f3c166be4390e5e8d1b7955d3f4a03c9bc13f29f4db
python3-idle-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
aabcaa0d5666f67972bf5b0a6fb6d43497eda585884c7e3596d5f33bb17da541
python3-tkinter-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
be68cdb65121707231fc3458a0d199b5792b1a43d51f45bbfc0ea153972e8e0f
RLBA-2023:0836
OpenSSH bug fix and enhancement update
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Bug Fix(es) and Enhancement(s):
* backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Bug Fix(es) and Enhancement(s):
* backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732)
rocky-linux-8-x86-64-appstream-rpms
openssh-askpass-8.0p1-17.el8_7.x86_64.rpm
14a7425e79ab4665d925887de9418eac2d157d1cbddbdc1ce45ec08f67abbf65
RLSA-2023:0838
Important: samba security update
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
samba-vfs-iouring-4.16.4-4.el8_7.x86_64.rpm
ae778fc011fcc31ac814544fdfa17454875fd044ee944a6492c570f6d4321ef2
RLSA-2023:0808
Important: firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.8.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for firefox.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.8.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
firefox-102.8.0-2.el8_7.x86_64.rpm
1b1d59a6021a0ac5ca295d1b120d2176cb87a73cba1bb35262a2d55dad536301
RLSA-2023:0821
Important: thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.8.0.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.8.0.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
thunderbird-102.8.0-2.el8_7.x86_64.rpm
3f2e6dee35aacbaec3ad880cb84c1c8b020b26d9bb82d5a4fb1845efaa5a8809
RLBA-2023:0843
fence-agents bug fix and enhancement update
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es) and Enhancement(s):
* OCF Timeout occurring on fence_ibm_powervs (BZ#2136203)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fence-agents.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es) and Enhancement(s):
* OCF Timeout occurring on fence_ibm_powervs (BZ#2136203)
rocky-linux-8-x86-64-appstream-rpms
fence-agents-all-4.2.1-103.el8_7.1.x86_64.rpm
fd7953a814d1018b0e42b1e216a639834e3dd22ea130d089be5805d15ef03970
fence-agents-kdump-4.2.1-103.el8_7.1.x86_64.rpm
4ef7ebf360d2bc40d249815edb9c60da50420afd71c487d801e573d4d522af8d
fence-agents-kubevirt-4.2.1-103.el8_7.1.x86_64.rpm
c645f7046f2fc92b441b236b56c855fd575372cb776da360689b69b7fcbe39c0
fence-agents-redfish-4.2.1-103.el8_7.1.x86_64.rpm
16124371e7bb5cdde13c6119951db9c727e54c288a6f162652daa83b84e6485c
RLEA-2023:0844
rpm-ostree bug fix and enhancement update
The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es) and Enhancement(s):
* backport support for embedded container whiteouts (BZ#2137905)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es) and Enhancement(s):
* backport support for embedded container whiteouts (BZ#2137905)
rocky-linux-8-x86-64-appstream-rpms
rpm-ostree-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpm
58edfffc0deb83ae4499df770ec2d8f7c7126b75615307b9246819de1d1eeb4f
rpm-ostree-libs-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpm
e9a5fa26ad94103ea70bfe9b3d6c82039db3147038a94928421ccfe0382249f7
RLEA-2023:0847
new package: synce4l
The synce4l packages are a software implementation of Synchronous Ethernet (SyncE) for Linux.
This enhancement update adds the synce4l packages to Rocky Linux 8.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for synce4l.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The synce4l packages are a software implementation of Synchronous Ethernet (SyncE) for Linux.
This enhancement update adds the synce4l packages to Rocky Linux 8.
rocky-linux-8-x86-64-appstream-rpms
synce4l-0-3.20221122git9564b5.el8_7.1.x86_64.rpm
bfdae57b13b96b443cf813ad967fdd45216584224fa2a62bd784e381dbe3e97c
RLBA-2023:0850
openscap bug fix and enhancement update
The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* xmlfilecontent probe produces invalid OVAL results (BZ#2165577)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openscap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* xmlfilecontent probe produces invalid OVAL results (BZ#2165577)
rocky-linux-8-x86-64-appstream-rpms
openscap-devel-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
2cf728720a489353054d40208ba2298f96bc649ade04f328db4453354795ce41
openscap-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
dc61ffba6cc1eaf9e2c857948c37f08c0e1fa454e895ec96d172ba06d96f7b25
openscap-engine-sce-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
a187a038fd7436227918dabb52df651c0272b35bc50b81fd28d69e6ed08a596a
openscap-python3-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
fc91a15732cdd4561ae0de5f24a85e59347850a74524b1efcca309f3d6388db9
openscap-scanner-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
09a40ab8c899174530eb2115924db3aa5c71c3e0f65298153231cb6caec42608
openscap-utils-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
66a7d268a5991f28f987610e3644e4ab2bce8d90ba00afb6388ec0c297de31d5
RLSA-2023:0902
Important: webkit2gtk3 security update
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK
platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK
platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el8_7.2.x86_64.rpm
c410ef75cde5b474c951e88b5af678d7329e45b5398b030027a8d9926e1f59b0
webkit2gtk3-devel-2.36.7-1.el8_7.2.x86_64.rpm
56013ee1adfad7620077622994baeed9d5ee9d37df76deebac40daf867cdd342
webkit2gtk3-jsc-2.36.7-1.el8_7.2.x86_64.rpm
a7cf015c6fee90412e38ae998b3fdb4880e637f1945f5c597b9c17b04ca08361
webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.x86_64.rpm
daa94962eaff4bb9e002007e3ebbf9fede3a7b27599909e079bf4207d140bf82