RLEA-2019:3511
libvarlink bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libvarlink.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libvarlink-devel-18-3.el8.x86_64.rpm
b55cfffc5f85bde278643421a91262e344cc1726f22d1ac2434baecf528b27d8
RLSA-2019:3553
Low: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gdk-pixbuf2-xlib-2.36.12-5.el8.x86_64.rpm
80975f94327fde0be09114ca723eef0fe5b361abd33919599ec8bf9fc250a6c5
gdk-pixbuf2-xlib-devel-2.36.12-5.el8.x86_64.rpm
e961d588a53bcac45d4e32fb87f5fc1fd165c21773b208bb0df88db93db963ae
libpurple-devel-2.13.0-5.el8.x86_64.rpm
05ca7284f4fec8fd2a90a1b4885d6e7ae2f1430d8d114a10be919bedc07f35b8
pidgin-devel-2.13.0-5.el8.x86_64.rpm
54bcb129c8bce080a61d680b68bcfc5a39b152fea9a253258c7365fa3a257e07
RLBA-2019:3558
libzfcphbaapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libhbaapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libhbaapi-devel-2.2.9-13.el8.x86_64.rpm
e462f1134b87fe72e2ad737871533740ca86ce672a85d120fccffb30901cb9b5
RLBA-2019:3593
ipset bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipset.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ipset-devel-7.1-1.el8.x86_64.rpm
3daccfc1f91ea4cde4a2631eba295758a02824de807d38ac0f94d5d6abd5da09
RLSA-2020:0633
Important: ppp security update
The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line.
Security Fix(es):
* ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for ppp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line.
Security Fix(es):
* ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
ppp-devel-2.4.7-26.el8_1.x86_64.rpm
da869331b7c3621adf2515d94514b6f1756584944bf757af1c0645cbdb6eafd1
RLSA-2020:1766
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
clutter-devel-1.26.2-8.el8.x86_64.rpm
7efb67322a749d8f69695596014ce87c85db9a2a0750cd4dddbf4efbe5e29275
clutter-doc-1.26.2-8.el8.x86_64.rpm
5a9d45785cd120b9105836f641313354fc4b3f603cc85705cbd326a471fc17a8
gnome-menus-devel-3.13.3-11.el8.x86_64.rpm
803fb2252c404e45c6aba93d9e220ac6317f0896f248278cdf82f0f34734e8c4
mozjs52-devel-52.9.0-2.el8.x86_64.rpm
459115c05dc47137e5b9bfa78f2d16ebe635d976efff6df0982a5d4446e54466
mozjs60-devel-60.9.0-4.el8.x86_64.rpm
fa7a34b318b8ec9aa7f510d939f1ae5ff1d373c17c2f58c7cd077fbfc3b43256
RLBA-2020:1919
ppp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ppp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ppp-devel-2.4.7-26.el8_1.x86_64.rpm
da869331b7c3621adf2515d94514b6f1756584944bf757af1c0645cbdb6eafd1
RLSA-2020:2755
Important: nghttp2 security update
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nghttp2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libnghttp2-devel-1.33.0-3.el8_3.1.x86_64.rpm
c9f1274be01ba917a2f7b29d94498c6ff51417668a1a0f9989af85b037239604
nghttp2-1.33.0-3.el8_3.1.x86_64.rpm
24e0819e0929509fd91927f2e1a688fd4aa037574c3dc18d79556d8f6e9da47e
RLSA-2020:3654
Moderate: libcroco security update
The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library.
Security Fix(es):
* libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libcroco.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library.
Security Fix(es):
* libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libcroco-devel-0.6.12-4.el8_2.1.x86_64.rpm
0fc17fb4015859269d277ac2ec47e7b301180c10e8b81ca58100449a89f482f2
RLSA-2020:4451
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
frei0r-devel-1.6.1-7.el8.x86_64.rpm
af864b967e6bed4e5388273ea0a0621f2aea236599ce362fe7eee7079848f244
pygobject3-devel-3.28.3-2.el8.x86_64.rpm
a8c2b5f779ac4b138134d9e6e20f1abedab4ccc4de23c9abd4baa5e1cb7685a1
tracker-devel-2.1.5-2.el8.x86_64.rpm
575183374c091ddefe9691f4af42e5f8d7c4dc1609d6c7ddadb76142dde0739f
vte291-devel-0.52.4-2.el8.x86_64.rpm
ea235c1344dba8fc01f4c46db1fa7ba98f4f1afdb4d64518d7bb6cb55dbf57b8
PackageKit-glib-devel-1.1.12-6.el8.0.2.x86_64.rpm
60dce13c69b898769b4e23859d478d6a07c966ab9953b31e675ccc1a6bd2c992
RLEA-2020:4555
libpsl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpsl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libpsl-devel-0.20.2-6.el8.x86_64.rpm
37830e981153120e4a163d18a2f608e2d3131c5519afca75edf013586b0074b9
RLEA-2020:4556
libnetfilter_queue bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnetfilter_queue.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libnetfilter_queue-devel-1.0.4-3.el8.x86_64.rpm
d3ab0d2f234cda210c06d86a1f6a81a7be2a4b598a46b93ebbca319c4454dc85
RLBA-2020:4600
snappy bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for snappy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
snappy-devel-1.1.8-3.el8.x86_64.rpm
8c5b98d76845f696d71780870778a99122f1fd2a2374cc70b27bad8be7d6732f
RLSA-2021:1586
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
atkmm-devel-2.24.2-7.el8.x86_64.rpm
c2e6b58755cff493e1a39376a4a7044c90736268b48dfb36edcdd6b967aff495
atkmm-doc-2.24.2-7.el8.noarch.rpm
2598f60483489a4d971135fe643fd9a34d755e4a96c07689ab60bad21a582f59
cairomm-devel-1.12.0-8.el8.x86_64.rpm
014577dd524df14205b7d0061d0999f0a0817de7a76503b9f12c728e702d38b8
cairomm-doc-1.12.0-8.el8.noarch.rpm
138b57e136e261b564d6a902178d07fd422fe83f05caa53a50ec32705ea4174e
enchant2-devel-2.2.3-3.el8.x86_64.rpm
02c07be62b968f1835412127b4a02485af27b045902d1e4bd244fcb4da4946a0
gamin-devel-0.1.10-32.el8.x86_64.rpm
8629a67a9c5d4f469d7bda8ccc2456100efda39107f546827aecbc45e58ecc3b
geoclue2-devel-2.5.5-2.el8.x86_64.rpm
34b869a45260f5db78d085d2235fe77ec5ccd1849c5c22e80759d78a92ba3518
gjs-devel-1.56.2-5.el8.x86_64.rpm
1e7467017b563bb328fd0a06253f5d821b7a7a68fdf14b5abbaae3ba6b5725da
glibmm24-devel-2.56.0-2.el8.x86_64.rpm
59daf3af6e6cdbcd0f43b82cd207ff276f7a37a449571362f306ef37f75b9019
glibmm24-doc-2.56.0-2.el8.noarch.rpm
e4c1b83ec081cc5d49aa33270b12bc407eea45ebad3ccdce525e46a88e79503a
gtkmm24-devel-2.24.5-6.el8.x86_64.rpm
0337d12eeeff3f309314396bbe1debc45147ca4a54a6a769a82af93c5510ffc2
gtkmm24-docs-2.24.5-6.el8.noarch.rpm
b139c29053b16cd003baef27d687666b3ab39b9c8903011d1b3c7f82f5c275e6
gtkmm30-devel-3.22.2-3.el8.x86_64.rpm
e986946f5b2f1c963c330a7904643710cc4e952da1495236d246e81b804877f3
gtkmm30-doc-3.22.2-3.el8.noarch.rpm
71f74a9b26e199050e0eaf869affba48af9648adea4818093b740b72964dca47
libdazzle-devel-3.28.5-2.el8.x86_64.rpm
5cdd898783b9a065033b1689447a467a4465e19f47f5278c76fbb15569fdeb4d
libepubgen-devel-0.1.0-3.el8.x86_64.rpm
ed1b22dc8e696b4f842a577d3af9fbbc8c7a880a4a67b66b9a175cbd5c3995a5
libsass-3.4.5-6.el8.x86_64.rpm
62804b308676433da995707a21c7f1b112890e7a7d17f3935b17f814657e5c41
libsass-devel-3.4.5-6.el8.x86_64.rpm
a82feb403cfca34b1ba812d92942535f9c3dae0647c1666afc4b2afe84477870
libsigc++20-devel-2.10.0-6.el8.x86_64.rpm
c3faa98649c7d51e1d8c97a378940912a44ae62c94780927abaff13df566e780
libsigc++20-doc-2.10.0-6.el8.noarch.rpm
4bd0fad981c77439d2f94977a0c5314b008dfa87658055909df65a2cae90ae80
libvisual-devel-0.4.0-25.el8.x86_64.rpm
c296e5610958ca85ab4bb85343cdfd4765c41111ad757b539b4bf452e2d6cac2
OpenEXR-devel-2.2.0-12.el8.x86_64.rpm
376e8c3fca1c2dfe45762515965fd32bee4be4038f8fab5541fd920d617854a1
pangomm-devel-2.40.1-6.el8.x86_64.rpm
59de632c088b8f3f157b716e4c76d27a82bc93ec5823bb6deb2c3ee3c637228b
pangomm-doc-2.40.1-6.el8.noarch.rpm
68d1b3c4e9b3cf47ccffa9b02a5ffc49639d3769b9ebb167cd1008c3709debf5
soundtouch-devel-2.0.0-3.el8.x86_64.rpm
c1d6f943c9248ec0d1a51b4b5b64b21cbcab7a008836ae5b7ab2583e5f665e24
vala-0.40.19-2.el8.x86_64.rpm
4ce756f0d7c9b3150d3a6bae4d68f2d1516b962c225b399d6eb60d182a17d5ac
vala-devel-0.40.19-2.el8.x86_64.rpm
ba60b658fb7a8df486fa65d17aae26e70df57d29f44d6d4519ac9260ebc88679
woff2-devel-1.0.2-5.el8.x86_64.rpm
569a9ec62e22fd6550e095591dc2e93f324bafefe7835ccfdccc2dc5ad72cbd3
RLBA-2021:1587
librabbitmq bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librabbitmq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
librabbitmq-devel-0.9.0-3.el8.x86_64.rpm
cfa54fe671f1c76b7a3ca7fc92136cfe507940547635deb741698e12314042c1
RLBA-2021:1612
avahi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
avahi-compat-howl-0.7-20.el8.x86_64.rpm
8edae4ff0773e3d38f52465e569e7be973bf6c080a3bc6316212f55eb6084995
avahi-compat-howl-devel-0.7-20.el8.x86_64.rpm
5f9e658cc48a1c6ed3a0d1f3ac81ce92f1b4e68c5b7811038905b8ac5164e36e
avahi-compat-libdns_sd-0.7-20.el8.x86_64.rpm
cc7eff911c02f95bcc810d1da70c812cf2ed763ea015266c8084533603bb7761
avahi-compat-libdns_sd-devel-0.7-20.el8.x86_64.rpm
3a2572f99075805d409478af4324259466b3ec584584747fef3114260974099c
avahi-devel-0.7-20.el8.x86_64.rpm
19adf179c904c8c0b0e4b0c8b6a6953921746e95bd0fada758ffeb4254387abb
avahi-glib-devel-0.7-20.el8.x86_64.rpm
c0d8db33667b57f7c881e23d4119df17a49edead3d80dfa177ae0d4b851997d8
avahi-gobject-devel-0.7-20.el8.x86_64.rpm
91e8c26ae4ef6fa7a470bebf460ddbf8ec568834ed9f696c28a204fea2c00e38
avahi-ui-0.7-20.el8.x86_64.rpm
7417fb13aba845332d2ceded701990d7ee68fc6d7048cfa5fc23db88848f87c2
avahi-ui-devel-0.7-20.el8.x86_64.rpm
d3fe252afe6ee6a7675ff3850d32e6fb3ee0fa6d4295c0c9871a537148459980
RLSA-2021:1627
Moderate: trousers security, bug fix, and enhancement update
TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware.
The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782)
Security Fix(es):
* trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331)
* trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332)
* trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for trousers.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware.
The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782)
Security Fix(es):
* trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331)
* trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332)
* trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
trousers-devel-0.3.15-1.el8.x86_64.rpm
62f21a42b4cfb1808bbc995066ae9a621f640c0fb028a3505e6d419bf700a32c
RLBA-2021:1628
tpm-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
tpm-tools-devel-1.3.9.2-1.el8.x86_64.rpm
3e09afc3c1ec21a7b0fc7fadebecf307f5d47abbec4326be135bf29fb696209e
RLBA-2021:1689
librepo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo, librhsm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
librhsm-devel-0.0.3-4.el8.x86_64.rpm
5f4c650fd8a1c375bdb24d9eebdf8ebbf88599faa31f10b756fd97ded80d550d
RLBA-2021:1696
intel-cmt-cat bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for intel-cmt-cat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
intel-cmt-cat-devel-4.0.0-0.el8.x86_64.rpm
35751cd4efa547d53328014fe341aa066cfbdd7360eb9dca5fb9811c872b2024
RLEA-2021:1712
libpcap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libpcap-devel-1.9.1-5.el8.x86_64.rpm
e786615300f617b808f0c372bc9bad2074b599b707e0fddf4c15730d872f59bb
RLEA-2021:1720
ima-evm-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ima-evm-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ima-evm-utils-devel-1.3.2-12.el8.x86_64.rpm
beb45fe21f7460179800abfa4bee06e6e306fb8c826d1ae1525f2d125af02218
RLBA-2021:1731
userspace-rcu bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for userspace-rcu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
userspace-rcu-devel-0.10.1-4.el8.x86_64.rpm
d0f6a8504e2ad49da0dcdf713317d36722beae6aa352d6fc4d7b1895505a5233
RLBA-2021:3594
libdb bug fix and enhancement update
The libdb packages provide the Berkeley Database, an embedded database
supporting both traditional and client/server applications.
Bug Fix(es) and Enhancement(s):
* [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100%
(BZ#2001972)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libdb packages provide the Berkeley Database, an embedded database
supporting both traditional and client/server applications.
Bug Fix(es) and Enhancement(s):
* [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100%
(BZ#2001972)
rocky-linux-8-x86-64-powertools-rpms
libdb-cxx-5.3.28-42.el8_4.x86_64.rpm
cf736b0b588c375926cac5720eaf0b5c12a03396fdd0702b30c45778c299d5da
libdb-cxx-devel-5.3.28-42.el8_4.x86_64.rpm
70ded5decf8add2e61325131a2d587bd4db8afae0f8e69a5d20c82dc960a1944
libdb-devel-doc-5.3.28-42.el8_4.noarch.rpm
75d6fad816ec9f39c8f77f2d0eb7abcf6a01acb377b20d0d26e389a6a21bf15a
libdb-sql-5.3.28-42.el8_4.x86_64.rpm
c011c66393e6cfd53143facc502816d2087e2c1a34e50a9f0878c013dc8acb4a
libdb-sql-devel-5.3.28-42.el8_4.x86_64.rpm
e50bcd585f11e4a80adef287c3b1660a9c27db2ffbcbcb0295d88ae8fd328c69
RLBA-2021:4371
libxcrypt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libxcrypt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libxcrypt-static-4.1.1-6.el8.x86_64.rpm
6cd698f481382473e361ea705ee6a38e407ae017b4bdd7747f9961295f6c3be3
RLSA-2021:4373
Low: pcre security update
PCRE is a Perl-compatible regular expression library.
Security Fix(es):
* pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838)
* pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for pcre.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PCRE is a Perl-compatible regular expression library.
Security Fix(es):
* pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838)
* pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
pcre-static-8.42-6.el8.x86_64.rpm
5a941c237db592d0dc03ddbd75cc732309b95423a614390a96fc7903e0c70b37
RLBA-2021:4377
quota bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for quota.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
quota-devel-4.04-14.el8.x86_64.rpm
36ab026ce8a8b89cd44c442b181f01f91216fe9c4a02d1fb068acb8a015fd3d3
RLSA-2021:4381
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gnome-software-devel-3.36.1-10.el8.x86_64.rpm
58c7567875b23220f2cde0c79cdfdb45fa3d092b1505c7943dc22c5a545fd6dd
LibRaw-devel-0.19.5-3.el8.x86_64.rpm
d8eecd1384d7cc1762be8ec456703c2733bf058a979fd0f89d816acf840f39c0
RLEA-2021:4405
libmodulemd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmodulemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libmodulemd-devel-2.13.0-1.el8.x86_64.rpm
ac3528e86d31b6c386766b2028b8139ce328326b2f210034902483eaf83945bc
RLBA-2021:4412
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
opensm-devel-3.3.24-1.el8.x86_64.rpm
621ad039af7ffca86e413e5bd1b914ef2a950ad07cc1679d5bb557ade494242d
RLBA-2021:4446
iscsi-initiator-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
iscsi-initiator-utils-devel-6.2.1.4-4.git095f59c.el8.x86_64.rpm
ba066da9f10cef6ab1253966efe0e86c5f491f31f849ccfbbd7a158c89c47875
RLEA-2021:4450
tss2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tss2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
tss2-devel-1.6.0-1.el8.x86_64.rpm
60518da1f13980a092eddebd156e815cb9bf79a3e4b1288fbf05cdbbd37e86dd
RLBA-2021:4475
freeipmi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freeipmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
freeipmi-devel-1.6.8-1.el8.x86_64.rpm
b78026e3c9c6cde5dd92a0f4d1f612d417381daa98790aa03f3bc2cc5b389e97
RLBA-2021:4477
parted bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for parted.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
parted-devel-3.2-39.el8.x86_64.rpm
3f4318622b1f8c870e2c7e9d2c77eda3170974aa8ac5a8d6bee27a1fc24f8789
RLBA-2021:4483
OpenIPMI bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for OpenIPMI.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
OpenIPMI-devel-2.0.31-3.el8.x86_64.rpm
c5ab15f7866bda26bc6c6d0e37385aad298a10df037429d3ce4f05f926a85cb2
RLEA-2021:4488
hwloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
hwloc-devel-2.2.0-3.el8.x86_64.rpm
ae23cdce52f1f08e32f1b1a8d6351d85dd3d8e613319358bb67ce92e3a123368
RLBA-2021:4505
mobile-broadband-provider-info bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mobile-broadband-provider-info.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
mobile-broadband-provider-info-devel-20210805-1.el8.noarch.rpm
7a39848d36b0cce3fb579b79202c4b768831698134392940e50d2ced22975191
RLBA-2021:4507
fontconfig bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fontconfig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
fontconfig-devel-doc-2.13.1-4.el8.noarch.rpm
f40bd239864c2fb6e63422c5c25a7e6c13abdf87edb075da0286845426005066
RLSA-2021:4510
Low: lua security update
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for lua.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
lua-devel-5.3.4-12.el8.x86_64.rpm
7080d7eee1d52749bbc868db901af43634198e25e6570a4ad40f279c1958871e
RLSA-2021:4513
Moderate: libsepol security update
The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings).
Security Fix(es):
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084)
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085)
* libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086)
* libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libsepol.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings).
Security Fix(es):
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084)
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085)
* libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086)
* libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libsepol-static-2.9-3.el8.x86_64.rpm
3f4c77f797a85af2568a1e2c7e94b941468e0b66d023eb6694f8c4facb94646d
RLEA-2022:2014
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libpsm2-devel-11.2.206-1.el8.x86_64.rpm
fc9b4652423089fd9733632c2a521603fa39fa9d8e1c0b04abd47d0e1a0c6c44
pmix-devel-2.2.5-1.el8.x86_64.rpm
56542ebf0d731fc741c1561e5bf555d92b165590556d290dabff5a65c4445a4b
python3-mpich-3.4.2-1.el8.x86_64.rpm
3945065c2b3fed8987ed18a940f1a0de541447ba754a30bfec1f45e66a918896
python3-openmpi-4.1.1-3.el8.x86_64.rpm
15f474daedc8256029bc4ea4951abd34638b8babdcbb1e5b04ff178e636b53e8
RLBA-2022:2027
json-c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for json-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
json-c-doc-0.13.1-3.el8.noarch.rpm
d27af04338be30aed0ad2d64bb84dddd51cda618cc346f82d726f0c63a94f98a
RLBA-2022:2060
kmod bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
kmod-devel-25-19.el8.x86_64.rpm
67d7b54350816190c99ebeca303edccf1b8640409ef2db3780ede9fac9772841
RLBA-2022:2009
ModemManager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ModemManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ModemManager-devel-1.18.2-1.el8.x86_64.rpm
9da4c3ff58e0f68d2e9360595b1df77811d63dd5294d6e58e4b52e1d761eacc9
ModemManager-glib-devel-1.18.2-1.el8.x86_64.rpm
953162e7c211cbdb5767cb3438010fca5f267a1ba5988a58193c8049779ed53f
RLBA-2022:2035
libstoragemgmt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libstoragemgmt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libstoragemgmt-devel-1.9.1-3.el8.x86_64.rpm
200ec66c6c5030ea60a22bee2ae51f6f7c5b1244b1d0b5dc42e6b107872f554c
RLBA-2022:2046
libcomps bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcomps.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libcomps-devel-0.1.18-1.el8.x86_64.rpm
3f65a2ef348bb06ad92a2eb74f4385d32060a9b971915aae3b3ce21104eeaf5f
RLBA-2022:2089
pcsc-lite bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcsc-lite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
pcsc-lite-devel-1.9.5-1.el8.x86_64.rpm
8bc520e7470d97941874ac02348dee114d67ebe9a8b1ac5cb9a2250f90131ddd
RLBA-2022:2099
sysfsutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sysfsutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libsysfs-devel-2.1.0-25.el8.x86_64.rpm
612454a49a2453271955df91b96dc17c506b5220d7c8ecc6f691fe656d51cb71
RLBA-2022:2101
libnftnl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnftnl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libnftnl-devel-1.1.5-5.el8.x86_64.rpm
ed87881348d985de817ec2af41c51dcd2c9f9ce1cbcf4c46387f8f31e08e82bf
RLBA-2022:2117
gpgme bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpgme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gpgme-devel-1.13.1-11.el8.x86_64.rpm
c8e04f808b5d9fb2331402a39460d65019fdea05abf6a6b1f1ec23a38eb21292
gpgmepp-devel-1.13.1-11.el8.x86_64.rpm
d6406b65554f93b2098f0b252267941cb5a13617124d0427d2f9a32cce2ec603
qgpgme-devel-1.13.1-11.el8.x86_64.rpm
4e8b5f2a357786ff92df408f27dbd38148c2ea347f36433ddff770739e4e3269
RLBA-2022:2118
texinfo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for texinfo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
texinfo-6.5-7.el8.x86_64.rpm
f7bb262e62284adc68544fd7367ac7ded693836962eceb557b7b924b8bb601c6
texinfo-tex-6.5-7.el8.x86_64.rpm
2133b685d454b1c9df5f3a6c497773e86de13fa77a28f9ff7215c9ec2917b2f7
RLSA-2022:4991
Important: xz security update
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for xz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
xz-lzma-compat-5.2.4-4.el8_6.x86_64.rpm
c46443322d333712b48c8e4f4dbe41066ea0ee1dd84f1886d008b4183929e24c
RLSA-2022:5095
Important: grub2, mokutil, shim, and shim-unsigned-x64 security update
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733)
* grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695)
* grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696)
* grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697)
* grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734)
* grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735)
* grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736)
* shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for grub2, shim, shim-unsigned-x64, mokutil.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733)
* grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695)
* grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696)
* grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697)
* grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734)
* grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735)
* grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736)
* shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
shim-unsigned-x64-15.6-1.el8.x86_64.rpm
0d5a1c86b1620393a1a07885918311a62775b9ab5f49f308de7cbac7521a2711
RLSA-2022:5498
Moderate: Satellite 6.11 Release
Rocky Enterprise Software Foundation Satellite is a systems management tool for Linux-based
infrastructure. It allows for provisioning, remote management, and
monitoring of multiple Linux deployments with a single centralized tool.
Security Fix(es):
* libsolv: Heap-based buffer overflow in testcase_read() in src/testcase.c (CVE-2021-3200)
* satellite: foreman: Authenticate remote code execution through Sendmail configuration (CVE-2021-3584)
* candlepin: Allow unintended SCA certificate to authenticate Candlepin (CVE-2021-4142)
* candlepin: netty: Information disclosure via the local system temporary directory (CVE-2021-21290)
* candlepin: netty: Possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)
* candlepin: netty: Request smuggling via content-length header (CVE-2021-21409)
* tfm-rubygem-sidekiq: XSS via the queue name of the live-poll feature (CVE-2021-30151)
* python-sqlparse: ReDoS via regular expression in StripComments filter (CVE-2021-32839)
* libsolv: various flaws (CVE-2021-33928 CVE-2021-33929 CVE-2021-33930 CVE-2021-33938)
* tfm-rubygem-puma: Inconsistent Interpretation of HTTP Requests in puma (CVE-2021-41136)
* logback-classic: Remote code execution through JNDI call from within its configuration file (CVE-2021-42550)
* candlepin: netty: Control chars in header names may lead to HTTP request smuggling (CVE-2021-43797)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python3-django: Potential bypass of an upstream access control based on URL paths (CVE-2021-44420)
* libsolv: Heap overflow (CVE-2021-44568)
* python3-django: Various flaws (CVE-2021-45115 CVE-2021-45116 CVE-2021-45452 CVE-2022-22818)
* tfm-rubygem-actionpack: Information leak between requests (CVE-2022-23633)
* tfm-rubygem-puma: rubygem-rails: Information leak between requests (CVE-2022-23634)
* python3-django: Denial-of-service possibility in file uploads (CVE-2022-23833)
* tfm-rubygem-sidekiq: WebUI Denial of Service caused by number of days on graph (CVE-2022-23837)
* python3-django: Various flaws (CVE-2022-28346 CVE-2022-28347)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
* New repo layout for Satellite, Utils, Maintenance, and Client repos.
* Support for Rocky Linux 9 clients
* Module-based installation on Rocky Linux 8
* Upgrading Satellite Server and Capsule Server installations from Rocky Linux 7 to Rocky Linux 8
* Connected and Disconnected servers supported on Rocky Linux 7 and Rocky Linux 8
* Inter-Server Synchronization improvements
* Puppet integration optional and disabled by default
* Pulp 3 updated to Python 3.8
* Change to Capsule certificate archive
* New default port for communication with Rocky Enterprise Software Foundation Subscription Management * (RHSM) API on Capsule servers
* New Content Views Page (Content Publication workflow simplification)
* New Hosts Page (Technology Preview)
* Registration and preview templates
* Simplified host content source changing
* Improved behavior for configuring and running remote jobs
* Provisioning improvements
* New error signaling unsupported options in TASK-Filter
* Virt-who configuration enhanced to support Nutanix AHV
* Cloud Connector configuration updated
* Improved Insights adoption
The items above are not a complete list of changes. This update also fixes
several bugs and adds various enhancements. Documentation for these changes
is available from the Release Notes document linked to in the References
section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Satellite is a systems management tool for Linux-based
infrastructure. It allows for provisioning, remote management, and
monitoring of multiple Linux deployments with a single centralized tool.
Security Fix(es):
* libsolv: Heap-based buffer overflow in testcase_read() in src/testcase.c (CVE-2021-3200)
* satellite: foreman: Authenticate remote code execution through Sendmail configuration (CVE-2021-3584)
* candlepin: Allow unintended SCA certificate to authenticate Candlepin (CVE-2021-4142)
* candlepin: netty: Information disclosure via the local system temporary directory (CVE-2021-21290)
* candlepin: netty: Possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)
* candlepin: netty: Request smuggling via content-length header (CVE-2021-21409)
* tfm-rubygem-sidekiq: XSS via the queue name of the live-poll feature (CVE-2021-30151)
* python-sqlparse: ReDoS via regular expression in StripComments filter (CVE-2021-32839)
* libsolv: various flaws (CVE-2021-33928 CVE-2021-33929 CVE-2021-33930 CVE-2021-33938)
* tfm-rubygem-puma: Inconsistent Interpretation of HTTP Requests in puma (CVE-2021-41136)
* logback-classic: Remote code execution through JNDI call from within its configuration file (CVE-2021-42550)
* candlepin: netty: Control chars in header names may lead to HTTP request smuggling (CVE-2021-43797)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python3-django: Potential bypass of an upstream access control based on URL paths (CVE-2021-44420)
* libsolv: Heap overflow (CVE-2021-44568)
* python3-django: Various flaws (CVE-2021-45115 CVE-2021-45116 CVE-2021-45452 CVE-2022-22818)
* tfm-rubygem-actionpack: Information leak between requests (CVE-2022-23633)
* tfm-rubygem-puma: rubygem-rails: Information leak between requests (CVE-2022-23634)
* python3-django: Denial-of-service possibility in file uploads (CVE-2022-23833)
* tfm-rubygem-sidekiq: WebUI Denial of Service caused by number of days on graph (CVE-2022-23837)
* python3-django: Various flaws (CVE-2022-28346 CVE-2022-28347)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
* New repo layout for Satellite, Utils, Maintenance, and Client repos.
* Support for Rocky Linux 9 clients
* Module-based installation on Rocky Linux 8
* Upgrading Satellite Server and Capsule Server installations from Rocky Linux 7 to Rocky Linux 8
* Connected and Disconnected servers supported on Rocky Linux 7 and Rocky Linux 8
* Inter-Server Synchronization improvements
* Puppet integration optional and disabled by default
* Pulp 3 updated to Python 3.8
* Change to Capsule certificate archive
* New default port for communication with Rocky Enterprise Software Foundation Subscription Management * (RHSM) API on Capsule servers
* New Content Views Page (Content Publication workflow simplification)
* New Hosts Page (Technology Preview)
* Registration and preview templates
* Simplified host content source changing
* Improved behavior for configuring and running remote jobs
* Provisioning improvements
* New error signaling unsupported options in TASK-Filter
* Virt-who configuration enhanced to support Nutanix AHV
* Cloud Connector configuration updated
* Improved Insights adoption
The items above are not a complete list of changes. This update also fixes
several bugs and adds various enhancements. Documentation for these changes
is available from the Release Notes document linked to in the References
section.
rocky-linux-8-x86-64-powertools-rpms
libdb-cxx-5.3.28-42.el8_4.x86_64.rpm
cf736b0b588c375926cac5720eaf0b5c12a03396fdd0702b30c45778c299d5da
RLSA-2022:5809
Moderate: pcre2 security update
The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.
Security Fix(es):
* pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pcre2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.
Security Fix(es):
* pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
pcre2-tools-10.32-3.el8_6.x86_64.rpm
57d4ede3f1df3f4b0e9ad776e60869ebdfec4b9d033e7a96398e2119993a74e4
RLBA-2022:5815
bash bug fix and enhancement update
The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux.
Bug Fix(es) and Enhancement(s):
* Segfault in 'buffered_getchar()' function in bash (BZ#2097659)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux.
Bug Fix(es) and Enhancement(s):
* Segfault in 'buffered_getchar()' function in bash (BZ#2097659)
rocky-linux-8-x86-64-powertools-rpms
bash-devel-4.4.20-4.el8_6.x86_64.rpm
844e7b305035f1e3e1b64f77c1c016684e74e85c58e6fc6bb9c7d4e7e1c1b6dc
RLSA-2022:7089
Important: libksba security update
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow may lead to remote code execution (CVE-2022-3515)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libksba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow may lead to remote code execution (CVE-2022-3515)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libksba-devel-1.3.5-8.el8_6.x86_64.rpm
596312ded83140c492cd15da7e9cbe3342c4dfc783de66601b320d4cb954e322
RLBA-2022:7107
glib2 bug fix and enhancement update
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Bug Fix(es) and Enhancement(s):
* Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Bug Fix(es) and Enhancement(s):
* Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615)
rocky-linux-8-x86-64-powertools-rpms
glib2-doc-2.56.4-158.el8_6.1.noarch.rpm
aa64cb9e557a147c0ba86aef7701e556397a660ebaa7822bdc19c57b448ee3f0
glib2-static-2.56.4-158.el8_6.1.x86_64.rpm
6227fcea57978647be3169b9610d7d1f26e0106aa3fcfda58fceac58218ab411
RLBA-2022:7116
libsemanage bug fix and enhancement update
The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings.
Bug Fix(es) and Enhancement(s):
* libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings.
Bug Fix(es) and Enhancement(s):
* libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139)
rocky-linux-8-x86-64-powertools-rpms
libsemanage-devel-2.9-9.el8.x86_64.rpm
3b309975209093583f7e85fa97ef6ebd90775dc71bca15add81205f248428791
RLBA-2022:7682
babeltrace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for babeltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libbabeltrace-devel-1.5.4-4.el8.x86_64.rpm
d00291636f6382afa86e163e231d179d10c9e70c4a0f1940df7b790882fd02bb
python3-babeltrace-1.5.4-4.el8.x86_64.rpm
c4dff5bf4b76d10fea887ed56e5846e80dd8bd4844020d2d9a0709dd60d4e043
RLSA-2022:7683
Moderate: kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)
* race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558)
* use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
* memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002)
* smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168)
* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)
* uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)
* race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)
* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)
* use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)
* NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)
* buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)
* nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
* openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
* use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938)
* net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)
* possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
* Spectre-BHB (CVE-2022-23960)
* Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
* memory leak in drivers/hid/hid-elo.c (CVE-2022-27950)
* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)
* use after free in SUNRPC subsystem (CVE-2022-28893)
* use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)
* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)
* nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)
* race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558)
* use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
* memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002)
* smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168)
* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)
* uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)
* race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)
* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)
* use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)
* NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)
* buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)
* nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
* openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
* use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938)
* net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)
* possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
* Spectre-BHB (CVE-2022-23960)
* Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
* memory leak in drivers/hid/hid-elo.c (CVE-2022-27950)
* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)
* use after free in SUNRPC subsystem (CVE-2022-28893)
* use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)
* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)
* nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
kernel-tools-libs-devel-4.18.0-425.3.1.el8.x86_64.rpm
8cc554311d3d2340eed11c83d932636ac1b1de3cb6d41ef5968acab86002b3a1
RLBA-2022:7684
glibc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
glibc-benchtests-2.28-211.el8.x86_64.rpm
d8ea288d97e0f5484bcdf961fc6a14c93878a875625c4bee5b9a8e4bab0c7ff5
glibc-nss-devel-2.28-211.el8.x86_64.rpm
9ad2d64dca61f1ba8be1934bccd94abccd7e84321d84eaf392f1afd64cfc1065
glibc-static-2.28-211.el8.x86_64.rpm
7fa5900087a19e28ede7a2990ebc4b071da71db650a3717c98074324d4453b3c
nss_hesiod-2.28-211.el8.x86_64.rpm
e658a020ab7fd2893ca9e84a67c756bb38cd2677183a7b531144e87d87aaa8b8
RLBA-2022:7688
gcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gcc-plugin-devel-8.5.0-15.el8.x86_64.rpm
c4a26671473d5a49658ddd47c8f149e15307f5539ff97caf37d31843808304f7
libstdc++-static-8.5.0-15.el8.x86_64.rpm
7c7e9421f7f4d34479c5dfe11f647a4aafad18f2dc7088dc4a2d9d6b1b617504
RLBA-2022:7689
accel-config bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for accel-config.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
accel-config-devel-3.4.6.3-1.el8.x86_64.rpm
e34842b9ce1fe5617085d6b78be88ac0984f3eb382678ca6ef8eeb3d75901459
RLSA-2022:7692
Moderate: xmlrpc-c security update
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)
* expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)
* expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)
* expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)
* expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)
* expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)
* expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xmlrpc-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)
* expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)
* expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)
* expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)
* expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)
* expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)
* expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
xmlrpc-c-c++-1.51.0-8.el8.x86_64.rpm
4cb43c89d8443572ccba99d30a52b16903cffbbb0cada967aeac454536483adf
xmlrpc-c-client++-1.51.0-8.el8.x86_64.rpm
3d83423f1af01ece22e402ff49d6954b4155ebdf4c9454d6ba6a7c0bcae8a6a3
xmlrpc-c-devel-1.51.0-8.el8.x86_64.rpm
b40f1d2272acbe688e27519b4ee13f6895d6af7025c58b10d1e5f67c7b35dea9
RLBA-2022:7698
samba bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libsmbclient-devel-4.16.4-2.el8.x86_64.rpm
816a339e1fd62b999499e6200d9c2818cb5188faacc648b5b104552be96c70f5
libwbclient-devel-4.16.4-2.el8.x86_64.rpm
7b3f385448b9e517f94da2b250df484a79f06110a0e93fdbe1a44a434a4dd284
samba-devel-4.16.4-2.el8.x86_64.rpm
434c736e5304a61e61edcf86d6b112b4641ba64554018c27e552f2d12bae76a8
RLBA-2022:7707
nftables bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
nftables-devel-0.9.3-26.el8.x86_64.rpm
b9e61f33cf37bce5032bf4da2401a50ec3370e478eae82d1e14724d4851236cd
RLBA-2022:7711
libdnf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libdnf-devel-0.63.0-11.1.el8.x86_64.rpm
021428a44d145684833940de20027a0d1e48925011c1871a56e37e9c98493e46
RLBA-2022:7713
libsolv bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libsolv-devel-0.7.20-3.el8.x86_64.rpm
7b70f8e4aa0b0e9ec004b5c77050075c6fa62b9c5c267006f6c33a8c45852730
libsolv-tools-0.7.20-3.el8.x86_64.rpm
5b6c1f5a8de76005c5930ae1ad6dd4507626659c71ed8cdbd5de1dac07c3dbb6
RLBA-2022:7714
device-mapper-multipath bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
device-mapper-multipath-devel-0.8.4-28.el8.x86_64.rpm
3378b75fb3bb938262a1f3b5dd3cdf146e1eb3d1c5841e21f3d76001d4b3b597
RLBA-2022:7717
elfutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
elfutils-devel-static-0.187-4.el8.x86_64.rpm
e6ef74d29e23463c1c6d57e0439d75a1b9cf1602c4f057ad6fc7aadd95a51754
elfutils-libelf-devel-static-0.187-4.el8.x86_64.rpm
eba652f151b11f3a89a66f6e6d5ac0bb1e78ff0e6f812dcbd8bb23ae82b670f7
RLSA-2022:7720
Moderate: e2fsprogs security and bug fix update
The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems.
Security Fix(es):
* e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for e2fsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems.
Security Fix(es):
* e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libss-devel-1.45.6-5.el8.x86_64.rpm
fc00d579b548b0d629b833b8a82c32987f6d4132ca216f722907a3a76d0c3c42
RLBA-2022:7724
zlib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
zlib-static-1.2.11-20.el8.x86_64.rpm
60c5e420faa4668e444b7323f0b4ef22fa8a0536c9a9018044a622d1180e35f6
RLBA-2022:7731
ding-libs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ding-libs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libbasicobjects-devel-0.1.1-40.el8.x86_64.rpm
0ce2c29f3dfc6fd705c96f06bd3b5a8052404201a0f63d2a2d29439aedb2de1b
libcollection-devel-0.7.0-40.el8.x86_64.rpm
c8540206be1695e437db19e2d63c1b932d6dd451e1cdf42525c618cb42772471
libini_config-devel-1.3.1-40.el8.x86_64.rpm
62274ace92c041e8ef3a5ea6feef64f70331b0a7d11cbc22a5bdfca2a854cb1b
libpath_utils-devel-0.2.1-40.el8.x86_64.rpm
5292a249e8ebbf952ec9ceec04272a4ec23113bf27d3bb25e587aa2a7fc81964
libref_array-devel-0.1.5-40.el8.x86_64.rpm
95d67fc397b29e46839a864d564a8b698e91a04eef9a7ddb49578fabe6c2493c
RLSA-2022:7730
Moderate: libldb security, bug fix, and enhancement update
The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.
The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484)
Security Fix(es):
* samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.
The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484)
Security Fix(es):
* samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
python3-ldb-devel-2.5.2-2.el8.x86_64.rpm
c3af53ecf6f76a78d370e87f826c88290225a55eff72d87c43f598afdc18fee5
python-ldb-devel-common-2.5.2-2.el8.x86_64.rpm
4c2894314e8c4d5d4e1803fade1573946f3842f4f883e8a881dbc0ba5549958a
RLBA-2022:7735
bluez bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
bluez-libs-devel-5.63-1.el8.x86_64.rpm
d0a31e25b13cef8d45bbe0618decc65408b0c49961b2683a6469fb5979b049aa
RLBA-2022:7737
opencryptoki bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
opencryptoki-devel-3.18.0-3.el8.x86_64.rpm
f2557bd5bebaa7a091645f7dd3cc583ba9e139e378e92c7c7399765ee851b827
RLBA-2022:7752
iproute bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
iproute-devel-5.18.0-1.el8.x86_64.rpm
fcf3bbd5e1a3cbbed77e7520c7fac74e0bb1b75ffcc179abac909be97784e550
RLBA-2022:7757
sg3_utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sg3_utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
sg3_utils-devel-1.44-6.el8.x86_64.rpm
97e97fc87f051e0793cee362b49794372d83c9e37d3025b9919ccfb15162b959
RLBA-2022:7767
libbpf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libbpf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libbpf-devel-0.5.0-1.el8.x86_64.rpm
edabe5705de9122a498fbb51beea48429a5c07baf36ff16172ab5f2ac0fec866
libbpf-static-0.5.0-1.el8.x86_64.rpm
d65a1501c7cd159dc778c4e216f46b7276c9542e9481a46d8e27cc51350b2606
RLBA-2022:7768
nfs-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libnfsidmap-devel-2.3.3-57.el8.x86_64.rpm
2b1d24af2c7a5101445542e5d614748dd6ae53026a2d4083b26cb4987bd6f02f
RLBA-2022:7774
sanlock bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
sanlock-devel-3.8.4-4.el8.x86_64.rpm
5755ad82fa027ed85fc981fd191c5d2879565a2dfd0f05593ef5fe814c63f3e9
RLBA-2022:7780
librepo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
librepo-devel-1.14.2-3.el8.x86_64.rpm
f3c51c6c823b7dbabed71be27516b8a7c6d7ad838c7f87fdcc197588dca221d7
RLBA-2022:7783
util-linux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libmount-devel-2.32.1-38.el8.x86_64.rpm
6855b9e3ca21e05c1a6c5ef5b4a83286af773db5f29c73f15035c2c913a08bd2
RLBA-2022:7786
libselinux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libselinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libselinux-static-2.9-6.el8.x86_64.rpm
1a46617cee57e7cb7b5d2dc6325e38ca3f74c88a57c5a6ce4dfd5a6c06b80f39
RLBA-2022:7788
libarchive bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libarchive.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libarchive-devel-3.3.3-4.el8.x86_64.rpm
24e5b4cdbcd833e5586e42f978f588fd70bc0d423411d8d09c26ef4a67e4bc41
RLBA-2022:7792
lvm2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
device-mapper-devel-1.02.181-6.el8.x86_64.rpm
1c50202905c43826e40b0c092dfd488a69f2a34fabce789f031fe3fee09e6eed
device-mapper-event-devel-1.02.181-6.el8.x86_64.rpm
baeb70958ce26bf4c2ebdeaaa2de337e1a005b8c846c948b1e619e29bd129d38
lvm2-devel-2.03.14-6.el8.x86_64.rpm
afcacda10e7f9e217ba24c97bbf96fd79fbca379f5280d075e6b90c9f850f278
RLBA-2022:7794
shadow-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for shadow-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
shadow-utils-subid-devel-4.6-17.el8.x86_64.rpm
fd67877a03332ea9b5b5eda7153a14cc6512b43e4c7dd6c1309482ba37f7af52
RLEA-2022:7797
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libfabric-devel-1.15.1-1.el8.x86_64.rpm
d5ecc4d990416bb89045e042eb977d892ad42eababfba96f5c24d603e63f791c
RLBA-2022:7800
tpm2-abrmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-abrmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
tpm2-abrmd-devel-2.3.3-3.el8.x86_64.rpm
ee49f6a365703c595c173c0fca9a2148fb5afb21d713f35fb2fe56b587ac754e
RLBA-2022:7802
liblockfile bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liblockfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
liblockfile-devel-1.14-2.el8.x86_64.rpm
2b9f29dab011a911bd23f424e71a07c0936b0d95a7d5e7c04b1f7c2ae8aaa118
RLBA-2022:7803
libtalloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtalloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
python3-talloc-devel-2.3.3-2.el8.x86_64.rpm
7195d505efe37a47e5b52b0a71ab66b71f1a9b7bebf7d95c0c7a89ed9bea0e60
RLBA-2022:7804
libsemanage bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libsemanage-devel-2.9-9.el8.x86_64.rpm
3b309975209093583f7e85fa97ef6ebd90775dc71bca15add81205f248428791
RLBA-2022:7808
file bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for file.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
file-devel-5.33-21.el8.x86_64.rpm
04d26c78b1ab2d0322a554cfa178526ef909e5cd577bc5970e409487fb80bd49
RLBA-2022:7809
libpwquality bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpwquality.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libpwquality-devel-1.4.4-5.el8.x86_64.rpm
d9a6321599443187658562beacc635266726c83d6310709ed453a301a8f7331c
RLBA-2022:7828
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Host ip changed when start vm (BZ#2132285)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Host ip changed when start vm (BZ#2132285)
rocky-linux-8-x86-64-powertools-rpms
NetworkManager-libnm-devel-1.40.0-2.el8_7.x86_64.rpm
f6ab8988cb8e197e63d51a45e86798afa2eae0bc63ef44e3f7ef9167885a5f7f
RLBA-2022:7829
sssd bug fix and enhancement update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544)
rocky-linux-8-x86-64-powertools-rpms
libsss_nss_idmap-devel-2.7.3-4.el8_7.1.x86_64.rpm
d1deb446dcde3bfb1432c47d870ff5cf89dcc4ad0ff0b475955272a47f2d1a3b
RLSA-2022:7928
Important: device-mapper-multipath security update
The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.
Security Fix(es):
* device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.
Security Fix(es):
* device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
device-mapper-multipath-devel-0.8.4-28.el8_7.1.x86_64.rpm
52542115b9311da7aa2eec9cc8313a1b80eca456ca2f0e6042c1446d52676b0a
RLSA-2022:8506
Important: Satellite 6.12 Release
Rocky Enterprise Software Foundation Satellite is a systems management tool for Linux-based
infrastructure. It allows for provisioning, remote management, and
monitoring of multiple Linux deployments with a single centralized tool.
Security Fix(es):
* netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136)
* netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)
* python3-django: Possible XSS via template tag (CVE-2022-22818)
* tfm-rubygem-nokogiri: ReDoS in HTML encoding detection (CVE-2022-24836)
* tfm-rubygem-sinatra: Path traversal possible outside of public_dir when serving static files (CVE-2022-29970)
* tfm-rubygem-git: Package vulnerable to Command Injection via git argument injection (CVE-2022-25648)
* rubygem-rails-html-sanitizer: Possible XSS with certain configurations (CVE-2022-32209)
* python3-django: Potential SQL injection via Trunc and Extract arguments (CVE-2022-34265)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
The items above are not a complete list of changes. This update also fixes
several bugs and adds various enhancements. Documentation for these changes
is available from the Release Notes document.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Satellite is a systems management tool for Linux-based
infrastructure. It allows for provisioning, remote management, and
monitoring of multiple Linux deployments with a single centralized tool.
Security Fix(es):
* netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136)
* netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)
* python3-django: Possible XSS via template tag (CVE-2022-22818)
* tfm-rubygem-nokogiri: ReDoS in HTML encoding detection (CVE-2022-24836)
* tfm-rubygem-sinatra: Path traversal possible outside of public_dir when serving static files (CVE-2022-29970)
* tfm-rubygem-git: Package vulnerable to Command Injection via git argument injection (CVE-2022-25648)
* rubygem-rails-html-sanitizer: Possible XSS with certain configurations (CVE-2022-32209)
* python3-django: Potential SQL injection via Trunc and Extract arguments (CVE-2022-34265)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
The items above are not a complete list of changes. This update also fixes
several bugs and adds various enhancements. Documentation for these changes
is available from the Release Notes document.
rocky-linux-8-x86-64-powertools-rpms
libdb-cxx-5.3.28-42.el8_4.x86_64.rpm
cf736b0b588c375926cac5720eaf0b5c12a03396fdd0702b30c45778c299d5da
RLBA-2022:9028
libsolv bug fix and enhancement update
The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm.
Bug Fix(es) and Enhancement(s):
* Transaction picks old build to satisfy dependencies (BZ#2151895)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm.
Bug Fix(es) and Enhancement(s):
* Transaction picks old build to satisfy dependencies (BZ#2151895)
rocky-linux-8-x86-64-powertools-rpms
libsolv-devel-0.7.20-4.el8_7.x86_64.rpm
787ea51bf9b49eb9fcf12dff1e530b1ab7f99301755f45f9780c0d191eaf3fe8
libsolv-tools-0.7.20-4.el8_7.x86_64.rpm
00931441f124736ccf08e461333daa305bff8dde67f15f2c169916bb093d3cdd
RLBA-2023:0086
opencryptoki bug fix and enhancement update
The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059)
rocky-linux-8-x86-64-powertools-rpms
opencryptoki-devel-3.18.0-5.el8_7.x86_64.rpm
f8b5b59b4c42c9a304a4538fc466ecb563eaabcd6128a3cf0d4cd1f32fa5e723
RLBA-2023:0090
zlib bug fix and enhancement update
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336)
rocky-linux-8-x86-64-powertools-rpms
zlib-static-1.2.11-21.el8_7.x86_64.rpm
fcb13a7d6970816360df953e34da60107d58ab46e54ee4b0eacbe06eac6345da
RLBA-2023:0098
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* crio occasionally fails to start during deployment (BZ#2132281)
* DNS servers are not sorted according to priority in resolv.conf (BZ#2135733)
* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891)
* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* crio occasionally fails to start during deployment (BZ#2132281)
* DNS servers are not sorted according to priority in resolv.conf (BZ#2135733)
* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891)
* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429)
rocky-linux-8-x86-64-powertools-rpms
NetworkManager-libnm-devel-1.40.0-5.el8_7.x86_64.rpm
d98d89c0b3e798b94bbaabfbed62c0c9bf12a22521fcdf7b0deb52ce6f9d1af4
RLSA-2023:0101
Important: kernel security and bug fix update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849)
* vfio zero page mappings fail after 2M instances (BZ#2128515)
* ice: Driver Update up to 5.19 (BZ#2130992)
* atlantic: missing hybernate/resume fixes (BZ#2131935)
* Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084)
* Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813)
* ice: Intel E810 PTP clock glitching (BZ#2136036)
* ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216)
* ice: dump additional CSRs for Tx hang debugging (BZ#2136513)
* ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270)
* After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157)
* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205)
* WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953)
* DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216)
* Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152)
* Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878)
* mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957)
* net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017)
* Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583)
* AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218)
* Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374)
* net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130)
* iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081)
* Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742)
* Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912)
* Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849)
* vfio zero page mappings fail after 2M instances (BZ#2128515)
* ice: Driver Update up to 5.19 (BZ#2130992)
* atlantic: missing hybernate/resume fixes (BZ#2131935)
* Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084)
* Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813)
* ice: Intel E810 PTP clock glitching (BZ#2136036)
* ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216)
* ice: dump additional CSRs for Tx hang debugging (BZ#2136513)
* ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270)
* After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157)
* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205)
* WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953)
* DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216)
* Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152)
* Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878)
* mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957)
* net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017)
* Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583)
* AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218)
* Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374)
* net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130)
* iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081)
* Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742)
* Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912)
* Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206)
rocky-linux-8-x86-64-powertools-rpms
kernel-tools-libs-devel-4.18.0-425.10.1.el8_7.x86_64.rpm
51f2fc3580cf373e22a17c036858a4648a8edc7385c85a9e12cc1822a6291682
RLBA-2023:0105
util-linux bug fix and enhancement update
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252)
rocky-linux-8-x86-64-powertools-rpms
libmount-devel-2.32.1-39.el8_7.x86_64.rpm
1c807988df1b5c20a31fae4f8aa4f8c8e3d8c680ca577d5341fd22a4f88f95b1
RLBA-2023:0106
gcc bug fix and enhancement update
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075)
rocky-linux-8-x86-64-powertools-rpms
gcc-plugin-devel-8.5.0-16.el8_7.x86_64.rpm
2a8cb2f94d43ece0d98e479c73d922ad499f94ad193c450187062a19ffdd51f5
libstdc++-static-8.5.0-16.el8_7.x86_64.rpm
d7b2140af002c655e76651e18d114dc1200871d680195f25e2405361e9d56d41
RLBA-2023:0124
sssd bug fix and enhancement update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883)
rocky-linux-8-x86-64-powertools-rpms
libsss_nss_idmap-devel-2.7.3-4.el8_7.3.x86_64.rpm
5ae5bb594fa12024761c878f6c8dd943ba3997d02c3deb5dfa303a8d7d8ea3bd
RLSA-2019:1529
Important: pki-deps:10.6 security update
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037)
* tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014)
* tomcat: Open redirect in default servlet (CVE-2018-11784)
* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037)
* tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014)
* tomcat: Open redirect in default servlet (CVE-2018-11784)
* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm
1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9
apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm
2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29
jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm
f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e
javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0
javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3
velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm
ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8
xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm
10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1
xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm
fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78
xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm
275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630
xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm
aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522
RLSA-2019:2720
Important: pki-deps:10.6 security update
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm
1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9
apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm
2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29
jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm
f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e
javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0
javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3
velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm
ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8
xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm
10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1
xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm
fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78
xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm
275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630
xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm
aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522
RLSA-2019:2722
Low: libwmf security update
The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick.
Security Fix(es):
* gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libwmf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick.
Security Fix(es):
* gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libwmf-devel-0.2.9-8.el8_0.x86_64.rpm
481abd43d3feb0529704ab3e0dcc26f70544d0a8fcf7a6a315654115305f920e
RLEA-2019:3367
google-noto-cjk-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for google-noto-cjk-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
google-noto-sans-cjk-jp-fonts-20190416-1.el8.noarch.rpm
a0e76579364810ba3d2d252d31a1596f921074ca5c231f74257bb2585c08a59b
RLBA-2019:3411
lttng-ust bug fix and enhancement update
This update fixes two issues in lttng-ust and subpackages.
There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed.
lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lttng-ust.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This update fixes two issues in lttng-ust and subpackages.
There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed.
lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux.
rocky-linux-8-x86-64-powertools-rpms
lttng-ust-devel-2.8.1-11.el8.x86_64.rpm
3cc474cd8a36e34564c94a9cc79e2210b9809f02fa4d1ac1489743683f97b920
RLBA-2019:3416
pki-core:10.6 and pki-deps:10:6 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm
1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9
apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm
2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29
jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm
f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e
javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0
javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3
velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm
ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8
xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm
10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1
xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm
fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78
xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm
275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630
xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm
aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522
RLBA-2019:3449
new packages: gcc-toolset-9-dyninst
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter.
For detailed changes in this release, see the Rocky Linux 8.1 Release Notes.
rocky-linux-8-x86-64-powertools-rpms
gcc-toolset-9-dyninst-devel-10.1.0-1.el8.x86_64.rpm
25be7f58a2ad3243bec5ec7a5a1cb391ccb58bf13c12b931a60c13241a853f70
gcc-toolset-9-dyninst-doc-10.1.0-1.el8.x86_64.rpm
9ce3622b8685c7430a86a9d565bd7828087bb30f0d429c3e8177701300010db2
gcc-toolset-9-dyninst-static-10.1.0-1.el8.x86_64.rpm
6d6f16d7c92a605d70e58c47cfd69c28c718f8ac6de95a3a0e04348732db0db2
gcc-toolset-9-dyninst-testsuite-10.1.0-1.el8.x86_64.rpm
06fee52368438078977d5ba569d1a16b4603cc5fa9882bc470fcb05187f332e9
RLBA-2019:3462
libcdio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcdio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libcdio-devel-2.0.0-3.el8.x86_64.rpm
2f7b391e51e204ac8354d9adebe507119481a1c5f44a932fffd9ebb0bcf42758
RLBA-2019:3490
ldns bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ldns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ldns-devel-1.7.0-21.el8.x86_64.rpm
fd347da61725a1c70cd72ba719c9a9e80a2c4ac14e8f90daeb3fd44c5ef018e0
RLEA-2019:3557
libtalloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cmocka, nss_wrapper, uid_wrapper, socket_wrapper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libcmocka-1.1.5-1.el8.x86_64.rpm
eee28e8ec3b991b4493ef9143691fab3b83c58acfcc4c034d028e6646621d81a
libcmocka-devel-1.1.5-1.el8.x86_64.rpm
9a234ea9270da7660f61405fd41c1413004b0b00a88a8f29d3c1c61ee830885e
socket_wrapper-1.2.3-1.el8.x86_64.rpm
2ddf17622f2e3d468a7eef994f9904f166dcd7630781dd2b810854dd221df59c
uid_wrapper-1.2.4-4.el8.x86_64.rpm
511c1090950862922ede55be3e55e04f775387ae5251bd0cc2cd0db6d2a95032
RLSA-2019:3703
Low: libvorbis security update
The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates.
Security Fix(es):
* libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392)
* libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libvorbis.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates.
Security Fix(es):
* libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392)
* libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libvorbis-devel-1.3.6-2.el8.x86_64.rpm
39a5c6764e8d558798b29b9225b39dff812e03817f51b6c2692c9c180b57afaa
libvorbis-devel-docs-1.3.6-2.el8.noarch.rpm
0ec54402929c83ee0af4f575e419e9f859ae3c1f202e05ed60124210e96622b7
RLSA-2019:3708
Moderate: mariadb:10.3 security and bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358)
Security Fix(es):
* mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510)
* mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537)
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628)
* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739)
* mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758)
* mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for asio, Judy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358)
Security Fix(es):
* mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510)
* mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537)
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628)
* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739)
* mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758)
* mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__mariadb-devel
asio-devel-1.10.8-7.module+el8.5.0+777+18007c86.x86_64.rpm
5187c3c76d35c482b55726598b3c290b9641f4f86bc340a1b69d561588041f39
RLSA-2020:1577
Moderate: exiv2 security, bug fix, and enhancement update
The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)
Security Fix(es):
* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)
* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)
* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)
* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)
* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)
* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)
* exiv2: information leak via a crafted file (CVE-2018-11037)
* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)
* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)
* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)
* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)
* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)
* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)
* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)
* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)
* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)
* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)
* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)
* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)
* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)
* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)
* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)
* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)
* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)
* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)
* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)
* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libgexiv2, gnome-color-manager, gegl, exiv2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)
Security Fix(es):
* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)
* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)
* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)
* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)
* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)
* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)
* exiv2: information leak via a crafted file (CVE-2018-11037)
* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)
* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)
* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)
* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)
* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)
* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)
* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)
* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)
* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)
* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)
* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)
* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)
* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)
* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)
* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)
* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)
* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)
* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)
* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)
* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libgexiv2-devel-0.10.8-4.el8.x86_64.rpm
c7351f9ff7b1f78bd32bca1e16ca81993842cc132ad241ef0c0ac8930f8297fb
RLEA-2020:1607
http-parser bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for http-parser.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
http-parser-devel-2.8.0-9.el8.x86_64.rpm
4251a3fda6ed074886adf31fb7bcddf8dceb378d7765417de9b39540f885daa0
RLEA-2020:1611
input stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xkeyboard-config, libevdev, libxkbcommon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libxkbcommon-x11-devel-0.9.1-1.el8.x86_64.rpm
cd19e2270c9d0e36f669b704af16da94c2f944fdbf8810e3034ab54f98fa86ab
RLSA-2020:1616
Low: irssi security update
Irssi is a modular IRC client with Perl scripting.
Security Fix(es):
* irssi: use after free when sending SASL login to server (CVE-2019-13045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for irssi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Irssi is a modular IRC client with Perl scripting.
Security Fix(es):
* irssi: use after free when sending SASL login to server (CVE-2019-13045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
irssi-devel-1.1.1-3.el8.x86_64.rpm
00db89f6a03e417ebf72e13306b6dabf386e41aa1bb52c8934e73e94fd33e04e
RLBA-2020:1617
pmdk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pmdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libpmemblk-debug-1.6.1-1.el8.x86_64.rpm
27f9f27d53da4c09a58d09cce05c8d5585a3879b5930e42f57134e9b30ee0bf1
libpmem-debug-1.6.1-1.el8.x86_64.rpm
93caee38effdd15edf3bde3cd07fa93d376880864638d16af40864ae52ead1d5
libpmemlog-debug-1.6.1-1.el8.x86_64.rpm
241224a3f0537fdee13950f64705e3bdb7880abfb95115117099e3d6fd060e75
libpmemobj-debug-1.6.1-1.el8.x86_64.rpm
9f0f42fd9a950429ca81222800b41c5024cd2826b593980f01c27c8590212053
libpmempool-debug-1.6.1-1.el8.x86_64.rpm
f577702ae850a2c8ba416c89ac5ffbebc4dd2f0ac7997c76da79809f4ffe4502
librpmem-debug-1.6.1-1.el8.x86_64.rpm
d9ac3a971c84938d3857263b23d433e0ba5fbd177d24343e8292f8dc0dbbcd26
libvmem-debug-1.6.1-1.el8.x86_64.rpm
26ef14d42be534b7aaa40950cd94caff8e3d78fd68a1b61c8073e7ad5dd60ca1
libvmmalloc-debug-1.6.1-1.el8.x86_64.rpm
7d0f02015820202ac841496d74622450b23ca65fb55d81adf7b89e85eb5c94a2
RLBA-2020:1622
python-greenlet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-greenlet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
python3-greenlet-devel-0.4.13-4.el8.x86_64.rpm
d7d397426c1297dcf75e61c1d748796a2d35f7aec558124d12cbe0746b8cf44f
RLSA-2020:1631
Low: GStreamer, libmad, and SDL security, bug fix, and enhancement update
The GStreamer library provides a streaming media framework based on graphs of media data filters.
The libmad package is an MPEG audio decoder capable of 24-bit output.
Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.
Security Fix(es):
* libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libmad, gstreamer1-plugins-ugly-free, gstreamer1-plugins-bad-free, SDL2, orc, gstreamer1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GStreamer library provides a streaming media framework based on graphs of media data filters.
The libmad package is an MPEG audio decoder capable of 24-bit output.
Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.
Security Fix(es):
* libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gstreamer1-plugins-bad-free-devel-1.16.1-1.el8.x86_64.rpm
8caca4ead49406bbaffdc25c059c7a30edaef7a3e11b8e8cc92156df79e15c6a
libmad-devel-0.15.1b-25.el8.x86_64.rpm
a0d5fd453c6cf1fa4675e091e54e8205d7ce9ae190200bee009ca4027e47446c
SDL2-2.0.10-2.el8.x86_64.rpm
aaac7c83a4ceef6f5c8913ab096f61eb5c84855ea10ae8f0a43a756bf6a74358
SDL2-devel-2.0.10-2.el8.x86_64.rpm
ce4ac1e284814258b75d1106c9e3735166d9420437dca3f9b80f1bc12f89f18b
SDL2-static-2.0.10-2.el8.x86_64.rpm
cbc7c59cf338e914ee8e5b14e52668047dc7d672704b6df5ee05141098a9762f
RLBA-2020:1633
xorg X11 server and driver bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libepoxy, wayland, libxcb, mesa-libGLw, wayland-protocols, libXpm, xorg-x11-drv-libinput, pixman, xorg-x11-drv-wacom.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
xorg-x11-drv-libinput-devel-0.29.0-1.el8.x86_64.rpm
429c2e5c4a6b20a19cb3e6b120d265277fc9629174e4df042b652e70c56a9af3
xorg-x11-drv-wacom-devel-0.38.0-1.el8.x86_64.rpm
a2a05bbe70a2b7160850c721ab6e6a6d4d137e9d3add6a0425bff30072b72ef7
RLSA-2020:1644
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540)
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)
* jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942)
* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943)
* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jackson-core, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, jackson-annotations, jackson-databind, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540)
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)
* jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942)
* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943)
* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm
1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9
apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm
2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29
jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm
f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e
javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0
javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3
velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm
ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8
xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm
10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1
xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm
fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78
xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm
275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630
xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm
aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522
RLSA-2020:1686
Low: libmspack security and bug fix update
The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.
Security Fix(es):
* libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libmspack.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.
Security Fix(es):
* libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libmspack-devel-0.7-0.3.alpha.el8.4.x86_64.rpm
2458522593e9ac1a4dea66e4a773ee44229bd20d5f17a9b4d9d5696ff7cc5159
RLEA-2020:1694
new module: python38:3.8
This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-more-itertools, pytest, python-psycopg2, python-urllib3, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python-asn1crypto, python-py, python-chardet, python-markupsafe, python-pluggy, Cython, python-psutil, python-wcwidth, babel, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329)
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__python38-devel
python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313
python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6
python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm
a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef
python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be
python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8
python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1
python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm
9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4
python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86
python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm
b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d
RLBA-2020:1723
parfait:0.5 bug fix update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for uom-parent, parfait, uom-systems, uom-se, si-units, uom-lib, unit-api, log4j12.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
log4j12-1.2.17-22.module+el8.3.0+74+855e3f5d.noarch.rpm
9961be644ddb26496002a814c140467e745ae1f78f8d2c45821b6ed204c8d895
log4j12-javadoc-1.2.17-22.module+el8.3.0+74+855e3f5d.noarch.rpm
741bc047281e2b80e32525a1edead2b0bdf377079a04e68d11e69259af00e18e
RLBA-2020:1743
librevenge bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librevenge.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
librevenge-devel-0.0.4-12.el8.x86_64.rpm
7c5a344fb67de4664e80d56db30ef68fae05feeb209e859b127354008f08ba06
RLSA-2020:4629
Moderate: libvpx security update
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126)
* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232)
* libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371)
* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libvpx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126)
* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232)
* libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371)
* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libvpx-devel-1.7.0-8.el8.x86_64.rpm
42cc29b42d68ba1fdaf62c305e95655e3f08893108479fc45ddc8ad678c04e1d
RLBA-2020:4658
munge bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for munge.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
munge-devel-0.5.13-2.el8.x86_64.rpm
1132f36538f51a5a9b8e8ee7669c81957db62c8cc62892f5c5e77635c01d825b
RLBA-2020:4678
tog-pegasus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tog-pegasus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
tog-pegasus-devel-2.14.1-46.el8.x86_64.rpm
d106ebf60ea5c3814e7d75a8b9b0df3e0f54196a419f9a4fc7fcd0d058a123e0
RLEA-2020:4700
createrepo_c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for drpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
drpm-devel-0.4.1-3.el8.x86_64.rpm
837a611293825d704d3c86daba09ff03e421bf458abe70b173dfd429ceb8b110
RLSA-2020:4847
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* bootstrap: XSS in the data-target attribute (CVE-2016-10735)
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
* jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
* pki: Dogtag's python client does not validate certificates (CVE-2020-15720)
* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146)
* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179)
* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221)
* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* bootstrap: XSS in the data-target attribute (CVE-2016-10735)
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
* jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
* jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
* pki: Dogtag's python client does not validate certificates (CVE-2020-15720)
* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146)
* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179)
* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221)
* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm
1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9
apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm
2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29
apache-commons-net-3.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm
0fd615658b7f48a1545a730d3142ba3c125727c552f69733e20d0c75633e7743
jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm
f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e
javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0
javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3
velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm
ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8
xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm
10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1
xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm
fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78
xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm
275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630
xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm
aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522
RLEA-2020:4742
userspace graphics, xorg-x11, and mesa bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libXft, xorg-x11-xkb-utils, xorg-x11-xtrans-devel, xorg-x11-drv-intel, libvdpau, libxkbfile, libXxf86dga, libXau, libXrandr, xorg-x11-proto-devel, xorg-x11-util-macros, libXext, libXi, libXdmcp, libXmu, libXvMC, mesa-demos, xorg-x11-drv-ati.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libvdpau-devel-1.4-2.el8.x86_64.rpm
0e80529ff0a76b61f9ba58affbfdfb6c11a8f96c9090596412d983d573096bd5
libXdmcp-devel-1.1.3-1.el8.x86_64.rpm
17bc999f9dc4c974658f835891fcbb50c0594b5a5fd18280c50ce8f8d88c9df2
libxkbfile-devel-1.1.0-1.el8.x86_64.rpm
c9528fea28ab82cd047809954ccd123349d1a017d2b8c20464e01da4a0606594
libXvMC-devel-1.0.12-1.el8.x86_64.rpm
8fa4bcb83469c4dcc02c0e13d492faf83da055f331a8d99e0f7168f760a7f456
xorg-x11-util-macros-1.19.2-1.el8.noarch.rpm
cc9c2966178ea156cd7345951bc4620e234bc546bddaedbb6ffdc59aa502aa64
xorg-x11-xkb-utils-devel-7.7-28.el8.x86_64.rpm
5aada8ac744bf05c212e223fe314fd4e6a11b2afa63f95ee8f8f266876ea1c80
RLBA-2020:4773
libgit2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgit2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libgit2-devel-0.26.8-2.el8.x86_64.rpm
8aa4c57dd3411d756d1b5413a2b1f92cea011f865154a5bd9d757513af36233b
RLSA-2020:4827
Moderate: oniguruma security update
Oniguruma is a regular expressions library that supports a variety of character encodings.
Security Fix(es):
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for oniguruma.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Oniguruma is a regular expressions library that supports a variety of character encodings.
Security Fix(es):
* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
oniguruma-devel-6.8.2-2.el8.x86_64.rpm
6babe63aa4aadf8563387b56c0fd7352fd0a71829f5b35af36d1ce75021669ca
RLBA-2020:4832
torque bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for torque.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
torque-4.2.10-25.el8.x86_64.rpm
c783e9247f1188ce2b7061fb4e2f96813de191d01c7b8b44d41205fc5c2ae430
torque-devel-4.2.10-25.el8.x86_64.rpm
f6574a0385db5c9c8eb1d49be390a76ae31c456b1d00930e7807cfe414409989
RLBA-2020:4834
new packages: gcc-toolset-10-systemtap
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc-toolset-9-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection.
This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8.
For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter.
For detailed changes in this release, see the Rocky Linux 8.3 Release Notes.
rocky-linux-8-x86-64-powertools-rpms
gcc-toolset-9-gcc-plugin-devel-9.2.1-2.3.el8.x86_64.rpm
f94984ce4db107b7d91806dd22c8eac9c3da58117164e220084fe316c2c734d0
RLSA-2020:5393
Important: libexif security update
The libexif packages provide a library for extracting extra information from image files.
Security Fix(es):
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libexif.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libexif packages provide a library for extracting extra information from image files.
Security Fix(es):
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libexif-devel-0.6.22-5.el8_3.x86_64.rpm
23859001acab3eba827a20b15cc772a3f2392ae2247807f07d219a4e4ac2dec6
RLSA-2021:1242
Important: mariadb:10.3 and mariadb-devel:10.3 security update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32).
Security Fix(es):
* mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for Judy, asio, mariadb, galera.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32).
Security Fix(es):
* mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms__mariadb-devel
asio-devel-1.10.8-7.module+el8.5.0+777+18007c86.x86_64.rpm
5187c3c76d35c482b55726598b3c290b9641f4f86bc340a1b69d561588041f39
RLBA-2021:1765
brltty bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for brltty.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
brlapi-devel-0.6.7-32.el8.x86_64.rpm
838e8ca4dedf62cf97d26f82e2b09257f5ecd1427751ea935323cd33220a814d
RLSA-2021:1775
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm
1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9
apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm
2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29
apache-commons-net-3.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm
0fd615658b7f48a1545a730d3142ba3c125727c552f69733e20d0c75633e7743
jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm
f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e
javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0
javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3
velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm
ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8
xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm
10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1
xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm
fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78
xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm
275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630
xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm
aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522
RLSA-2021:1789
Moderate: gssdp and gupnp security update
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP.
The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928)
Security Fix(es):
* hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gssdp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP.
The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928)
Security Fix(es):
* hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gssdp-devel-1.0.5-1.el8.x86_64.rpm
d4bbf56fa34cba0393f1216625f4e534d2c328326c17b9907b0e63cc7039b2cd
gssdp-docs-1.0.5-1.el8.noarch.rpm
bdafd56ed53b0ceea90602bba9e077c3c9ee44a7278f44e90814d74c8ca6ad8e
RLBA-2021:1801
libgpod bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgpod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libgpod-devel-0.8.3-24.el8.x86_64.rpm
aa8f46c5961b5a4ebf0e571f19cbcc686dbc9e81ce0efbc5c6b7149103dcbab5
libgpod-doc-0.8.3-24.el8.x86_64.rpm
f3780ae72061e712d61beee20aaf880fb05a2c4b43537c700bd8ded53622fc7c
RLBA-2021:1802
gnome-bluetooth bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-bluetooth.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gnome-bluetooth-libs-devel-3.34.3-1.el8.x86_64.rpm
df73c2c5a8d6d8b112a946859f083db25d4cca44e381a2cb613ea78456d4e0ea
RLSA-2021:1811
Moderate: libvncserver security update
LibVNCServer is a C library that enables you to implement VNC server functionality into own programs.
Security Fix(es):
* libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247)
* libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839)
* libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397)
* libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405)
* libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libvncserver.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibVNCServer is a C library that enables you to implement VNC server functionality into own programs.
Security Fix(es):
* libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247)
* libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839)
* libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397)
* libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405)
* libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libvncserver-devel-0.9.11-17.el8.x86_64.rpm
ab26ed97b0092e45b1f9ee8cc88c968ea93a910e1dcea1bfc5b3f7425a47a8ca
RLBA-2021:1837
liblangtag bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liblangtag.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
liblangtag-devel-0.6.2-8.el8.x86_64.rpm
540877be09424c58d535951df06d1521b68b384b1f177222428af874a09b64f2
liblangtag-doc-0.6.2-8.el8.noarch.rpm
f43ea18bb2eaf66a6fc1097c3d708353a0a9acfbf9031191db36ba233d6eee37
liblangtag-gobject-0.6.2-8.el8.x86_64.rpm
94a9a1f1f151079b579d033c266d922c5ae028611d1d2392b471006f96f815cd
RLSA-2021:1842
Moderate: raptor2 security and bug fix update
Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples.
Security Fix(es):
* raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926)
* raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for raptor2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples.
Security Fix(es):
* raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926)
* raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
raptor2-devel-2.0.15-16.el8.x86_64.rpm
43dedd1645d8d8b77152aabdd15e9bfff99bca1e2552d507c6672e6b7973438e
RLBA-2021:1848
dconf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dconf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
dconf-devel-0.28.0-4.el8.x86_64.rpm
eb8355efa75e51704f5e1cba816ed07117563c84366676942375c8915b21ed34
RLBA-2021:1858
sendmail bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sendmail.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
sendmail-milter-devel-8.15.2-34.el8.x86_64.rpm
9a0d7fea578eee0f6b5102c4424175ccf5677f17b5f51ec32bc2bfc61ffa924e
RLEA-2021:1900
memkind bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memkind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
memkind-devel-1.10.1-1.el8.x86_64.rpm
1e2a6bf8bc658ab60fc719917cac174e3837a366f748959c529b05dbdfa5fa61
RLBA-2021:1902
uuid bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for uuid.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
uuid-devel-1.6.2-43.el8.x86_64.rpm
c3fab57562eb28f08bb495cace2ab00bcf75d68b4880fdf64b506125d24f41e1
RLBA-2021:1903
pulseaudio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pulseaudio, twolame.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
twolame-devel-0.3.13-12.el8.x86_64.rpm
8316627e7aa115e5eb43b618b19f3a8ea2dd0574aa20c7616ebc55e980d002dd
RLBA-2021:1912
ilmbase bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ilmbase.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ilmbase-devel-2.2.0-13.el8.x86_64.rpm
44192c7dad471ab2fa421190226fe4873207d4c22d049defa6fc2659a0616ef4
RLBA-2021:1914
libsmi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libsmi-devel-0.4.8-23.el8.x86_64.rpm
371ad54cfac29f89300c3fedac078d15033057eec9e036b4026dd6c9ae63e6c4
RLEA-2021:1919
new module: python39:3.9
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430)
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__python39-devel
python39-attrs-20.3.0-2.module+el8.4.0+574+843c4898.noarch.rpm
fbb8f663205787752f8a7c5a1a7dc1497d9de97321946c2f1f959b9a83e701ba
python39-Cython-0.29.21-5.module+el8.4.0+574+843c4898.x86_64.rpm
984098a65cb57d7f43523d0b2ecb2ee3d8b84ab5f9a5491b834760657560bb39
python39-iniconfig-1.1.1-2.module+el8.4.0+574+843c4898.noarch.rpm
585177d17ab59aafa2b84d8543a424a37d750a1b7d77b13d3528fba480b8178f
python39-more-itertools-8.5.0-2.module+el8.4.0+574+843c4898.noarch.rpm
783f58ba2a8c29a6be5ff43e198e37fd6a63251db3b3f2bee347fab0fb814ed0
python39-packaging-20.4-4.module+el8.4.0+574+843c4898.noarch.rpm
26959ff9006b14a57368c87762d0330e3fbfea6f3e3a635a8b19b3cf935a4e20
python39-pluggy-0.13.1-3.module+el8.4.0+574+843c4898.noarch.rpm
2f8e19389c1dae284619279fe0e20688debb67181df429c7d1ca16ba88747fda
python39-py-1.10.0-1.module+el8.4.0+574+843c4898.noarch.rpm
47b83d280a2e2d2082f269fe5971adb5e2baa0d5e53e67492a3471a844b8691f
python39-pyparsing-2.4.7-5.module+el8.4.0+574+843c4898.noarch.rpm
c30232fe2b752fc55b6f9baab39b970d7b5b95cb01abe8cf91ccea9bc0846dd0
python39-pytest-6.0.2-2.module+el8.4.0+574+843c4898.noarch.rpm
c2f636f758cd74bc1b9a16e1f42561af64af41cbfc5e7179fd204565ad051cf6
python39-wcwidth-0.2.5-3.module+el8.4.0+574+843c4898.noarch.rpm
be221a900dcb8cf7ac2f7e5660522a057fd7c0b08503b9b4ed19d9564716c881
RLSA-2021:1924
Low: spice security update
The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.
Security Fix(es):
* spice: Client initiated renegotiation denial of service (CVE-2021-20201)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for spice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.
Security Fix(es):
* spice: Client initiated renegotiation denial of service (CVE-2021-20201)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
spice-server-devel-0.14.3-4.el8.x86_64.rpm
e9847d24a2c0bf6141bfa84df4299a682bedfd5f3c37ede1c4fed24a7df16909
RLBA-2021:1942
ibus-typing-booster bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus-typing-booster.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ibus-typing-booster-tests-2.1.0-5.el8.noarch.rpm
1ac4fe22dcf12bb14596745aaa355c043f2379e91c39347ff3c3833255db8179
RLBA-2021:1948
ibus-table bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus-table.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ibus-table-devel-1.9.18-6.el8.noarch.rpm
5bc682aa187f8b6b8ce9d2bf0585b94cd324c8b97f3eb6aba7e125d09a0faafc
ibus-table-tests-1.9.18-6.el8.noarch.rpm
fc1d94b9f987c33e6ed095f0ccbc31b564362a7f806f479c1f2b559afa53cbad
RLSA-2021:2363
Important: gupnp security update
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
Security Fix(es):
* gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for gupnp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.
Security Fix(es):
* gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
gupnp-devel-1.0.6-2.el8_4.x86_64.rpm
2e7bba80b123a5897eb871379d964dfc4bbc455658f4d5780696d37d4849a230
RLSA-2021:2583
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms__python38-devel
python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313
python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6
python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm
a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef
python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be
python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8
python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1
python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm
9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4
python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86
python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm
b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d
RLSA-2021:3075
Low: libuv security update
libuv is a multi-platform support library with a focus on asynchronous I/O.
Security Fix(es):
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libuv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libuv is a multi-platform support library with a focus on asynchronous I/O.
Security Fix(es):
* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libuv-devel-1.41.1-1.el8_4.x86_64.rpm
7ff6e4cfa9af46728a3b6842b60e1af7072f582a40cf28bad24c597417575a63
RLSA-2021:4160
Moderate: python39:3.9 and python39-devel:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Information disclosure via pydoc (CVE-2021-3426)
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Information disclosure via pydoc (CVE-2021-3426)
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__python39-devel
python39-attrs-20.3.0-2.module+el8.4.0+574+843c4898.noarch.rpm
fbb8f663205787752f8a7c5a1a7dc1497d9de97321946c2f1f959b9a83e701ba
python39-Cython-0.29.21-5.module+el8.4.0+574+843c4898.x86_64.rpm
984098a65cb57d7f43523d0b2ecb2ee3d8b84ab5f9a5491b834760657560bb39
python39-iniconfig-1.1.1-2.module+el8.4.0+574+843c4898.noarch.rpm
585177d17ab59aafa2b84d8543a424a37d750a1b7d77b13d3528fba480b8178f
python39-more-itertools-8.5.0-2.module+el8.4.0+574+843c4898.noarch.rpm
783f58ba2a8c29a6be5ff43e198e37fd6a63251db3b3f2bee347fab0fb814ed0
python39-packaging-20.4-4.module+el8.4.0+574+843c4898.noarch.rpm
26959ff9006b14a57368c87762d0330e3fbfea6f3e3a635a8b19b3cf935a4e20
python39-pluggy-0.13.1-3.module+el8.4.0+574+843c4898.noarch.rpm
2f8e19389c1dae284619279fe0e20688debb67181df429c7d1ca16ba88747fda
python39-py-1.10.0-1.module+el8.4.0+574+843c4898.noarch.rpm
47b83d280a2e2d2082f269fe5971adb5e2baa0d5e53e67492a3471a844b8691f
python39-pyparsing-2.4.7-5.module+el8.4.0+574+843c4898.noarch.rpm
c30232fe2b752fc55b6f9baab39b970d7b5b95cb01abe8cf91ccea9bc0846dd0
python39-pytest-6.0.2-2.module+el8.4.0+574+843c4898.noarch.rpm
c2f636f758cd74bc1b9a16e1f42561af64af41cbfc5e7179fd204565ad051cf6
python39-wcwidth-0.2.5-3.module+el8.4.0+574+843c4898.noarch.rpm
be221a900dcb8cf7ac2f7e5660522a057fd7c0b08503b9b4ed19d9564716c881
RLBA-2021:4180
evolution, evolution-data-server, evolution-ews bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evolution, evolution-ews, evolution-mapi, evolution-data-server.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
evolution-devel-3.28.5-18.el8.x86_64.rpm
5a734d2af61c5862ea817a0269d6b2201cb894667bc91364eee5852500bd2941
RLBA-2021:4219
libinput and libevdev bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libevdev, libinput.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libevdev-devel-1.10.0-1.el8.x86_64.rpm
618b165fdee3cf4a84bc5f67fa81155a91fa3dcb32c55a21583c94c046750921
RLBA-2021:4224
libwacom bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libwacom.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libwacom-devel-1.6-3.el8.x86_64.rpm
0cc786d2701ea10f746637178a18b8628ec011f9d31d7aef606b78661ccd9549
RLSA-2021:4235
Moderate: jasper security update
JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard.
Security Fix(es):
* jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828)
* jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272)
* jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926)
* jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for jasper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard.
Security Fix(es):
* jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828)
* jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272)
* jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926)
* jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
jasper-devel-2.0.14-5.el8.x86_64.rpm
68fcf6dc499450693ab138c389fa8ffcc89840bf66414229428c41855a922916
RLEA-2021:4239
pki-core bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm
1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9
apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm
2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29
apache-commons-net-3.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm
0fd615658b7f48a1545a730d3142ba3c125727c552f69733e20d0c75633e7743
jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm
f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e
javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0
javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3
velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm
ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8
xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm
10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1
xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm
fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78
xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm
275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630
xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm
aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522
RLSA-2021:4256
Moderate: graphviz security update
Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains.
Security Fix(es):
* graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for graphviz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains.
Security Fix(es):
* graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
graphviz-devel-2.40.1-43.el8.x86_64.rpm
e1e8173e1914d82f5c3a6fa7eaf654004c000c87a1274f6e1fbd48ed95f76c0c
graphviz-doc-2.40.1-43.el8.x86_64.rpm
a0dfbd3dc216c9271181dc43ebeecbc457599800168f72dfdb228c92705f070b
graphviz-gd-2.40.1-43.el8.x86_64.rpm
531acd08da7b5412e3d4776dabf12880d63e342ebf92720ec57c50075eda290a
graphviz-python3-2.40.1-43.el8.x86_64.rpm
cb5963412954fd5c0b1ea8d6fbe37a35342d444c0c305590a101483e3b868c43
RLBA-2021:4285
libvoikko bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libvoikko.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libvoikko-devel-4.1.1-3.el8.x86_64.rpm
3b8764640cafbca51f6358f15274adf0306ce8faa90b807f21047cf08842ee78
RLEA-2021:4286
lpsolve bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lpsolve.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
lpsolve-devel-5.5.2.0-21.el8.x86_64.rpm
575756117820b4a5aa4d9f32cc1268f85247a084e65a836a2e0a1437424130c7
RLSA-2021:4288
Moderate: libjpeg-turbo security and bug fix update
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libjpeg-turbo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
turbojpeg-devel-1.5.3-12.el8.x86_64.rpm
0bd633f0e92569f88919a56bc585fd4310141a602f223601140264640815ff59
RLEA-2021:4289
sblim-gather bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sblim-gather.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
sblim-gather-provider-2.2.9-24.el8.x86_64.rpm
cf328bb559b9bc12384b98fea0d797f0ba451a444ba72fdf33ac89aa99d66316
RLSA-2021:4316
Low: zziplib security update
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for zziplib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
zziplib-devel-0.13.68-9.el8.x86_64.rpm
6bf0ded659672ca2b9e29d7e5d9c70af0d49098ea377ef252c6b38fb0f5b5556
RLEA-2021:4322
unicode-ucd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for unicode-ucd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
unicode-ucd-unihan-11.0.0-2.el8.noarch.rpm
870061428ed38494e9a2d305b81fbd430429a6e5761f94caf6537f474b0f3bf0
RLEA-2021:4335
tesseract bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tesseract.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
tesseract-devel-4.1.1-2.el8.x86_64.rpm
d537e4f4b740fb22d30d6a9ff44b4db19c1c265995c93832ed0558cd64599111
RLSA-2021:4339
Moderate: grilo security update
Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements.
Security Fix(es):
* grilo: missing TLS certificate verification (CVE-2021-39365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grilo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements.
Security Fix(es):
* grilo: missing TLS certificate verification (CVE-2021-39365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
grilo-devel-0.3.6-3.el8.x86_64.rpm
a2ea12bbbc72333e8a30ef14a3bebe660e01d60f7d6b4f4467c7edd6c17707c8
RLBA-2021:4348
brasero bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for brasero.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
brasero-devel-3.12.2-5.el8.x86_64.rpm
969d10d6ee1a2fc0cefe5eeca99b5f6fa3f9b2403fada12250254af0c822c260
RLSA-2021:4162
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-psutil: Double free because of refcount mishandling (CVE-2019-18874)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python: Information disclosure via pydoc (CVE-2021-3426)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-psutil: Double free because of refcount mishandling (CVE-2019-18874)
* python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493)
* python: Information disclosure via pydoc (CVE-2021-3426)
* python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)
* python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)
* python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)
* python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)
* python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__python38-devel
python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313
python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6
python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm
a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef
python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be
python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8
python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1
python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm
9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4
python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86
python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm
b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d
RLBA-2021:4533
ibus bug fix update
The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems.
Bug fix:
* Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems.
Bug fix:
* Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064)
rocky-linux-8-x86-64-powertools-rpms
ibus-devel-1.5.19-14.el8_5.x86_64.rpm
a5f98ea4f90e5f5144d9b8e488fd9b5cc1f7a2057b600880ea9ed5998627a40a
ibus-devel-docs-1.5.19-14.el8_5.noarch.rpm
67b3b057ac52c0ba48ad6774949daad44c1f1f14a2dbc5fafac3108532735d46
RLSA-2021:4585
Moderate: gcc-toolset-10-gcc security update
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)
The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters:
This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters.
There are three levels of warning supported by gcc:
"-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.)
"-Wbidirectional=none", which turns the warning off.
"-Wbidirectional=any", which warns about any use of bidirectional characters.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gcc-toolset-10-gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)
The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters:
This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters.
There are three levels of warning supported by gcc:
"-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.)
"-Wbidirectional=none", which turns the warning off.
"-Wbidirectional=any", which warns about any use of bidirectional characters.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
gcc-toolset-10-gcc-plugin-devel-10.3.1-1.2.el8_5.x86_64.rpm
16b03b3e767c1d93d00e842975820844cd40c642efefd4e71ce636a76cf625a2
RLSA-2022:0643
Important: python-pillow security update
The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817)
* python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python-pillow.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817)
* python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
python3-pillow-devel-5.1.1-18.el8_5.x86_64.rpm
8c12dab34ee56930c031cb88215f56b97daa4a1e4f677db8ff16f1497360952e
python3-pillow-doc-5.1.1-18.el8_5.noarch.rpm
64ec44d65dab3eb5c18b94a53711ac2b79553ff54ec1c3aec07c94e9186ab63f
python3-pillow-tk-5.1.1-18.el8_5.x86_64.rpm
df7e40a191a9673b3ed7a768697057ba9e27d4f147d4b7f89937dd158194d231
RLSA-2022:1764
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860)
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860)
Security Fix(es):
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__python38-devel
python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313
python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6
python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm
a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef
python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be
python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8
python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1
python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm
9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4
python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86
python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm
b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d
RLBA-2022:1770
evince bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evince.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
evince-devel-3.28.4-16.el8.x86_64.rpm
d3b050de94e206faaf8409bc2676a77da9536d62109367461ec8cf34bb854787
RLBA-2022:1790
libpinyin bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpinyin.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libpinyin-devel-2.2.0-2.el8.x86_64.rpm
f8403e6b354f9473be39fc4e0706775f1386d324583892ccae5efab89b5813fe
RLBA-2022:1794
libmemcached bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmemcached.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libmemcached-devel-1.0.18-17.el8.x86_64.rpm
fc34c97d21c54141c03a8f8162a3748cd237c299bf31678319a2e1056b10a32f
RLBA-2022:1800
accountsservice bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for accountsservice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
accountsservice-devel-0.6.55-4.el8.x86_64.rpm
c40340ac22ac24a3b36ad7bd0ccfb90fb4acdf318271a609a20b2831261cf17e
RLBA-2022:1822
ibus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ibus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ibus-devel-docs-1.5.19-14.el8_5.noarch.rpm
67b3b057ac52c0ba48ad6774949daad44c1f1f14a2dbc5fafac3108532735d46
ibus-devel-1.5.19-14.el8_5.x86_64.rpm
a5f98ea4f90e5f5144d9b8e488fd9b5cc1f7a2057b600880ea9ed5998627a40a
RLBA-2022:1827
librdkafka bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librdkafka.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
librdkafka-devel-0.11.4-3.el8.x86_64.rpm
bbeeb469910382e90ad5ac65cc8b4b7c82824f2eca0cff5234120fdad7dfb8be
RLSA-2022:1842
Moderate: exiv2 security, bug fix, and enhancement update
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422)
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for exiv2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422)
Security Fix(es):
* exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
exiv2-devel-0.27.5-2.el8.x86_64.rpm
60eef0b012434184198483e4f39fa8b8763a8558a8dbdf21c221f2768467b8b7
exiv2-doc-0.27.5-2.el8.noarch.rpm
d2c75b50927dab8d284c052574cdd762ffe1c4debdc3c7c25d3b324f3626d998
RLBA-2022:1871
corosync bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for corosync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
corosync-vqsim-3.1.5-2.el8.x86_64.rpm
0c9f32f7001b4c447e86f3785cf88386a7f45017a0a6fddaf0962f684284c1f4
RLBA-2022:1895
libecpg bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libecpg.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libecpg-devel-13.5-3.el8.x86_64.rpm
9302415704847d76147eac23f84a33ec88e16c3c2b5a8f3ddb1b63c111072825
RLSA-2022:1763
Moderate: python39:3.9 and python39-devel:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__python39-devel
python39-attrs-20.3.0-2.module+el8.4.0+574+843c4898.noarch.rpm
fbb8f663205787752f8a7c5a1a7dc1497d9de97321946c2f1f959b9a83e701ba
python39-Cython-0.29.21-5.module+el8.4.0+574+843c4898.x86_64.rpm
984098a65cb57d7f43523d0b2ecb2ee3d8b84ab5f9a5491b834760657560bb39
python39-iniconfig-1.1.1-2.module+el8.4.0+574+843c4898.noarch.rpm
585177d17ab59aafa2b84d8543a424a37d750a1b7d77b13d3528fba480b8178f
python39-more-itertools-8.5.0-2.module+el8.4.0+574+843c4898.noarch.rpm
783f58ba2a8c29a6be5ff43e198e37fd6a63251db3b3f2bee347fab0fb814ed0
python39-packaging-20.4-4.module+el8.4.0+574+843c4898.noarch.rpm
26959ff9006b14a57368c87762d0330e3fbfea6f3e3a635a8b19b3cf935a4e20
python39-pluggy-0.13.1-3.module+el8.4.0+574+843c4898.noarch.rpm
2f8e19389c1dae284619279fe0e20688debb67181df429c7d1ca16ba88747fda
python39-py-1.10.0-1.module+el8.4.0+574+843c4898.noarch.rpm
47b83d280a2e2d2082f269fe5971adb5e2baa0d5e53e67492a3471a844b8691f
python39-pybind11-2.7.1-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
9cff00f82f11e7120a62805cef08a46eac99fa503704a15cef53c8ebd457e9fa
python39-pybind11-devel-2.7.1-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
bfcdaa17cd74b8e55159ce5a1aadfc9b7e79981afbfbc35f9bae18fbb14527b5
python39-pyparsing-2.4.7-5.module+el8.4.0+574+843c4898.noarch.rpm
c30232fe2b752fc55b6f9baab39b970d7b5b95cb01abe8cf91ccea9bc0846dd0
python39-pytest-6.0.2-2.module+el8.4.0+574+843c4898.noarch.rpm
c2f636f758cd74bc1b9a16e1f42561af64af41cbfc5e7179fd204565ad051cf6
python39-wcwidth-0.2.5-3.module+el8.4.0+574+843c4898.noarch.rpm
be221a900dcb8cf7ac2f7e5660522a057fd7c0b08503b9b4ed19d9564716c881
RLBA-2022:1769
libgit2-glib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libgit2-glib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libgit2-glib-devel-0.26.4-3.el8.x86_64.rpm
fa469090d51b89fbb68471272bf086d171845ce21a4c37506e719ea569f4d9ed
RLBA-2022:1788
jq bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
jq-devel-1.6-3.el8.x86_64.rpm
51540e5cccc75e55f93f13fb3b324d99d91924a54b13370379f10383306e132c
RLSA-2022:1808
Moderate: aspell security update
GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker.
Security Fix(es):
* aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for aspell.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker.
Security Fix(es):
* aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
aspell-devel-0.60.6.1-22.el8.x86_64.rpm
d4afea0ae1a0a43e3bd0e8b2162b78011aefed59eb8a695e6f97e2670d801095
RLSA-2022:1820
Low: udisks2 security and bug fix update
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for udisks2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libudisks2-devel-2.9.0-9.el8.x86_64.rpm
d3d52becc8d66102931ef4a61bb8c5668091e1f2c1bb5b913bd84b1f129f5be9
RLSA-2022:1861
Moderate: maven:3.5 security update
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Security Fix(es):
* apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Security Fix(es):
* apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
aopalliance-1.0-17.module+el8.3.0+74+855e3f5d.noarch.rpm
fbb6c1c479c14f3cfd59b7ef1410cd4fd5d0e38a3b20d988d04626b9cc984b2c
apache-commons-cli-1.4-4.module+el8.3.0+74+855e3f5d.noarch.rpm
45019b04925e7755a011ea89b09ea72f83c4084017f3937292afd4c5ceb0ac98
apache-commons-codec-1.11-3.module+el8.3.0+74+855e3f5d.noarch.rpm
3aa2b01dd5152ec46aa9671caf520795ba501397d983b795c13d44ff624e1610
apache-commons-io-2.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm
89e481e422ef99164e35d7211632853fcd0d4878369545985364dc50721254ab
apache-commons-lang3-3.7-3.module+el8.3.0+74+855e3f5d.noarch.rpm
2a5f240d60dbc890037880b26f6611fc23dac46b8f50ae6ccaa149ee1cc5ed1a
apache-commons-logging-1.2-13.module+el8.3.0+74+855e3f5d.noarch.rpm
d789f181483d77171796dffad8e30470feac289a4034ee715731bbd6e1641444
atinject-1-28.20100611svn86.module+el8.3.0+74+855e3f5d.noarch.rpm
e4b82afc0bb5526846c4eeb9cb79c26bce4d30934e1ced93d1d3e7307e074f74
cdi-api-1.2-8.module+el8.3.0+74+855e3f5d.noarch.rpm
2e8c720fdbc5e3482949b1de0b3eed0c2b7d8595a3ffabce476a6e1daa850018
geronimo-annotation-1.0-23.module+el8.3.0+74+855e3f5d.noarch.rpm
e7b5122e8672fbe03fcb8fb36bceb4efb9a048fc2b3cd8fd0d7abb1557395780
glassfish-el-api-3.0.1-0.7.b08.module+el8.3.0+74+855e3f5d.noarch.rpm
c4fc22d030b1a3a0f1b2465385e403e86f330d136a7c0eb0770d6cd26151763e
google-guice-4.1-11.module+el8.3.0+74+855e3f5d.noarch.rpm
df35552be68618d49606464e558fc5ba46b7700378df8925e57521f8eb3f98c3
guava20-20.0-8.module+el8.3.0+74+855e3f5d.noarch.rpm
4b8a8bac2501f5672cfffe49ebd189b8b788b60d59c26f813dfd9c8f76fc2a2b
hawtjni-runtime-1.16-2.module+el8.3.0+74+855e3f5d.noarch.rpm
4c65ddc64dbfc58c468643f55731d9dd50323a6f86ec3ab2d865671ccb7d7c7a
httpcomponents-core-4.4.10-3.module+el8.3.0+74+855e3f5d.noarch.rpm
288373332ddbb4d44cbbc09a258f2ef678f9f82fcc675deb67fc1cf17e5433de
jansi-1.17.1-1.module+el8.3.0+74+855e3f5d.noarch.rpm
91dc0aea768418adad49fd93dc91922be6e49f27ea74d2a6d8fcde0691999e1b
jansi-native-1.7-7.module+el8.3.0+74+855e3f5d.x86_64.rpm
bb4d2d6d77cbee8970153afab3cee9136a3c06de021d8ed79437092eb48cb2ea
jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+74+855e3f5d.noarch.rpm
1dfd33dda1d4c8109071d38142354c33ef297ad4481ae97ec23b228b0fe3f9d7
jcl-over-slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
3c363400689340b536e66c15f577a12a5b655144873247cae92fa1ab1d84c550
jsoup-1.11.3-3.module+el8.3.0+74+855e3f5d.noarch.rpm
3992d95096226f182c24e41a93e1d0df2eea9757c1ddf8e02869944dbd9d5a56
maven-3.5.4-5.module+el8.3.0+74+855e3f5d.noarch.rpm
11eabb9b6ad822066845a124cd8fd58161bf8cea2bd30361d52b99f20bc532aa
maven-lib-3.5.4-5.module+el8.3.0+74+855e3f5d.noarch.rpm
186959635948722c4a8fc4e957e62a2f684f231cb2e8dad402ac4aee732c22ef
maven-resolver-api-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
78318ad89591627ff7b70d576dcfa7ddbd8b84cbc96bf10cfbfb3f00551f9d35
maven-resolver-connector-basic-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
8af445addb2ecf224118b43b189343bd81d61a7f1ed4919ba5e2a7b96884f094
maven-resolver-impl-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
d9efb68794c75fb6807690fa7b154010930804532539a082cf1f8c801987b002
maven-resolver-spi-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
84864ba6c437c4a79443cc8ad6709f1e3f4bef7805953b5593e7b7f85f112f4b
maven-resolver-transport-wagon-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
c2ad084bdc61acc14f125e9dc97517c8b7bd1fe11f1fa51e0aa52bccae1104ba
maven-resolver-util-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
50d2691f67b8937dc531975ac7b181b883dd480ff8ada2724efdbe55781271f8
maven-shared-utils-3.2.1-0.1.module+el8.3.0+74+855e3f5d.noarch.rpm
11617b79504bcb21ca362f90b50fe5a79c33f7e23a497c0f1f9fd72d875f14d5
maven-wagon-file-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm
ae1861c6356a25f751701921f4bb4f6d4909e30f5f0a3992f29fb20d7d7d0efd
maven-wagon-http-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm
5c23a755115e85f8a8244f0219d701ab4489ee8b0e342ffdbf5e3101d0b6c1a9
maven-wagon-http-shared-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm
317f893fc19cafca5ffba64667b11ce5f7b888b021b199b65dc4e05dccb9093c
maven-wagon-provider-api-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm
72c219e7b417dcf9c0d653c51b912447866b9c54043c99e3076d81d789a642a1
plexus-cipher-1.7-14.module+el8.3.0+74+855e3f5d.noarch.rpm
d15598cc6e72733579d36a2960e4fc6a5cee91f3822ec698df9d37be2890aa21
plexus-classworlds-2.5.2-9.module+el8.3.0+74+855e3f5d.noarch.rpm
4317743cf5f3c9405a29be7a128a157dcc35274d739a652244e3e81113202556
plexus-containers-component-annotations-1.7.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
cc34dedf623b784eeed97d1b32972ea29deba8822da85e125ee04f94c7283452
plexus-interpolation-1.22-9.module+el8.3.0+74+855e3f5d.noarch.rpm
2e23be2ec94ec5b6c7b655d396cfbc90ac035d22d81afc0cff2b18af207d1123
plexus-sec-dispatcher-1.4-26.module+el8.3.0+74+855e3f5d.noarch.rpm
827da035529b00c9fe3e940f5ddae520273c4b85d81df3f9be42dbfae3a0262c
plexus-utils-3.1.0-3.module+el8.3.0+74+855e3f5d.noarch.rpm
00b359572d4dd27ba27a11a093533dc7eb15aa18417277d89dfb69426996aab1
sisu-inject-0.3.3-6.module+el8.3.0+74+855e3f5d.noarch.rpm
f9c004d055ccbec5294f396f757fba8589320c58d0be527c7703d39cfc4e6659
sisu-plexus-0.3.3-6.module+el8.3.0+74+855e3f5d.noarch.rpm
e6e9f0f557f06117e828215563eabe25c3e060d8f2929e1bb4ea142c14473d7a
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
RLBA-2022:1875
adwaita-icon-theme bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for adwaita-icon-theme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
adwaita-icon-theme-devel-3.28.0-3.el8.noarch.rpm
38a09e434c702743b2398bc56aac1f98b2f3bcf378e88ba7ec10569f1722ef1c
RLBA-2022:1889
texlive bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for texlive.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
texlive-lib-devel-20180414-25.el8.x86_64.rpm
48da9ca89130641bb9a0ff43c79f632f0590273367aeec21badf94d07a38d89b
RLBA-2022:1918
webrtc-audio-processing bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for webrtc-audio-processing.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
webrtc-audio-processing-devel-0.3-10.el8.x86_64.rpm
83bd130189fed6c59e17cacb8af1136f6781c4c6a4925a0f3616198d44c3cccc
RLBA-2022:1944
netpbm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for netpbm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
netpbm-devel-10.82.00-7.el8.x86_64.rpm
d50cf532ec1c958d44a0c0933dceb36b78718fcb473b243b9860e8233365eb7a
netpbm-doc-10.82.00-7.el8.x86_64.rpm
bb25411d1db17f35f2c562e1f9e30755de211cb9a63faf6dc1ca0c53d732a1a2
RLBA-2022:1949
python-pillow update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pillow.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
python3-pillow-devel-5.1.1-18.el8_5.x86_64.rpm
8c12dab34ee56930c031cb88215f56b97daa4a1e4f677db8ff16f1497360952e
python3-pillow-doc-5.1.1-18.el8_5.noarch.rpm
64ec44d65dab3eb5c18b94a53711ac2b79553ff54ec1c3aec07c94e9186ab63f
python3-pillow-tk-5.1.1-18.el8_5.x86_64.rpm
df7e40a191a9673b3ed7a768697057ba9e27d4f147d4b7f89937dd158194d231
RLBA-2022:1960
gegl04 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gegl04.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gegl04-devel-0.4.4-7.el8.x86_64.rpm
130325379544f54dee4abd3a6245368173cc51621c3747f0c5915032afd8c564
RLSA-2022:1968
Moderate: libsndfile security update
libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV.
Security Fix(es):
* libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libsndfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV.
Security Fix(es):
* libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libsndfile-devel-1.0.28-12.el8.x86_64.rpm
96308dce5b3999484db5f192ca96424c96ec849a57d2c635cdf36d2a259470c9
RLSA-2022:2200
Important: .NET 5.0 security, bug fix, and enhancement update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17.
Security Fix(es):
* dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267)
* dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117)
* dotnet: parsing HTML causes Denial of Service (CVE-2022-29145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dotnet5.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17.
Security Fix(es):
* dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267)
* dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117)
* dotnet: parsing HTML causes Denial of Service (CVE-2022-29145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-5.0-source-built-artifacts-5.0.214-1.el8_6.x86_64.rpm
38c5793ab9b4b78cf189732088e3dd88f3b7531cb91916c6a745fb37fe47fa57
RLSA-2022:4798
Important: maven:3.5 security update
The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven.
Security Fix(es):
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven.
Security Fix(es):
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
aopalliance-1.0-17.module+el8.3.0+74+855e3f5d.noarch.rpm
fbb6c1c479c14f3cfd59b7ef1410cd4fd5d0e38a3b20d988d04626b9cc984b2c
apache-commons-cli-1.4-4.module+el8.3.0+74+855e3f5d.noarch.rpm
45019b04925e7755a011ea89b09ea72f83c4084017f3937292afd4c5ceb0ac98
apache-commons-codec-1.11-3.module+el8.3.0+74+855e3f5d.noarch.rpm
3aa2b01dd5152ec46aa9671caf520795ba501397d983b795c13d44ff624e1610
apache-commons-io-2.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm
89e481e422ef99164e35d7211632853fcd0d4878369545985364dc50721254ab
apache-commons-lang3-3.7-3.module+el8.3.0+74+855e3f5d.noarch.rpm
2a5f240d60dbc890037880b26f6611fc23dac46b8f50ae6ccaa149ee1cc5ed1a
apache-commons-logging-1.2-13.module+el8.3.0+74+855e3f5d.noarch.rpm
d789f181483d77171796dffad8e30470feac289a4034ee715731bbd6e1641444
atinject-1-28.20100611svn86.module+el8.3.0+74+855e3f5d.noarch.rpm
e4b82afc0bb5526846c4eeb9cb79c26bce4d30934e1ced93d1d3e7307e074f74
cdi-api-1.2-8.module+el8.3.0+74+855e3f5d.noarch.rpm
2e8c720fdbc5e3482949b1de0b3eed0c2b7d8595a3ffabce476a6e1daa850018
geronimo-annotation-1.0-23.module+el8.3.0+74+855e3f5d.noarch.rpm
e7b5122e8672fbe03fcb8fb36bceb4efb9a048fc2b3cd8fd0d7abb1557395780
glassfish-el-api-3.0.1-0.7.b08.module+el8.3.0+74+855e3f5d.noarch.rpm
c4fc22d030b1a3a0f1b2465385e403e86f330d136a7c0eb0770d6cd26151763e
google-guice-4.1-11.module+el8.3.0+74+855e3f5d.noarch.rpm
df35552be68618d49606464e558fc5ba46b7700378df8925e57521f8eb3f98c3
guava20-20.0-8.module+el8.3.0+74+855e3f5d.noarch.rpm
4b8a8bac2501f5672cfffe49ebd189b8b788b60d59c26f813dfd9c8f76fc2a2b
hawtjni-runtime-1.16-2.module+el8.3.0+74+855e3f5d.noarch.rpm
4c65ddc64dbfc58c468643f55731d9dd50323a6f86ec3ab2d865671ccb7d7c7a
httpcomponents-client-4.5.5-4.module+el8.3.0+74+855e3f5d.noarch.rpm
8caedd5d895c3f289c37183e3fd8caea734fccb9e97de32f62c7c5828d1c400c
httpcomponents-core-4.4.10-3.module+el8.3.0+74+855e3f5d.noarch.rpm
288373332ddbb4d44cbbc09a258f2ef678f9f82fcc675deb67fc1cf17e5433de
jansi-1.17.1-1.module+el8.3.0+74+855e3f5d.noarch.rpm
91dc0aea768418adad49fd93dc91922be6e49f27ea74d2a6d8fcde0691999e1b
jansi-native-1.7-7.module+el8.3.0+74+855e3f5d.x86_64.rpm
bb4d2d6d77cbee8970153afab3cee9136a3c06de021d8ed79437092eb48cb2ea
jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+74+855e3f5d.noarch.rpm
1dfd33dda1d4c8109071d38142354c33ef297ad4481ae97ec23b228b0fe3f9d7
jcl-over-slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
3c363400689340b536e66c15f577a12a5b655144873247cae92fa1ab1d84c550
jsoup-1.11.3-3.module+el8.3.0+74+855e3f5d.noarch.rpm
3992d95096226f182c24e41a93e1d0df2eea9757c1ddf8e02869944dbd9d5a56
maven-3.5.4-5.module+el8.3.0+74+855e3f5d.noarch.rpm
11eabb9b6ad822066845a124cd8fd58161bf8cea2bd30361d52b99f20bc532aa
maven-lib-3.5.4-5.module+el8.3.0+74+855e3f5d.noarch.rpm
186959635948722c4a8fc4e957e62a2f684f231cb2e8dad402ac4aee732c22ef
maven-resolver-api-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
78318ad89591627ff7b70d576dcfa7ddbd8b84cbc96bf10cfbfb3f00551f9d35
maven-resolver-connector-basic-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
8af445addb2ecf224118b43b189343bd81d61a7f1ed4919ba5e2a7b96884f094
maven-resolver-impl-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
d9efb68794c75fb6807690fa7b154010930804532539a082cf1f8c801987b002
maven-resolver-spi-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
84864ba6c437c4a79443cc8ad6709f1e3f4bef7805953b5593e7b7f85f112f4b
maven-resolver-transport-wagon-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
c2ad084bdc61acc14f125e9dc97517c8b7bd1fe11f1fa51e0aa52bccae1104ba
maven-resolver-util-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm
50d2691f67b8937dc531975ac7b181b883dd480ff8ada2724efdbe55781271f8
maven-wagon-file-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm
ae1861c6356a25f751701921f4bb4f6d4909e30f5f0a3992f29fb20d7d7d0efd
maven-wagon-http-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm
5c23a755115e85f8a8244f0219d701ab4489ee8b0e342ffdbf5e3101d0b6c1a9
maven-wagon-http-shared-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm
317f893fc19cafca5ffba64667b11ce5f7b888b021b199b65dc4e05dccb9093c
maven-wagon-provider-api-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm
72c219e7b417dcf9c0d653c51b912447866b9c54043c99e3076d81d789a642a1
plexus-cipher-1.7-14.module+el8.3.0+74+855e3f5d.noarch.rpm
d15598cc6e72733579d36a2960e4fc6a5cee91f3822ec698df9d37be2890aa21
plexus-classworlds-2.5.2-9.module+el8.3.0+74+855e3f5d.noarch.rpm
4317743cf5f3c9405a29be7a128a157dcc35274d739a652244e3e81113202556
plexus-containers-component-annotations-1.7.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
cc34dedf623b784eeed97d1b32972ea29deba8822da85e125ee04f94c7283452
plexus-interpolation-1.22-9.module+el8.3.0+74+855e3f5d.noarch.rpm
2e23be2ec94ec5b6c7b655d396cfbc90ac035d22d81afc0cff2b18af207d1123
plexus-sec-dispatcher-1.4-26.module+el8.3.0+74+855e3f5d.noarch.rpm
827da035529b00c9fe3e940f5ddae520273c4b85d81df3f9be42dbfae3a0262c
plexus-utils-3.1.0-3.module+el8.3.0+74+855e3f5d.noarch.rpm
00b359572d4dd27ba27a11a093533dc7eb15aa18417277d89dfb69426996aab1
sisu-inject-0.3.3-6.module+el8.3.0+74+855e3f5d.noarch.rpm
f9c004d055ccbec5294f396f757fba8589320c58d0be527c7703d39cfc4e6659
sisu-plexus-0.3.3-6.module+el8.3.0+74+855e3f5d.noarch.rpm
e6e9f0f557f06117e828215563eabe25c3e060d8f2929e1bb4ea142c14473d7a
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
RLSA-2022:5331
Moderate: libinput security update
libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices.
Security Fix(es):
* libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libinput.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices.
Security Fix(es):
* libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libinput-devel-1.16.3-3.el8_6.x86_64.rpm
e6400d9b21e1e37d13c5a21110ae734572c013bd697bf03816ab46f2c326f3bd
RLSA-2022:6911
Moderate: .NET 6.0 security and bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el8_6.x86_64.rpm
1cbcca90d2cdc1d5f35c3b5f4db79a156b6a0845ea8bc1574fe5db38a42feade
RLSA-2022:6912
Moderate: .NET Core 3.1 security and bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dotnet3.1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.424 and .NET Runtime 3.1.30.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-3.1-source-built-artifacts-3.1.424-1.el8_6.x86_64.rpm
41101dd3f8ff7a7c01f931ee295267a353fc76455d2178f3453f663ad66b0ca9
RLSA-2022:7006
Moderate: java-1.8.0-openjdk security update
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
3cef33c78b2f42e882e31396800a7e7a77a438464e0fb9e5df6f5590168191f5
java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
de6a5d608f6467a24663041665d51422d4e493ac1c101a525e3541e3b1386468
java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
8a3f8739bbb570f135b48b139b8deb4483c1a5ed74513508a9b3ab9963ddb3c4
java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
39bd3a4cff79ce3b51c2d1a48beed90ec649a7659a79835bec2f28d9d215b804
java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
18998d30a80304090d7d09058dd699c2709357f53f80cd00340a900234a6e82b
java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
54e7765f5887a30d51beac1bf549796144d53d9ad45e5bd40a2c5d610ecfaa43
java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
87fa31eb51c521f01a08afa4c70b19378f935cc28e510713fef9c2c1b77a7674
java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
dc0e1af58c48b9310823e14f5bd81893f89cd1bb29053004956d73129b6d92a5
java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
414d93b60d9bd30e7ccabe3cc27c3871888a43e010be78eeeed978c6722334e6
java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
2b650c0caea3dd048776a3a1be5178a0c278e2661e13c20b44850406a58446f8
java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
fe7845d76a14046a8d6a15a25485e5c01314a80c45c5a1ee500f39d7d38672fb
java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
ad5dbf3c07042ccfb98dc3c465d616cea1af956c59ff146b54153e63b375739e
RLSA-2022:7000
Moderate: java-17-openjdk security and bug fix update
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503)
rocky-linux-8-x86-64-powertools-rpms
java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
8bb849ad4470713193d7e1224add3ced02d09b3ed69f35f797d6b671412ee910
java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
f377e9f4068fa01f6ecaf0b3d6819c9b2a8383702e4f6a704a2018e098a7bfd0
java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
19de1bba805290f61e5f968cfd0b2bea3417b85502d67a81d174aa362b865b69
java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
94fbd464a15a7141c7a85080424e3c290ea9cb48923b568a56ce3ee516412229
java-17-openjdk-fastdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
f82ca739841e5b69d59a755ddef5208718e4055093239878494c3f045565ecd4
java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
5a8f49c86e85eef2d55a657e52bdbf0cd2f282b216521dcd18d1ae344272a610
java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
cad284436b0719c442897b73dbcbc098d61eb79bb6bc2a05e6f7db32237723e8
java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
f981f3fe1939cda61a8a0427a7681200b52a1ee3d5827a53c011ce1af9a155be
java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
f688317cd674165a7956a551a1600b5426f3beebcb8a2bf162627e969c2535c5
java-17-openjdk-slowdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
b31ce4bc62c018008151039ccb8fc3af9358c6464532e1969c3910a7961c6cf1
java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
f9bf519adc164ad47f44efec8f465a40ed00c894b21f9dc436758ecdd26553a0
java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
3a2f765632fe551be35ea2900a2d469fd3e97da8107b11f67fd6cf5f8656fff2
java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
08f7a49fc734e62fda1ea4dfcbb30f937cb6c250036066c2e0be3326d34d6f17
java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el8_6.x86_64.rpm
1d2c2f820e4b3fe97ae0341b3e2bdac14650343bfdf068888e9043769757bbd9
RLSA-2022:7012
Moderate: java-11-openjdk security and bug fix update
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863)
rocky-linux-8-x86-64-powertools-rpms
java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
036fa1a95c3b943f4ef15e2372a7625ace28d99ca782af0b049d77f8cf992ffd
java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
b7f5679d4de33eb947e77ad6e3ad66b2b276c86332c3bca20233311e85837d6c
java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
cfcf3c1affcdd43f5903d180531523a8093dff13341082eec2e52fbc8c2384e7
java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
6c1159dbc6b3ed02693b6b3c05a02f5d99dd0d599c78153d1953ed372cf37ebf
java-11-openjdk-fastdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
c89e3c6a7c7b8c25305035a3963b88e24c3ed9660e124ee541a8c3fbf42c58a6
java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
e819da4ca9fcffc39ebdba47e1c01c48f08eac4a358f70e119d91aa3ad740eef
java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
fcedbca60fb611b44aacf63293fb6226bd2fed415f18aefa44fde21710357963
java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
50023cbb9d1bc660e65d59c94cbb7a1f803455902cb67b52f4879b5a4030a10d
java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
5e8fd6106301e75912a7ee5b094b375be6f63be87ad4076f67777c3f0d1e13c6
java-11-openjdk-slowdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
943d51ce84587e92b4fd40c0dd4cb45237b9e630188af3ba962e37656fb6e883
java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
606332081b5358872568cbb6a46a359886ae20440c0706109cd8a821d20997d4
java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
43ff6a69ce530f16b48a221e91807d34f6a474962ecb9ed295a799d20a994d1e
java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
c00d9893853d6fb7f67c95a2cbfbcb04a403a481fc3a955ce72acddd9544839a
java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el8_6.x86_64.rpm
c28856ff4021ade7b45fafd66ee5d858aa0d2e7425cd9aac543121b3b171984e
RLBA-2022:7459
flatpak bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for flatpak.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
flatpak-devel-1.10.7-1.el8.x86_64.rpm
cbdd75282a26c8aee9095bae0b85aa7e23bf13a38c60215c0638f4552b754760
RLSA-2022:7461
Moderate: libreoffice security update
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libreoffice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libreoffice-sdk-6.4.7.2-11.el8.x86_64.rpm
da5831287dcf86cd844e3816e34c605f0cd9f9f2d2a36a41e697354ed6031e3e
libreoffice-sdk-doc-6.4.7.2-11.el8.x86_64.rpm
66fe87a018b9bfaa117690aa05a9a8522c859492933b02f22f7b95d1dfe0ff56
RLSA-2022:7464
Moderate: protobuf security update
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for protobuf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
protobuf-devel-3.5.0-15.el8.x86_64.rpm
57a717d009e1bfd3de07280fb89054a9298dabb1c5858d452ca008dba4d3f3f8
protobuf-lite-devel-3.5.0-15.el8.x86_64.rpm
45388af6f4670678841f70eedc8244c35f63e9e146aa1c4f7c1117c02baa2bc1
RLBA-2022:7465
nmstate bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nmstate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
nmstate-devel-1.3.3-1.el8.x86_64.rpm
acf7b7714012420307d55d19470a7222572fdfb3ce5cd442acac988da9e4edee
RLBA-2022:7468
libnma bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnma.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libnma-devel-1.8.38-1.el8.x86_64.rpm
def1b3b202b3c3d916a1c3700c0bc5dd86df67be96c0c74cd66dfcb218c574ba
RLSA-2022:7470
Important: pki-core:10.6 and pki-deps:10.6 security and bug fix update
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__javapackages-tools
apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm
1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9
apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm
2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29
apache-commons-net-3.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm
0fd615658b7f48a1545a730d3142ba3c125727c552f69733e20d0c75633e7743
jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm
f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e
javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0
javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687
slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777
slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3
velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm
ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8
xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm
10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1
xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm
fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78
xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm
275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630
xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm
aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522
RLBA-2022:7471
libestr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libestr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libestr-devel-0.1.10-3.el8.x86_64.rpm
51d625fb787885bade8eff0b662b1aeeb92014a494e01ec79a2005e7644d0e76
RLBA-2022:7481
python-qt5 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-qt5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
python3-qt5-devel-5.15.0-3.el8.x86_64.rpm
9874b2a14178b887c61be31a8f50360c235646bb2d3d12f7884817c5b0938dc5
RLSA-2022:7482
Moderate: qt5 security, bug fix, and enhancement update
The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework.
The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377)
Security Fix(es):
* qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for qt5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework.
The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377)
Security Fix(es):
* qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
qt5-devel-5.15.3-1.el8.noarch.rpm
87cf5f9cb20eff95e0e51a8f3ab82a3cb7191d6dbde6fce6e30d7f9f1c94290c
RLBA-2022:7487
qt5-qtbase bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtbase.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
qt5-qtbase-static-5.15.3-1.el8.x86_64.rpm
e8644736925703a4af22af3bcd4a79102b006f25b04ac6d011fa3bce94fa62c7
RLBA-2022:7490
qt5-qtdeclarative bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtdeclarative.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
qt5-qtdeclarative-static-5.15.3-1.el8.x86_64.rpm
b482bb46b9e9585f9bca2c0c0c1b3509c24f2df64dbe1b71a999944b988233ca
RLBA-2022:7495
sip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
python3-sip-devel-4.19.25-1.el8.x86_64.rpm
375872d9c5296e548159cf19d77992e974aa3f3d97e67e253dd06904931499b4
RLBA-2022:7498
qt5-qtquickcontrols2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtquickcontrols2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
qt5-qtquickcontrols2-devel-5.15.3-1.el8.x86_64.rpm
708342c1fc31dd441acfe3267330d00617fe7715236687b552bb2b195272e082
RLBA-2022:7501
qt5-qtserialbus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtserialbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
qt5-qtserialbus-devel-5.15.3-1.el8.x86_64.rpm
dc5791ebede89da78abb13a9ea8d60cd8c1e0a78c71d4a95a699dee9cc47a116
RLBA-2022:7504
qt5-qttools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qttools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
qt5-qttools-static-5.15.3-2.el8.x86_64.rpm
5b1fa67f2fc16d716e114f9f44ba7a878a2ceb63e4de8f34e02e50d2d7e5ea6c
RLBA-2022:7506
qt5-qtwayland bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qt5-qtwayland.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
qt5-qtwayland-devel-5.15.3-1.el8.x86_64.rpm
b42250ceaf989385e35b55079b23544d00f63eeb339c205e69bab5286a40d735
RLBA-2022:7515
papi and libpfm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpfm, papi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libpfm-static-4.10.1-5.el8.x86_64.rpm
e1172e4399a01644242083e6ae72c9488e61731c6eb6a27057ab300b00f0033d
papi-testsuite-5.6.0-16.el8.x86_64.rpm
743b0a9c9d8e21bdc17d115509f2c6ae7b7655e128f988a3002a1b245eb0bad2
python3-libpfm-4.10.1-5.el8.x86_64.rpm
81c60af0d14f690c0a31627fbf358c63f74b4395efa320b140ce867217abd001
RLBA-2022:7518
dyninst bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dyninst.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
dyninst-devel-12.1.0-1.el8.x86_64.rpm
a44838cbb0164cedb452cbdc5179d5bc4b1bca893686a61d6bfc00f439e40992
dyninst-doc-12.1.0-1.el8.x86_64.rpm
4f742d6406d6fe61056a299f61d095ccca98402e462529d8e3edc18c459b7ba7
dyninst-static-12.1.0-1.el8.x86_64.rpm
55e742f2e94587076f1c66bf8761784b769a54954d6a5a5adb8a63d469826e14
dyninst-testsuite-12.1.0-1.el8.x86_64.rpm
e538b597be5c4207b2d94c74e9bcfed512de98084ec3b87bd3d02d16251145f0
RLSA-2022:7524
Moderate: yajl security update
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator.
Security Fix(es):
* yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for yajl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator.
Security Fix(es):
* yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
yajl-devel-2.1.0-11.el8.x86_64.rpm
effbf8b7362876a616c89ba09fb64afcd897bf7f09e1c43cf1a68696f36e4024
RLBA-2022:7531
evolution-data-server bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for evolution-data-server.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
evolution-data-server-doc-3.28.5-20.el8.noarch.rpm
7bcaa23e44e2feee8abadd9a231b1d4d64a0b5f5d802a429bc2715a95e07a0e1
evolution-data-server-perl-3.28.5-20.el8.x86_64.rpm
6ce04e5aa7c0ebcf4ff1743943883f32f5ad166ab766e9136387d406405ec755
evolution-data-server-tests-3.28.5-20.el8.x86_64.rpm
64327093b61e35faa467331628e8abe012d4b27a67a9be8f01cc42d1f77715a8
RLBA-2022:7536
nautilus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nautilus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
nautilus-devel-3.28.1-21.el8.x86_64.rpm
68f3cc36d793188ccc8274f37089fdd257c82fa218cbf603bf3e888cd53f9b60
RLBA-2022:7559
lasso bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lasso.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
lasso-devel-2.6.0-13.el8.x86_64.rpm
3ce25977e96abf463aad0867267b14b623ad06585f4b2fd36f1a6e1e55baec71
RLSA-2022:7558
Low: wavpack security update
WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode.
Security Fix(es):
* wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for wavpack.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode.
Security Fix(es):
* wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
wavpack-devel-5.1.0-16.el8.x86_64.rpm
a8b5660ad53172cc2e38a44e74f08ce54d6e52f56278d4d2407d9ff4727c149e
RLBA-2022:7561
crash bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
crash-devel-7.3.2-2.el8.x86_64.rpm
2f7482aa061d7bffa7c74c93df7032499b1b27d5a9047e2ca057694913764c8c
RLBA-2022:7564
gdm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gdm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gdm-devel-40.0-24.el8.x86_64.rpm
154cae926acce84210a8749a2972891a093e7322c321118702055609a8f2ac02
gdm-pam-extensions-devel-40.0-24.el8.x86_64.rpm
5352d848710867bd6539292513379b9691f69da44ffe1c1dc98970a21706b1d0
RLSA-2022:7581
Moderate: python38:3.8 and python38-devel:3.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__python38-devel
python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313
python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6
python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm
a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef
python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be
python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8
python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm
c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1
python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm
9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4
python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm
0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86
python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm
b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d
RLSA-2022:7583
Moderate: xorg-x11-server and xorg-x11-server-Xwayland security and bug fix update
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xorg-x11-xtrans-devel, xorg-x11-server-Xwayland, xorg-x11-server.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
xorg-x11-server-devel-1.20.11-9.el8.x86_64.rpm
cc435d7fe99b6e868efb56eeb22c337773b901cc1b7d76524dfede93b56ebe09
xorg-x11-server-source-1.20.11-9.el8.noarch.rpm
3f465e1af2b55d00046615a3cc9113a0b6f600ddfce17d74e286218782f4b823
xorg-x11-xtrans-devel-1.4.0-4.el8.noarch.rpm
d59bbc4e1c42e0203d582e8825b3751c20cddca6a30b1dab48fbe5591f0c2daf
RLSA-2022:7585
Moderate: libtiff security update
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libtiff-tools-4.0.9-23.el8.x86_64.rpm
3a41fac559024d991001df5f3aff24e5729204b04a5ea21d735a1e16400600ca
RLBA-2022:7589
yara bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for yara.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
yara-devel-4.2.3-1.el8.x86_64.rpm
ba370cd6d24021a9e1138f176b8b6aea12d4525daffd8cc4493226b06b9a17f0
RLSA-2022:7592
Moderate: python39:3.9 and python39-devel:3.9 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms__python39-devel
python39-attrs-20.3.0-2.module+el8.4.0+574+843c4898.noarch.rpm
fbb8f663205787752f8a7c5a1a7dc1497d9de97321946c2f1f959b9a83e701ba
python39-Cython-0.29.21-5.module+el8.4.0+574+843c4898.x86_64.rpm
984098a65cb57d7f43523d0b2ecb2ee3d8b84ab5f9a5491b834760657560bb39
python39-iniconfig-1.1.1-2.module+el8.4.0+574+843c4898.noarch.rpm
585177d17ab59aafa2b84d8543a424a37d750a1b7d77b13d3528fba480b8178f
python39-more-itertools-8.5.0-2.module+el8.4.0+574+843c4898.noarch.rpm
783f58ba2a8c29a6be5ff43e198e37fd6a63251db3b3f2bee347fab0fb814ed0
python39-packaging-20.4-4.module+el8.4.0+574+843c4898.noarch.rpm
26959ff9006b14a57368c87762d0330e3fbfea6f3e3a635a8b19b3cf935a4e20
python39-pluggy-0.13.1-3.module+el8.4.0+574+843c4898.noarch.rpm
2f8e19389c1dae284619279fe0e20688debb67181df429c7d1ca16ba88747fda
python39-py-1.10.0-1.module+el8.4.0+574+843c4898.noarch.rpm
47b83d280a2e2d2082f269fe5971adb5e2baa0d5e53e67492a3471a844b8691f
python39-pybind11-2.7.1-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
9cff00f82f11e7120a62805cef08a46eac99fa503704a15cef53c8ebd457e9fa
python39-pybind11-devel-2.7.1-1.module+el8.6.0+795+de4edbcc.x86_64.rpm
bfcdaa17cd74b8e55159ce5a1aadfc9b7e79981afbfbc35f9bae18fbb14527b5
python39-pyparsing-2.4.7-5.module+el8.4.0+574+843c4898.noarch.rpm
c30232fe2b752fc55b6f9baab39b970d7b5b95cb01abe8cf91ccea9bc0846dd0
python39-pytest-6.0.2-2.module+el8.4.0+574+843c4898.noarch.rpm
c2f636f758cd74bc1b9a16e1f42561af64af41cbfc5e7179fd204565ad051cf6
python39-wcwidth-0.2.5-3.module+el8.4.0+574+843c4898.noarch.rpm
be221a900dcb8cf7ac2f7e5660522a057fd7c0b08503b9b4ed19d9564716c881
RLSA-2022:7594
Moderate: poppler security and bug fix update
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for poppler.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
poppler-glib-devel-20.11.0-5.el8.x86_64.rpm
2226bb3187f1375ad644e59963069b652e5c92e6d93ba61691ef533757db20dd
poppler-cpp-20.11.0-5.el8.x86_64.rpm
03dcae9ab3c5fe8dfde0de5d125c9814ce0c5ae5d42e72dfdf98a0a153c14286
poppler-cpp-devel-20.11.0-5.el8.x86_64.rpm
1727dc5cb024c9f2ae8fe8079f9445deb5e33fcb9c5c14cf9cf5f1889cfc4f52
poppler-devel-20.11.0-5.el8.x86_64.rpm
425535e3c0a3160a360fba3956abd4ad533d9529d9de3cd1ea89ff40b2c70a01
poppler-qt5-devel-20.11.0-5.el8.x86_64.rpm
3d7525849dfa7a2949d2a694175c3cd3416c46ec7798445db6b48a80333978ef
RLBA-2022:7595
bcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
bcc-devel-0.24.0-2.el8.x86_64.rpm
5fe2da4e01e6ae2d25d6951bb391673ba53f199e91bdf0795ebe634b014495ce
bcc-doc-0.24.0-2.el8.noarch.rpm
68ec3588aaefcfce81f7a7e1de97007ca70673e6a1eea83584fcfd7e34c969fb
RLBA-2022:7600
boost bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for boost.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
boost-build-1.66.0-13.el8.noarch.rpm
b55abb54da2283abaa0c6253aeb6df7706152ce702492c34f504e25cd31de932
boost-doc-1.66.0-13.el8.noarch.rpm
bef5031eb15715588ba45b1fa0062da8652663029f75c9d0b94b7a4bb5b3aad2
boost-examples-1.66.0-13.el8.noarch.rpm
ede1620a32a2a69de585e91b93eb2dc742fae2e70ce793c5c38346eec58cfac3
boost-graph-mpich-1.66.0-13.el8.x86_64.rpm
9e06c336c14648323ae62f3cd5a83aa77037effd0314089cfd2fad7c458f1d72
boost-graph-openmpi-1.66.0-13.el8.x86_64.rpm
26b7ed98c4c69a33bc889a54cd0c7cc4202db53d7e0e88e48220ec8b9e681790
boost-jam-1.66.0-13.el8.x86_64.rpm
47b190872e078c7f8c326f568ac59488c0710bdd38f84457289e10fb9aca4e50
boost-mpich-1.66.0-13.el8.x86_64.rpm
ceb6733a0fff8d33ce3b120b3a8a5f7ef28ef040d3ca5ec1b9436d6a78f04c2c
boost-mpich-devel-1.66.0-13.el8.x86_64.rpm
c2889190b6ac4be270ebb642ebbbae6c1046c865f34839c3640f73ed46649db1
boost-mpich-python3-1.66.0-13.el8.x86_64.rpm
5a83559d3005ae673f84ef8aa075bf368dbf20d8a4bd500612bc72855ed707a3
boost-numpy3-1.66.0-13.el8.x86_64.rpm
7550c08555782afb51674dad2f28e99fc435002049f29d03f33e9223915058a4
boost-openmpi-1.66.0-13.el8.x86_64.rpm
58962ac54f40035d50d5c68ffe0cda1b8b05e62d1d89c0050935748abb654a37
boost-openmpi-devel-1.66.0-13.el8.x86_64.rpm
8607bf51468b1e8d6068423eccbaeb4e85f42aa46ee31c47a4b9bf5db359f257
boost-openmpi-python3-1.66.0-13.el8.x86_64.rpm
8124adbcaf09c4b6f5fa94b45039a519fbb10fa4ad3109ae13dd7729e36a3b22
boost-python3-1.66.0-13.el8.x86_64.rpm
99afef7aa008ac5c43d6433b6f929b459da0a2882a75981e2b243debf9a8b1e0
boost-python3-devel-1.66.0-13.el8.x86_64.rpm
6ca1604272b1d57cb2790aecd0454648d4e6d149d40471c34811aedada810c49
boost-static-1.66.0-13.el8.x86_64.rpm
4e19b25971991dac653695d29d182eeb2a1c17774b76e8e1b32b4aadf0b1336f
RLEA-2022:7601
libdrm, mesa, and wayland-protocols bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wayland-protocols, libdrm, mesa.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
mesa-libgbm-devel-22.1.5-2.el8.x86_64.rpm
4efffd2e0bc7d2328612318469da17d092a2133d1689869ca0b3d517ddb33fcd
mesa-libOSMesa-devel-22.1.5-2.el8.x86_64.rpm
13b6703a927e37782c015825b956094e4a2e1d12eb88f7bdd8c4b50dd1854094
RLBA-2022:7614
xxhash bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xxhash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
xxhash-devel-0.8.1-3.el8.x86_64.rpm
04c53a6918391478e67b4e22befba046bd7cc566c2375bde450b37be203074a5
xxhash-doc-0.8.1-3.el8.noarch.rpm
68b481dfb90bc6128f2f6e11cde7157f7f30422bdde8f464dc49539ef75494cd
RLSA-2022:7623
Moderate: dovecot security update
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dovecot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
dovecot-devel-2.3.16-3.el8.x86_64.rpm
31a72734edde4e27c0f441d332d0f3e4c37adf8ee5c0d57e684394671c3919ce
RLBA-2022:7631
ghostscript bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ghostscript.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
ghostscript-doc-9.27-4.el8.noarch.rpm
63caef3cf225a40dc30d6c8349e4f999d43d38e4b30a71a600dc0eaf90b697b2
ghostscript-tools-dvipdf-9.27-4.el8.x86_64.rpm
14b3bc4fd77b4bb89ae6b868b24ea97fc194a788610eb9866a44ad4ae735c8fd
ghostscript-tools-fonts-9.27-4.el8.x86_64.rpm
6b118e7ad7a55210d78b3a609d982bcf09d4df5e05c95dfd4cb5cf6ed2bdb8ab
ghostscript-tools-printing-9.27-4.el8.x86_64.rpm
707e3a1f4a5a4a8452c852ddb821db5d0fd093257f7626318a9c63140c55265b
libgs-devel-9.27-4.el8.x86_64.rpm
a346d823fadf5700b7fb05c177ebb39a9fad66da0fb196ff1b5424e6ff852147
RLSA-2022:7639
Moderate: openblas security update
OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version.
Security Fix(es):
* lapack: Out-of-bounds read in *larrv (CVE-2021-4048)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openblas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version.
Security Fix(es):
* lapack: Out-of-bounds read in *larrv (CVE-2021-4048)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
openblas-devel-0.3.15-4.el8.x86_64.rpm
489928f7e4ecad2cf0c0d46a6e7d223b74f4506595bd39bbd2ff55d744f2721e
openblas-openmp-0.3.15-4.el8.x86_64.rpm
4cd44ea7aebfa2e362decae4a505400b1d67983b6b21dcdfca1cd275bb6b2b30
openblas-openmp64_-0.3.15-4.el8.x86_64.rpm
d1c2f0a7531fcbef678a494b7929c72654cd89c404420fee6b5251a8667befda
openblas-openmp64-0.3.15-4.el8.x86_64.rpm
290fc3418275a5b2e52801feb46197fcdcc9dfb9b8be30585887d493cd0545c4
openblas-Rblas-0.3.15-4.el8.x86_64.rpm
6f02f30805ada366250b98dd7569662c401a3aa467f206ba01d35912dfd8ad1d
openblas-serial64_-0.3.15-4.el8.x86_64.rpm
2e7b11ed4e95bb955de61cc26d1b57f14ec2eb9f278c99823623d0adfbd1b46e
openblas-serial64-0.3.15-4.el8.x86_64.rpm
55042df66424d99e7d414d4cba2a9be8d01c74526c9b69aa538ff1eae8df0525
openblas-static-0.3.15-4.el8.x86_64.rpm
232c7bd0d7db4981090c727130a588ae2665fa41ccdd89d322c3eb9f4492cd1e
openblas-threads64_-0.3.15-4.el8.x86_64.rpm
098dd3c46bc1967a6618327876f589aec4ea04b2909f235e03c0afb2ed6dbbba
openblas-threads64-0.3.15-4.el8.x86_64.rpm
50331f708bb74065fef9b2b1db08f9cee7930b7ec17da10d3a24d83b87bca73a
RLBA-2022:7641
fstrm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fstrm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
fstrm-utils-0.6.1-3.el8.x86_64.rpm
284cbf4262826f79f6afc46ac70e2a9e13dab914b9b079df4bf3a36de5332310
RLSA-2022:7643
Important: bind9.16 security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: DoS from specifically crafted TCP packets (CVE-2022-0396)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind9.16.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: DoS from specifically crafted TCP packets (CVE-2022-0396)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
bind9.16-devel-9.16.23-0.9.el8.1.x86_64.rpm
5c2c9bf659b06376f99f5e4903b695212b2b769afaaa32e9ad7e13fb5b67914b
bind9.16-dnssec-utils-9.16.23-0.9.el8.1.x86_64.rpm
31da42939a673fa5da8bd62e7b4ad2560e65db24d15d29ba1188a4ac0e264eff
bind9.16-doc-9.16.23-0.9.el8.1.noarch.rpm
ef26712cfaaae27376f5e0ec5f4f2d57804ea16ce3668997d15a50ea6698106a
python3-bind9.16-9.16.23-0.9.el8.1.noarch.rpm
ca260ea4c3d4b4ea57741b6ceb3ff53bc81c9437d67e502f2cb5013ec596688e
RLSA-2022:7645
Low: openjpeg2 security update
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for openjpeg2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
openjpeg2-devel-2.4.0-5.el8.x86_64.rpm
e8ad21348c1d21ff79a376924eb62995eb62a23adec2ed1a421e0d675773db18
RLBA-2022:7646
libblockdev bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libblockdev.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libblockdev-crypto-devel-2.24-11.el8.x86_64.rpm
99666e02b0ca9caa8ab819c249a5f32b0fff0e5b5d79e7d8cf86385ed3783151
libblockdev-devel-2.24-11.el8.x86_64.rpm
489b4532e3e74d79a6ab4fe6cd5aec581c9bcc208a986f7cea4d6cc084169305
libblockdev-fs-devel-2.24-11.el8.x86_64.rpm
38a2e52015511a9d259abc57ed36412e38278400ff47f831f6b67a479c121142
libblockdev-loop-devel-2.24-11.el8.x86_64.rpm
1930325da4d0a558261dd41e9e8340894f6791f0bfdb0348060e4dc5530bca52
libblockdev-lvm-devel-2.24-11.el8.x86_64.rpm
1355aa2e933e9b3afe2ea3a1cc945a48aeb4b82e60a2dda9e9db72382e1b0569
libblockdev-mdraid-devel-2.24-11.el8.x86_64.rpm
cd7ea15db2e26e59ce680988ccbedc782cd6e9f7d8e76daf477ee296cf5f9abe
libblockdev-part-devel-2.24-11.el8.x86_64.rpm
158545ab0f3f9dd06ec1fb4f80c7529f681985ce49817ea1e969d078445fc96a
libblockdev-swap-devel-2.24-11.el8.x86_64.rpm
bd43acaa895fe9aea4b8428cad79a015152ba5b8361e93ab067f5ce7d97ef749
libblockdev-utils-devel-2.24-11.el8.x86_64.rpm
60d797fd505b5191fe54f91a1c6ae0890231ab16885fe6d8d6c8a55c62a1f32f
libblockdev-vdo-devel-2.24-11.el8.x86_64.rpm
c59272fc46b5d75a1a5891fcd054b3aea6d12909546847b486b98d40871c842d
RLBA-2022:7653
cups-filters bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups-filters.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
cups-filters-devel-1.20.0-28.el8.x86_64.rpm
e5968f3bae34a638049db12139cc2160341b69d66137e01a8e8c5e7e0ef0f07e
RLBA-2022:7657
openslp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openslp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
openslp-devel-2.0.0-20.el8.x86_64.rpm
0a885c7a28d79c4cce3a886a3988e9be8a1b8b2d681981b8af8f3cf87aab3f8d
RLBA-2022:7659
gtk3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gtk3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
gtk3-devel-docs-3.22.30-11.el8.x86_64.rpm
dee1010aae4e09bc7533b87e8632bf726a588cce14f115c9510a1b8f2e06bddf
RLBA-2022:7658
freerdp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freerdp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
freerdp-devel-2.2.0-8.el8.x86_64.rpm
a17dbb2125ae08e0962706084560b60b1fbae55a923db9cb70550798772b4cfc
RLBA-2022:7661
vulkan bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
spirv-tools-devel-2022.2-2.el8.x86_64.rpm
6483c1123ae46f33ea778ac539636c38a36ee9350d9a7a270fb0616333f5aaa2
RLBA-2022:7662
opencv bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
opencv-3.4.6-8.el8.x86_64.rpm
edc7f4a3b0d887fd32c98c6acef1b0c138ad898d688eb6543c33cdc5d2a10f4f
opencv-devel-3.4.6-8.el8.x86_64.rpm
9d24854067b58bee0eb35942460bb0a53900b43d8bf8f6529af1109dac5ba23a
RLBA-2022:7663
wireshark bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wireshark.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
wireshark-devel-2.6.2-15.el8.x86_64.rpm
4dd81551f0e0d797493ad62a8988f946faab8f3c19e54958955175a170803504
RLBA-2022:7667
qatzip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qatzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
qatzip-devel-1.0.9-1.el8.x86_64.rpm
ee2993bdafd3e631222b22d0380a8569e4e4a972daa741bf5e2b54146662c374
RLBA-2022:7668
qatlib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for qatlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
qatlib-devel-22.07.0-1.el8.x86_64.rpm
4e7d9cc94db3e7bf9783d58b0749624860ff0526d2a4550404e4db4806fa0aef
qatlib-tests-22.07.0-1.el8.x86_64.rpm
b5800898bc9db543e336fb5dcb5cba1a25dcb71058b237936d9884192410d003
RLBA-2022:7674
openwsman bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openwsman.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libwsman-devel-2.6.5-9.el8.x86_64.rpm
02976d491f247962686617466589bc8558c43acee72d4c551dee5fd5084fe620
RLBA-2022:7091
java-1.8.0-openjdk bug fix and enhancement update
This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
3cef33c78b2f42e882e31396800a7e7a77a438464e0fb9e5df6f5590168191f5
java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
de6a5d608f6467a24663041665d51422d4e493ac1c101a525e3541e3b1386468
java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
8a3f8739bbb570f135b48b139b8deb4483c1a5ed74513508a9b3ab9963ddb3c4
java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
39bd3a4cff79ce3b51c2d1a48beed90ec649a7659a79835bec2f28d9d215b804
java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
18998d30a80304090d7d09058dd699c2709357f53f80cd00340a900234a6e82b
java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
54e7765f5887a30d51beac1bf549796144d53d9ad45e5bd40a2c5d610ecfaa43
java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
87fa31eb51c521f01a08afa4c70b19378f935cc28e510713fef9c2c1b77a7674
java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
dc0e1af58c48b9310823e14f5bd81893f89cd1bb29053004956d73129b6d92a5
java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
414d93b60d9bd30e7ccabe3cc27c3871888a43e010be78eeeed978c6722334e6
java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
2b650c0caea3dd048776a3a1be5178a0c278e2661e13c20b44850406a58446f8
java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
fe7845d76a14046a8d6a15a25485e5c01314a80c45c5a1ee500f39d7d38672fb
java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el8_7.x86_64.rpm
ad5dbf3c07042ccfb98dc3c465d616cea1af956c59ff146b54153e63b375739e
RLBA-2022:7835
mutter bug fix and enhancement update
Mutter is a compositing window manager that displays and manages desktop
through OpenGL. It combines the window-management logic inherited from the
Metacity window manager with a display engine that uses the Clutter
toolkit.
Bug Fix(es) and Enhancement(s):
* [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mutter.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutter is a compositing window manager that displays and manages desktop
through OpenGL. It combines the window-management logic inherited from the
Metacity window manager with a display engine that uses the Clutter
toolkit.
Bug Fix(es) and Enhancement(s):
* [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746)
rocky-linux-8-x86-64-powertools-rpms
mutter-devel-3.32.2-67.el8_7.x86_64.rpm
22971e9268ced764a3245de04c28dad307c91508256ce3d0ff2dedad35c89bfb
RLBA-2022:7258
java-17-openjdk bug fix and enhancement update
This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for java-17-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6.
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
java-17-openjdk-demo-fastdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
004f32d9d4a53d507f722f8d81ce27f2af248d2e1f6c965e74d2c6c6b6507890
java-17-openjdk-demo-slowdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
b825cae25b6f3de1d46a5cb3f67d69fe3a894e47eaceb570d99cee65a343448a
java-17-openjdk-devel-fastdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
1890f1670680098bafee74785e6e313d4fe4c1c107cca1c3a5097a9be5f23739
java-17-openjdk-devel-slowdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
010616999aee22eeba94385e622bdce2b860af623f6e695ac134480cdf276ed5
java-17-openjdk-fastdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
157d0b2936b02f1bbcff8c7da925c3180de0c53deef9046a9ad6786dc1a5bb21
java-17-openjdk-headless-fastdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
66f0cb8778df124b660fdbb44c621e932dd19041177f8f26b903510f902bb8b6
java-17-openjdk-headless-slowdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
96483996fbf87ba427725c40dd777423f7772e5fd79faaeca01a7d822aafd1d7
java-17-openjdk-jmods-fastdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
ca77d0c4139d04e8393786312f1998490f8c1fdbef77a427f5cc432a09a17d01
java-17-openjdk-jmods-slowdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
2b6a935e952ad1f82e8cfa130a5f738ea25dc946275a585c506f7af7dc577385
java-17-openjdk-slowdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
49646510197e38c7a90b6f47490c0b78e6e793133cc74196d4a8108fbaafe254
java-17-openjdk-src-fastdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
cfe2a5151512c9c81aaf213d8505701c878465f5aa01462137d4c9b0eae176d6
java-17-openjdk-src-slowdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
35285a0cee454f90464874d53a3e0bd722e54f33a292229cf2e6c2cb63a44cc2
java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
fbf5a55140b59bda7e64c0529970a4dfdf05f2c0fda2470e7e1f43e408f7a846
java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-1.el8_7.x86_64.rpm
f2865e3d9e2be4192bae7f180a4ea669d1d5378f80cf39f04fc8294f7938fdf7
RLBA-2022:7438
java-11-openjdk bug fix and enhancement update
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Bug Fix(es) and Enhancement(s):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Bug Fix(es) and Enhancement(s):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862)
rocky-linux-8-x86-64-powertools-rpms
java-11-openjdk-demo-fastdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
f148280fbf827f77e2f8f946a2ee0a0b6ce47aec707c228a161f442217c6e11e
java-11-openjdk-demo-slowdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
de38a1dd3a259c75fb2b6d868d8cac1c40ec71c8d07fa8a0f4296d3df7c09a07
java-11-openjdk-devel-fastdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
696d934789e3a2fda411df1545f7e5582a2b8578e2978320a5d3449b36093479
java-11-openjdk-devel-slowdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
7f300816ae19ad8e7f18f02810945a8e7d6546f9eb7ed911e4c79a7246633577
java-11-openjdk-fastdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
4ddf42ecac2a1e8a2b6fe305f6afa8471add5b8ced7bcef268079273f92631a2
java-11-openjdk-headless-fastdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
014df5ae5f4ad53478baab36f22ed313672d870dbd1430e6b66f18bee5270ee5
java-11-openjdk-headless-slowdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
8d7416f9a9efce8133707bd7d8b1faaf8e87a2e6ef5a659736fc85b3da6702dd
java-11-openjdk-jmods-fastdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
6dbcf62aadcc64fae7a3b494d857112ea21361194fb362bd9ad459f4b05e51aa
java-11-openjdk-jmods-slowdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
6351cfe42e6c31e2c7e2e3e5ec5a893bba98b0e052c6123103cbc23bbb826cbd
java-11-openjdk-slowdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
804789c443f65e458fe2aba404fd61f35a9f9bfaf723d980fafa46b2cc3e872c
java-11-openjdk-src-fastdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
eb403aa2513d236fe13aa3a7fa43f67acac5030c8d3abc2fed359b9e6ef42fc8
java-11-openjdk-src-slowdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
c15fdc8ab7fc150059b2f959ed1abbd1e5445c369def9fe3dc77372fe19c4868
java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
a453bba4567368e741a4cea3c2b2bce7dd5603e785c8f545265570aa719b7604
java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-1.el8_7.x86_64.rpm
a11964990805407fe9e8ac6499d7fad3a3e225fdfe837d86276d8ccb1da2e3bd
RLBA-2022:7861
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943)
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-7.0-source-built-artifacts-7.0.100-1.el8_7.x86_64.rpm
c04656434015f8c7d9a52b2622a1846ea3402247772dee96889913b4a68cc0e6
RLBA-2022:9018
.NET Core 3.1 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet3.1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET Core 3.1 to SDK 3.1.426 and Runtime 3.1.32 [Rocky Linux-8.7.0.z] (BZ#2148219)
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-3.1-source-built-artifacts-3.1.426-1.el8_7.x86_64.rpm
7915447c7672a2c1eaf2b7df962c1320d841d8df48971c0d9488f1c135a29fb8
RLBA-2022:9019
.NET 6.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147)
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-6.0-source-built-artifacts-6.0.112-1.el8_7.x86_64.rpm
5cab7c2338ac557ab1678b625a23012efef18e5c1aa89c758c19a6c56a18f929
RLBA-2022:9020
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151)
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-7.0-source-built-artifacts-7.0.101-1.el8_7.x86_64.rpm
fc123b982742827f0fe8be31631c3bd7e9d209e8e46d3d3d1c614f570b4d642d
RLSA-2023:0079
Moderate: .NET 6.0 security, bug fix, and enhancement update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13.
The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458)
Security Fix(es):
* dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13.
The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458)
Security Fix(es):
* dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el8_7.x86_64.rpm
363db33af9692b8e96fa36e2fcc58a41510fdeaf1e0544dd599c0757bf2736f9
RLBA-2023:0081
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466)
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-7.0-source-built-artifacts-7.0.102-1.el8_7.x86_64.rpm
0c6b3fae9573a9eb8677e20cfb9c3006ddba6640c8dbaa6e3be84746d795cb63
RLSA-2023:0089
Moderate: libreoffice security update
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Macro URL arbitrary script execution (CVE-2022-3140)
* libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305)
* libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306)
* libreoffice: Weak Master Keys (CVE-2022-26307)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libreoffice.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Macro URL arbitrary script execution (CVE-2022-3140)
* libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305)
* libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306)
* libreoffice: Weak Master Keys (CVE-2022-26307)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libreoffice-sdk-6.4.7.2-12.el8_7.x86_64.rpm
6e0c3f3ef9c7c94259abbc9727f80b354833abe62ea6105c9c49bd7a05b27687
libreoffice-sdk-doc-6.4.7.2-12.el8_7.x86_64.rpm
262cd60fb36a53f9def73ac545283f0fe8386121f4751fdaa6a63fa98a640f96
RLSA-2023:0095
Moderate: libtiff security update
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)
* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)
* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libtiff-tools-4.0.9-26.el8_7.x86_64.rpm
92b4d9cdecac10471f5ec0e5e10b52ebbf5bfd53564a42028de88acf1acac00c
RLBA-2023:0102
nmstate bug fix and enhancement update
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* nmstate verificationError on OpenshiftSDN (BZ#2128555)
* kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698)
* Addresses configured at different order than specified at state (BZ#2149048)
* fail to create many veth interfaces (BZ#2150705)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nmstate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* nmstate verificationError on OpenshiftSDN (BZ#2128555)
* kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698)
* Addresses configured at different order than specified at state (BZ#2149048)
* fail to create many veth interfaces (BZ#2150705)
rocky-linux-8-x86-64-powertools-rpms
nmstate-devel-1.3.3-4.el8_7.x86_64.rpm
b5af40541eaf160a72f6d809b5a1ee898c8739bddeb80b21b726e7c5eba2cf25
RLSA-2023:0192
Moderate: java-17-openjdk security and bug fix update
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010)
rocky-linux-8-x86-64-powertools-rpms
java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
1702e80c1f8e30364e2005b3c2d79125e8714f9d44beb0a883900845f7d41031
java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
330890fbcaf8b55250a9f8ab87daae4de4e14d1b391355447887bd5a4c8d938b
java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
bde6c6ae00acaf348851b4d4c2e9de0c00783e03a48fa3956a2751525fca50b3
java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
bf115ca6af519d80f2ff10d2b22c674e82d8af9e969a2b44fb5c347271b4a472
java-17-openjdk-fastdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
17ea21517c6c46e3c370d5f1abb31cbd9425f840a9cee4661497f8f68237b9e0
java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
273c03a63de6b7b6cbb594e246f5f9678cb3cca6e30210c431ea2814418b1876
java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
8ebb76c9e38a60c1c4025cb7f05c546f1fa1ecacca6470a305ff4a2388eff0de
java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
552473df6ec8c2cd137c75ff23b0c0a77d5248c4af90a3aaf68a9485e8a13f1a
java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
1193f79d3ec3552b45deadc818f926f5f9881e34995711e815fcd32a861977aa
java-17-openjdk-slowdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
17c2b3de25ab6201b72700c8aefffa768254811e23564f5fd66c5d7360b4956d
java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
92799ac1a6c8bf1a4efd4bb14a85f9f6207290f0f0805979873c5679168c7330
java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
98f73d00398ab11c852a2fef1199b942854a04c7f5f2a5d75ddac653327f1e0b
java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
8d4e5bf10c4b9ba8218f7d8eb48173aa7a3cdd85d3d8f87b22174987b8fa935d
java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el8_7.x86_64.rpm
0c905b92e8d597092ad21d648ca84da6c939718305a8587ab12d426600c01840
RLSA-2023:0200
Moderate: java-11-openjdk security and bug fix update
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797)
rocky-linux-8-x86-64-powertools-rpms
java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
31e70a9b053387cb360107e99c30be5ff3e8b77bda963c229ed133905fb5f075
java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
8049109dcc4eec82d129c5ba68b3caef10c1fb02386aa67ba74433694cc5b2e7
java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
511236322c0d829ec3f55813232f2b4e22938eb9db7c3e122368a2ef519644c4
java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
e04bb4eb4e6004d0bee5cfbc0f8ae351914efd5d4192616feb51388b1fe3f18f
java-11-openjdk-fastdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
98da2a7e7c5a6247fc30fe4600ff5494177764a4c6b5d5d514e976c1503b4393
java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
cf60dc0f680873b776bd229dc8dbbbfd6df343cf25380e0833507e08aace573f
java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
0d0c573e9d794b88c354765df0aa0e29defbc39ffda15f26ec6226e840aa6e81
java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
d2728df00657698634850600c0b40ca8e685d9582508de1c2d94ae9d7a791063
java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
5d6bd6a9441d0b10b4033b7fd3d19824afdd5719cd1ad7fddaf7c2f68a968f39
java-11-openjdk-slowdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
15b5910a4008ad2c91fa87ff75184a12bd3eb1b8d19e3604732244345a7e3dc1
java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
370d5c425db2b4aaef0c8d1e2bdd7e93ff3a50b103c7870a8b6765d508c41335
java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
a995ed838160de30700f0c38a8921729448113305a443552fbc0f924ddbb1745
java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
1bd8a0583252e4a38613497feebbfdac02ef7ddd78008829f4e140926db59b27
java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el8_7.x86_64.rpm
8e2382a55bd8dc1af394e1cdfe1b21d71430a0dcfb0be247dd560526ea1c8708
RLBA-2020:3148
Rocky Enterprise Software Foundation OpenStack Platform 16.1 bug fix and enhancement advisory
Rocky Enterprise Software Foundation OpenStack Platform provides the facilities for building, deploying
and monitoring a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware.
For additional information about the items in this advisory, refer to the Technical Notes chapter of the Release Notes, https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/16.1/html/release_notes/chap-technical_notes
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-gflags, python-oauth2client, google-api-python-client, python-httplib2, python-uritemplate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation OpenStack Platform provides the facilities for building, deploying
and monitoring a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware.
For additional information about the items in this advisory, refer to the Technical Notes chapter of the Release Notes, https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/16.1/html/release_notes/chap-technical_notes
rocky-linux-8-x86-64-powertools-rpms
python3-httplib2-0.10.3-4.el8.noarch.rpm
6e8b831ea4c97e85d08e061f6ed8f03ffd62a7ab0df8bc9b2f3222fd2c33e8b7
RLBA-2022:7815
kronosnet bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kronosnet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libknet1-1.24-2.el8.x86_64.rpm
c47aa11ed5bedc2c7041becda3a67d03e63d5af4fa1c9948e36c1fc5b9dd11c6
libknet1-devel-1.24-2.el8.x86_64.rpm
2d9dc38cabc94373740a450f4dc1cde0b367f2cd1b83808293eb061a0d2471c2
RLBA-2021:4840
.NET 5.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update to 6ce5818b1c1828ccdc8ac63d460d029c6391a401 [Rocky Linux-8.5.0.z] (BZ#2024345)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet5.0, dotnet5.0-build-reference-packages.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update to 6ce5818b1c1828ccdc8ac63d460d029c6391a401 [Rocky Linux-8.5.0.z] (BZ#2024345)
rocky-linux-8-x86-64-powertools-rpms
dotnet5.0-build-reference-packages-0-12.20211117git6ce5818.el8_5.x86_64.rpm
9ad049bfe9d2d1ee6feb1e402eb4299e0627dc5ad6df4c05cc12bde6904b528e
RLEA-2022:0322
.NET Core 3.1 bugfix and enhancement update
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET Core 3.1 to SDK 3.1.416 and Runtime 3.1.22 [Rocky Linux-8.5.0.z] (BZ#2031429)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet-build-reference-packages, dotnet3.1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET Core 3.1 to SDK 3.1.416 and Runtime 3.1.22 [Rocky Linux-8.5.0.z] (BZ#2031429)
rocky-linux-8-x86-64-powertools-rpms
dotnet-build-reference-packages-0-11.20211215git045b288.el8_5.x86_64.rpm
7cc225bc2b285291ec66b3ef0a9d45ac1115a771cd18a022a1f11dbe6130848d
RLBA-2020:4499
NetworkManager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for network-manager-applet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
jimtcl-devel-0.77-6.el8.1.x86_64.rpm
2eff50d56b783bbeb134f3b2125a0f9babf62e82b7a868504070ec4b6864ac85
RLBA-2022:2000
glib2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
glib2-doc-2.56.4-158.el8_6.1.noarch.rpm
aa64cb9e557a147c0ba86aef7701e556397a660ebaa7822bdc19c57b448ee3f0
glib2-static-2.56.4-158.el8_6.1.x86_64.rpm
6227fcea57978647be3169b9610d7d1f26e0106aa3fcfda58fceac58218ab411
RLSA-2023:0208
Moderate: java-1.8.0-openjdk security and bug fix update
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910)
* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910)
* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595)
rocky-linux-8-x86-64-powertools-rpms
java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
3d107948a53e1ad1238a8fce18aa10091bfccb9985c43f9d2523b3a68d8d15e2
java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
7fabf6175ba5cd322454382b3fb8cae2c5b6db72ee8f9a6d0391330083e8575e
java-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
948dd789b3692ea8b6e11f7cbcd20c53bda8af025c0a32a399c1c602b9c7c8b7
java-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
ec8c7b2a3eeb2f0e1737905829ff8def75d14f3f545ea8ce7ba894367a24d32c
java-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
4b730892a6a6e5b467301f43615a0c94c7eeb35e280c8882bc18ae12db074e43
java-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
1a89dfed17bd224f29f613e53077cfd6483456bffbfe4a85bbb0ac94e8a9aa85
java-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
4c9ad8217570c9defa735da0e35eda7d63a1287d73e760cbabcd8f234619f1e7
java-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
f009c10fd73f5b66d1db9fb76604a3d2b7f5328edf769134bcc69e7ecfdc6858
java-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
839c9417c3ade14c28d739ec78229140a006d7d4597b033d2e7b021497df7c18
java-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
30523df7df6ffcc5f1cfb5d92b9a00a6860beaac12c0f0fda5a3a581d319484a
java-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
e61ad854136574fb02bfb8cde68c196b0970ec67127e68e6ccef381a4f74947e
java-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el8_7.x86_64.rpm
709f580d41d047995b696e792c266625b48d83cbd1e7e3decfe4da35a0d18064
RLBA-2022:0315
glusterfs bug fix update
Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
Bug fix(es):
* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593)
Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glusterfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
Bug fix(es):
* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593)
Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages.
rocky-linux-8-x86-64-powertools-rpms
glusterfs-api-devel-6.0-61.3.el8.x86_64.rpm
525a9ade52503d73cf4544ebab25532739a6184b4946e6b173936f215026c655
glusterfs-devel-6.0-61.3.el8.x86_64.rpm
c03e3c50834db85be0060c9793b7f82745b41e04656655ebe9fe2419b1d48499
RLBA-2022:7739
sssd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libsss_nss_idmap-devel-2.7.3-4.el8_7.1.x86_64.rpm
d1deb446dcde3bfb1432c47d870ff5cf89dcc4ad0ff0b475955272a47f2d1a3b
RLBA-2022:7766
fwupd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fwupd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
fwupd-devel-1.7.8-1.el8.rocky.0.3.x86_64.rpm
e762c6daa24c249825b0b3728719700bbb0a9e75bd9d75f6b1686a1d3d9b8394
RLEA-2020:4672
autogen bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autogen.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
autogen-5.18.12-8.el8.1.x86_64.rpm
ef71e9c73dc90421eb259f2e4c47107bff1b55f9eec5764c0ae628e5d0275901
autogen-libopts-devel-5.18.12-8.el8.1.x86_64.rpm
a870efa1315a45b5fd0172eb2ced72192e7733acecee30c4462f3de42c3a5931
RLBA-2020:4734
libblockdev bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libblockdev.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
libblockdev-crypto-devel-2.24-11.el8.x86_64.rpm
99666e02b0ca9caa8ab819c249a5f32b0fff0e5b5d79e7d8cf86385ed3783151
libblockdev-devel-2.24-11.el8.x86_64.rpm
489b4532e3e74d79a6ab4fe6cd5aec581c9bcc208a986f7cea4d6cc084169305
libblockdev-fs-devel-2.24-11.el8.x86_64.rpm
38a2e52015511a9d259abc57ed36412e38278400ff47f831f6b67a479c121142
libblockdev-loop-devel-2.24-11.el8.x86_64.rpm
1930325da4d0a558261dd41e9e8340894f6791f0bfdb0348060e4dc5530bca52
libblockdev-lvm-devel-2.24-11.el8.x86_64.rpm
1355aa2e933e9b3afe2ea3a1cc945a48aeb4b82e60a2dda9e9db72382e1b0569
libblockdev-mdraid-devel-2.24-11.el8.x86_64.rpm
cd7ea15db2e26e59ce680988ccbedc782cd6e9f7d8e76daf477ee296cf5f9abe
libblockdev-part-devel-2.24-11.el8.x86_64.rpm
158545ab0f3f9dd06ec1fb4f80c7529f681985ce49817ea1e969d078445fc96a
libblockdev-swap-devel-2.24-11.el8.x86_64.rpm
bd43acaa895fe9aea4b8428cad79a015152ba5b8361e93ab067f5ce7d97ef749
libblockdev-utils-devel-2.24-11.el8.x86_64.rpm
60d797fd505b5191fe54f91a1c6ae0890231ab16885fe6d8d6c8a55c62a1f32f
libblockdev-vdo-devel-2.24-11.el8.x86_64.rpm
c59272fc46b5d75a1a5891fcd054b3aea6d12909546847b486b98d40871c842d
RLBA-2022:7462
anaconda bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for anaconda.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
anaconda-widgets-devel-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm
0fbcbd9612a1896c5b78316890164e0786a3a98b1a1848c3885a63acfa4165f7
RLBA-2022:7635
openscap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openscap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-powertools-rpms
openscap-engine-sce-devel-1.3.6-4.el8.rocky.0.2.x86_64.rpm
d3159c26e066933735f3a290f40f20139a2832a477a389a30b45ffc5fa0ce37a
RLSA-2023:0625
Important: libksba security update
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow to code executiona (CVE-2022-47629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libksba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow to code executiona (CVE-2022-47629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libksba-devel-1.3.5-9.el8_7.x86_64.rpm
4e97d71de0cd9278c72702dacaa0c8bb396ac6b7dedef18fdd544327319220a1
RLBA-2023:0783
.NET 7.0 bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3.
Bug Fix(es) and Enhancement(s):
* 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z]
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3.
Bug Fix(es) and Enhancement(s):
* 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z]
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-7.0-source-built-artifacts-7.0.103-1.el8_7.x86_64.rpm
edc2c14a66b6ff60be97376cef707ff6e24f4a424c3d0e22a21c468ddbb1e8ba
RLBA-2023:0784
.NET 6.0 bugfix update
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14.
Security Fix(es):
* 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z]
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14.
Security Fix(es):
* 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z]
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-6.0-source-built-artifacts-6.0.114-1.el8_7.x86_64.rpm
b3a75746634b6d346559d5d48e148449c9b0c008a5dbac5eb601fb45763c1e56
RLBA-2023:0831
nfs-utils bug fix and enhancement update
The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs.
Bug Fix(es) and Enhancement(s):
* Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs.
Bug Fix(es) and Enhancement(s):
* Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899)
rocky-linux-8-x86-64-powertools-rpms
libnfsidmap-devel-2.3.3-57.el8_7.1.x86_64.rpm
2d3c1bf4cc4fdb3531a5eb388e60af0e2a9ac03d64804321c171b362df752d7e
RLSA-2023:0832
Important: kernel security and bug fix update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586)
* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592)
* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580)
* MEI support for Alder Lake-S (BZ#2141783)
* Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959)
* Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287)
* Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474)
* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745)
* Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530)
* error 524 from seccomp(2) when trying to load filter (BZ#2152138)
* Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734)
* Connectivity issue with vDPA driver (BZ#2152912)
* High Load average due to cfs cpu throttling (BZ#2153108)
* The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230)
* Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653)
* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460)
* Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272)
* Azure: VM Deployment Failures Patch Request (BZ#2155280)
* Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289)
* MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437)
* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797)
* Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905)
* Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922)
* The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813)
* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182)
* (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221)
* i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460)
* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586)
* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592)
* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580)
* MEI support for Alder Lake-S (BZ#2141783)
* Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959)
* Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287)
* Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474)
* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745)
* Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530)
* error 524 from seccomp(2) when trying to load filter (BZ#2152138)
* Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734)
* Connectivity issue with vDPA driver (BZ#2152912)
* High Load average due to cfs cpu throttling (BZ#2153108)
* The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230)
* Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653)
* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460)
* Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272)
* Azure: VM Deployment Failures Patch Request (BZ#2155280)
* Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289)
* MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437)
* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797)
* Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905)
* Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922)
* The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813)
* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182)
* (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221)
* i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460)
* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257)
rocky-linux-8-x86-64-powertools-rpms
kernel-tools-libs-devel-4.18.0-425.13.1.el8_7.x86_64.rpm
4e7c4e22c34e466674545ab534d71fe048d85e43a20a863bf73e90124073a870
RLSA-2023:0838
Important: samba security update
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-powertools-rpms
libsmbclient-devel-4.16.4-4.el8_7.x86_64.rpm
dc47e0b24ed2976c4a7682795b5a4b408312345fc61e2f3db928433bb29921d9
libwbclient-devel-4.16.4-4.el8_7.x86_64.rpm
22200537496b6fdd0dd221e49bd6707636b9203121db2e32204ba62bee10d28c
samba-devel-4.16.4-4.el8_7.x86_64.rpm
d3d0f896316d5406dabe44d4b7ad9979a359a6c3ad255336a32bac27abc6a59b
RLBA-2023:0850
openscap bug fix and enhancement update
The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* xmlfilecontent probe produces invalid OVAL results (BZ#2165577)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openscap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* xmlfilecontent probe produces invalid OVAL results (BZ#2165577)
rocky-linux-8-x86-64-powertools-rpms
openscap-engine-sce-devel-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm
f074559ef4ea882ce0d8b868126b83d7531a3cb245174184db4a365cc810dcd7
RLBA-2023:1245
.NET 7.0 bugfix update
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-8.7.0.z] (BZ#2175026)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-8.7.0.z] (BZ#2175026)
rocky-linux-8-x86-64-powertools-rpms
dotnet-sdk-7.0-source-built-artifacts-7.0.104-1.el8_7.x86_64.rpm
1b621861a0e113b2dc07d0006b977e1760be56e8f4f86ff8783151126ab5cb3c
RLBA-2023:1565
device-mapper-multipath bug fix update
The device-mapper-multipath packages provide tools that use the device-mapper
multipath kernel module to manage multipath devices.
Bug Fix(es):
*Multipath segfault after running newest patched version (BZ#2161393)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The device-mapper-multipath packages provide tools that use the device-mapper
multipath kernel module to manage multipath devices.
Bug Fix(es):
*Multipath segfault after running newest patched version (BZ#2161393)
rocky-linux-8-x86-64-powertools-rpms
device-mapper-multipath-devel-0.8.4-28.el8_7.3.x86_64.rpm
e43454f269517344b8900c7793797fa1049355c17fb163bb3f853efe90396db8
RLSA-2023:1566
Important: kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770)
* Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170)
* AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275)
* Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750)
* Kernel panic observed during VxFS module unload (BZ#2162763)
* Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587)
* Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296)
* kvm-unit-test reports unhandled exception on AMD (BZ#2166362)
* Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368)
* Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665)
* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602)
* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640)
* Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645)
* mlx5: lag and sriov fixes (BZ#2167647)
* Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776)
* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896)
* Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228)
* fast_isolate_freepages scans out of target zone (BZ#2170576)
* Backport Request for locking/rwsem commits (BZ#2170939)
* ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550)
* Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103)
Enhancement(s):
* Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770)
* Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170)
* AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275)
* Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750)
* Kernel panic observed during VxFS module unload (BZ#2162763)
* Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587)
* Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296)
* kvm-unit-test reports unhandled exception on AMD (BZ#2166362)
* Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368)
* Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665)
* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602)
* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640)
* Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645)
* mlx5: lag and sriov fixes (BZ#2167647)
* Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776)
* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896)
* Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228)
* fast_isolate_freepages scans out of target zone (BZ#2170576)
* Backport Request for locking/rwsem commits (BZ#2170939)
* ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550)
* Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103)
Enhancement(s):
* Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384)
rocky-linux-8-x86-64-powertools-rpms
kernel-tools-libs-devel-4.18.0-425.19.2.el8_7.x86_64.rpm
607da7a3dc2a158a707e298603fc68c28037159bcaf1ada4d70f6fbd0a1c16c4
RLBA-2023:1567
samba bug fix and enhancement update
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es) and Enhancement(s):
* Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394)
* ctdb should have dependency for package samba-winbind-clients (BZ#2170467)
* Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468)
* samba-tool reports an uncaught exception (BZ#2170469)
* Ship new samba subpackages (BZ#2173975)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es) and Enhancement(s):
* Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394)
* ctdb should have dependency for package samba-winbind-clients (BZ#2170467)
* Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468)
* samba-tool reports an uncaught exception (BZ#2170469)
* Ship new samba subpackages (BZ#2173975)
rocky-linux-8-x86-64-powertools-rpms
libsmbclient-devel-4.16.4-6.el8_7.x86_64.rpm
f1a75049f46fa3a99f739def7f05e09a15ac9bf5aa6d415b71883907933e773b
libwbclient-devel-4.16.4-6.el8_7.x86_64.rpm
48ae0fa76db742bad1d4df30a8548ebcb4a5495419090c2becfd6d7028a06082
samba-devel-4.16.4-6.el8_7.x86_64.rpm
109ee3d7813acf711c3190bffcb59a33fdd4fe89227c2afaf47e2fcf06bda1d3
RLBA-2023:1570
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* NetworkManager hostname lookup fails with IPv6 (BZ#2174362)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* NetworkManager hostname lookup fails with IPv6 (BZ#2174362)
rocky-linux-8-x86-64-powertools-rpms
NetworkManager-libnm-devel-1.40.0-6.el8_7.x86_64.rpm
2ba6fac28ff3786effea27d4a7410741c87b33cf2f47a60aaca17e12344b2c55
RLEA-2023:1574
nmstate bug fix and enhancement update
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* SR-IOV VF not disabled as desired, gets IPv4 and default route via DHCP (BZ#2169642)
* Dual stack profiles do not set may-fail correctly (BZ#2170078)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nmstate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* SR-IOV VF not disabled as desired, gets IPv4 and default route via DHCP (BZ#2169642)
* Dual stack profiles do not set may-fail correctly (BZ#2170078)
rocky-linux-8-x86-64-powertools-rpms
nmstate-devel-1.3.3-8.el8_7.x86_64.rpm
4522561ad63d34bc1464d5b955790b08bf384ae26aede1b60b2e5f8e80d29eb4
RLBA-2023:1579
upower bug fix and enhancement update
UPower is a DBus daemon and a client library that provides an interface for other programs to enumerate power sources on the system and control system-wide power management.
Bug Fix(es) and Enhancement(s):
* Rocky Linux 8.7 Missing battery icon while the battery is charging. (BZ#2170088)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for upower.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
UPower is a DBus daemon and a client library that provides an interface for other programs to enumerate power sources on the system and control system-wide power management.
Bug Fix(es) and Enhancement(s):
* Rocky Linux 8.7 Missing battery icon while the battery is charging. (BZ#2170088)
rocky-linux-8-x86-64-powertools-rpms
upower-devel-0.99.7-4.el8_7.x86_64.rpm
97fcac3ece1ecec3b7bbce85f05aecfa8e796a1038b400638f8d4b448a39c488
upower-devel-docs-0.99.7-4.el8_7.noarch.rpm
1c90886eb71223a62206ed760389e25ed8a20f292f2a15f8c466044da1b3a26b